11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

25.1. Contextsdefensive approaches that can deal with targeted attacks and exploitsof zero-day vulnerabilities. Identity fraud is also a major issue here.New payment schemes (e.g., using NFC mobile phones) may offer newtechnical and commercial possibilities, but also raise new security andprivacy concerns.• Transport & Logistics. Cars and transportation systems are increasinglymaking use of sophisticated software to carry out safety-critical processes,such as braking in cars. Drive-by-wire is already a reality, and in thenear future intelligent transportation systems will make use of largescalecommunication to optimize fuel consumption, <strong>red</strong>uce traffic jams,increase safety and implement smart tax charges, but this change alsobrings high security risks (e.g., it has been demonstrated that malware ina car could turn off the braking system). Moreover, the communicationmeans that are needed to implement the smart mobility paradigm willturn the car into an open system that is by definition open to cyberattacks.Cars are only one example. Whitehat hackers have shown that newair traffic protocols are susceptible to a wide range of attacks. Severalincidents in the past have shown that train services are vulnerable tosoftware problems. There is no doubt that this is true for most modernforms of transport.In logistics, the main challenge in the domain is to ensure businesscontinuity, while making the value chains as short and responsive aspossible. A shorter chain has fewer participants and thus lower cost.A responsive chain delivers goods and payments faster, again loweringcosts. However, in a shorter chain the risks of interruption of the logisticsand transport services will increase and thus business continuity riskswill increase.• e-Health. Processes in the health sector are increasingly being supportedby ICT. ICT is also the key enabler of new methods of providing care,as exemplified by ambient assisted living. However, patient data areoften spread across many care providers such as the general practitioner,dentist, specialist, physiotherapist, hospital staff, pharmacists and, ofcourse, the patient. Care providers must be able to access relevantinformation that is created and maintained by colleagues (e.g., medicationrecords), to take action in case of emergencies while still guaranteeingthe privacy of the patient’s data. The security of patient data is essentialto ensure that doctors obtain the correct information at the right time.The retention period for patient data is long (up to 70 years) and thisposes a significant challenge for the technical infrastructure that supportsthe healthcare system.149

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!