2019
DOI: 10.1177/0954409719881849
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity for railways – A maturity model

Abstract: With the advancements in and widespread adoption of information and communication technologies in infrastructures, cyber-attacks are becoming more frequent and more severe. Advanced cybersecurity threats with automated capabilities are increasing in such sectors as finance, health, grid, retail, government, telecommunications, transportation, etc. Cyber-attacks are also increasing in railways with an impact on railway stakeholders, e.g. threat to the safety of employees, passengers, or the public in general; l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 24 publications
(24 citation statements)
references
References 49 publications
0
24
0
Order By: Relevance
“…It can be also considered as a complex process that consist of partial operations and a lot of other factors. One of the most vital is the customer-not only as a final segment, but also as a judge for quality and source of incomes [66,69,70]. From his point of view, one of the most important measures is the timetable.…”
Section: Discussionmentioning
confidence: 99%
“…It can be also considered as a complex process that consist of partial operations and a lot of other factors. One of the most vital is the customer-not only as a final segment, but also as a judge for quality and source of incomes [66,69,70]. From his point of view, one of the most important measures is the timetable.…”
Section: Discussionmentioning
confidence: 99%
“…To evaluate the level of maturity and awareness of the existing cybersecurity workforce, various cybersecurity maturity models were studied and compared (Kour et al , 2020). R-C2M2 and ISACM were selected for this research based on the criterion defined by previous research (Kour, 2020).…”
Section: Methodsmentioning
confidence: 99%
“…After the deduction process, the complete list of CYSFAM focus areas (11 in total) was established as shown in Table 8. 4. The next step was to determine the capabilities under each focus area by analysing the resources that led the authors to the focus areas.…”
Section: Defining the Cybersecurity Focus Areas And Capabilitiesmentioning
confidence: 99%
“…The consequences of cyber-attacks are often borderless and expand to societies. Recent research in cybersecurity put forward a diversity of areas to investigate, such as: transportation [4,5], IoT, CPS [6,7], and healthcare [8,9]. Nevertheless, due to the ever-changing nature of cyber-risks, and with the continual inclusion of new assets, organizations need a holistic and persistent approach to cybersecurity.…”
Section: Introductionmentioning
confidence: 99%