All connected systems play a role in this vulnerability: from entertainment devices and services, to remote monitoring, to utilizing cloud services with data from the digital signaling systems.
Read this article to understand:
- The relationship between connectivity, points of vulnerability and the means to combat them.
- The balance between a critical need for information, simple convenient services offered to passengers, and where to draw the line because the risk is too high.
- How true protection of your control systems can only come from a hardware-enforced unidirectional security gateway.