Cybersecurity on the road - IBTTA...Angel Pérez 2 Information technology specialist Master...

Post on 16-Jul-2021

3 views 0 download

Transcript of Cybersecurity on the road - IBTTA...Angel Pérez 2 Information technology specialist Master...

IBTTA International Summit of Rome

17 October 2017

Angel Pérez

Cyber security on the Road

Angel Pérez

2

Information technology specialist

Master Cybersecurity Management

Master Infrastructures Management

CISA, CSX, ITIL v3 Fundamentals

Organization and Cybersecurity Manager for abertis

Autopistas Spain

Collaborator of the ISMS Forum Spain

Teacher of Cybersecurity and Resilience at UPC

(Polytechnic University of Catalonia)

The abertis toll road network in Spain

• Direct management 1526 kilometers,

participation in 251 km.

• 59% Spain’s network.

• 19.255 Average Daily intensity

4

The present

5

Cybersecurity Today

5

Consequences of a Technology disaster - 1

6

7

Consequences of a Technology disaster - 2

Shodan, a things research

8

Public – Private Collaboration

Directive (EU) 2008/114 of 8 December 2008

Critical infrastructures

Regulation (EU) 2016/679 of 27 April 2016

General Data Protection Regulation

Directive (EU) 2016/1148 of 6 July 2016

NIS – Network and Information Systems

In SpainStrategic sectors:

Administration

Space

Nuclear industry

Chemical industry

Water

Energy

Health

Information Technologies and Communications (ITC)

Transportation

Road transport

Air transport

Rail transport

Water transport

Food

Financial System

11

The future

12

What can Tollroad Operators do with these new technologies?

Two proposals from our Cybersecurity area

Proposal 1: Traffic signals

The autonomous car uses Machine Learning systems

to recognize data, for example traffic signals.

Fast introduction to Machine Learning (1)

14

Machine learning is a field of computer science that gives the computer the ability to learn being explicitly programmed

Fast introduction to Machine Learning (2)

15

A

B

C

D

n n

B

C

D

A

Algorithm

Knowninput

Knownoutput

Unknowninput New output

A simple example

16

Input: (x, y)

Output: or X

X

X

X

X

XX

XX

XXX

X

X

X

X

X

X

X

X

X

X

X

XX

X

X

X X

x

y

Here appears the “Details”

17

X

X

X

X

XX

XX

XXX

X

X

X

X

X

X

X

X

X

X

X

XX

X

X

X X

x

y

Here appears the “Devil”

18

v

X

X

X

X

XX

XX

XXX

X

X

X

X

X

X

X

X

X

X

X

XX

X

X

X X

X

X

x

y

Robust Physical-World Attacks on Machine Learning Models

19

August 2017

Machine Learning

Interpretation

The devil is in the details

Problem 2: Control the automation level

What if cars had been hijacked instead of the hotel doors?

What would happen on our roads?

Could we do something?

21

Road Network Access Control

InfrastructureCloud

Trusted CarUntrusted Car

Road conditions

HERE

Are you ready?