在一个充满网络威胁的世界里, transportation operators are re-thinking security strategies and adopting new methods for securing access to networks.
网络安全风险对我们所有人来说都是现实, every day, everywhere, 在我们所做的每件事上, 包括运送货物和人员. 这是我们上班路上的现实, as we travel on trains, buses and planes, and it’s a reality for the journey that our food makes from farm to table, as well as the packages that are conveniently dropped off at our doors.
Every connection, every hand-off along the way comes with a cybersecurity risk ― at some level. And with each connected system and subsystem, and the introduction of new technologies into transportation networks,对强有力的网络安全措施的需求就会增加. That said, cybersecurity risks should not stop transportation organisations from taking full advantage of today’s faster, 更智能、更环保的运营.
重新思考网络安全
大量的货物和人员, and an unprecedented influx of devices are driving transportation organisations to re-evaluate how they address network security to deal with the way the world works today. We are all familiar with security strategies based on organisational structure and departments such as finance, sales, R&D, and human resources. This type of segmentation strategy is no longer enough as people now work from anywhere and no departmental system is considered safer than another.
In addition to the people side of segmentation and access, transportation operators need to think about a single management system that provides a cohesive view across all wired and wireless network resources to ensure full visibility and control over all network resources.
A new security model
Transportation operators may be specialists in their industry, however, 他们可能不是网络安全方面的专家. Working with an experienced partner can provide the expertise necessary to develop and deploy the right model for their network.
A zero trust approach to network security safeguards the organisations’ resources, 而不是网络本身, 通过保护对资源的访问.
The way zero trust network security works is that it assumes attackers are already present and always ready to strike. There is no implicit trust ― no waiting around for a breach and then responding. It applies multiple layers of security protection equally to every internal and external person, system, subsystem, application, 以及试图接入网络的设备. Access is strictly limited to the resources that are needed when the request is made. Additionally, all network resources are continuously scanned for unusual or malicious activities.
Five steps to zero trust
While every transportation operator’s cybersecurity requirements are unique, a five-step methodology can help them assess and implement the zero trust security measures that make the most sense for their organisation. These include:
- Monitoring: Identify all data types, applications, assets, and network services that need to be protected.
- Validating评估数据流向的方式, 通过和关闭网络, including cloud environments as well as the way network resources interact.
- Planning: Architect and segment the network around the data types, applications, 需要保护的资产和网络服务.
- Simulating: Develop and test the policies to verify they appropriately consider and protect all network resources.
- Enforcing: Continuously monitor the environment to detect policy violations, apply remediation and discover opportunities to strengthen the policy.
一个在不断变化的世界中值得信赖的合作伙伴
Alcatel-Lucent Enterprise is involved in some of the most innovative initiatives in the transportation industry globally, including state-wide Intelligent Transportation Systems (ITS) implementations in North America and internationally acclaimed rail initiatives in Europe.
ALE前沿、多服务、多模式 network solutions 在骨干网中加入加固交换机, stackable switches at the network core and SPB technology, 所有这些都具有内置的安全机制. They support an exponentially increasing number of sensors, cameras and IoT devices to securely deliver passengers and goods where they need to be, when they need to be there.
To learn more about ALE security strategies and solutions for the transportation industry, 下载我们的白皮书: Smarter, greener, more secure transportation through digital transportation.
Últimos blogs
降噪对ASR的惊人影响
An ALE study reveals that noise reduction techniques can negatively impact transcription accuracy in Artificial Speech Recognition (ASR) applications.
供应链弹性和业务适应性
Strategic supply chain resilience and business adaptability to thrive in the face of adversity
Education today: Why modernising campus networks is a must
Educational institutions worldwide must modernise their networks to meet today’s new requirements.