{"id":1809,"date":"2020-07-27T08:00:23","date_gmt":"2020-07-27T08:00:23","guid":{"rendered":"http:\/\/72.52.228.46\/~itegriti\/?p=1809"},"modified":"2021-04-12T04:45:20","modified_gmt":"2021-04-12T04:45:20","slug":"intelligent-transportation-and-shipping-pose-security-and-privacy-risks","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/","title":{"rendered":"Intelligent Transportation and Shipping Pose Security and Privacy Risks"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>Intelligent or smart public transportation and shipping systems require more and more data to function efficiently and effectively. Governments and companies alike need to take measures to safeguard the cybersecurity and privacy of these systems.<\/p>\n<p>The rise of smart cities and smart shipping has connected critical infrastructure to the internet, creating numerous opportunities to collect data on the use of roads, ships and public transportation. While real-time tracking could reduce congestion in cities, and improve management of overseas shipping, security and privacy risks emerge that need to be addressed sooner than later to avoid incidents that disrupt the functionality of the systems.<\/p>\n<h2 class=\"navy\">Security and privacy risks in transportation systems<\/h2>\n<p>A recent report by International Data Corporation (IDC) titled \u201c<a href=\"https:\/\/www.idc.com\/getdoc.jsp?containerId=US45039119\" target=\"_blank\" rel=\"noopener noreferrer\">Surveillance Avenue\u2014Urban Mobility and Addressing the Erosion of Privacy<\/a>\u201d states it is becoming difficult for people to use public transportation systems without surrendering at least some of their personal data. Facial recognition cameras, license plate readers, mobile phone data and other technologies are increasingly used to track people as they move. Combined with other datasets, that information could be used to create a detailed profile of every citizen and could render anonymity a thing of the past.<\/p>\n<p>&#8220;As increasing amounts of data are collected, we are faced with the issue that one must exchange personal privacy for the use of publicly funded transportation networks or assets.\u201d <a href=\"https:\/\/www.idc.com\/getdoc.jsp?containerId=US45039119\" target=\"_blank\" rel=\"noopener noreferrer\">says<\/a> Mark Zannoni, IDC research director for Smart Cities and Transportation and head of IDC&#8217;s Worldwide Urban Mobility Program, \u201cWhether initially personally identifiable or anonymous, individual data from urban mobility can be deanonymized, which is not only invasive but also enables potentially dangerous situations. Data collectors and owners must assure the public of responsible data use, which will come to realization by the adoption of extensive data privacy protection laws or guidelines,&#8221;.<\/p>\n<p>Hence, without proper security protections, this information could easily fall into the wrong hands. The wave of ransomware attacks against major cities around the world indicates that safeguarding huge amounts of data is not an easy thing to do. Failure to secure our digital infrastructures could result in all this personal data being left vulnerable to malicious attacks or even unintentional errors and disclosures.<\/p>\n<p>The challenges of smart transportation systems do not end in protecting personal data. It is also about protecting the reliability and availability of these systems. In August 2019, Transport for London (the local government body responisbile for the transport system in London) was forced <a href=\"https:\/\/www.governmenteuropa.eu\/rail-cybersecurity\/94327\/\" target=\"_blank\" rel=\"noopener noreferrer\">temporarily to close down<\/a> the online facility for its card system due to a data breach. In July 2019, New York City Metropolitan Transport Authority\u2019s subway system <a href=\"https:\/\/www.usnews.com\/news\/us\/articles\/2019-07-19\/the-latest-new-york-subway-service-returning-to-normal\" target=\"_blank\" rel=\"noopener noreferrer\">shut down six major rail lines<\/a> across the city without any warning, following a widespread \u201cfailure in the computer system that powers the signals\u201d of the affected lines.<\/p>\n<p>The security of transportation systems is a pressing issue. Without significant cybersecurity deployment, transportation systems equipped with Internet of Things (IoT) and Artificial Intelligence (AI) capabilities would be vulnerable to outside interference. While leaving users\u2019 data at risk of hacking poses privacy concerns, potential compromise of the operating systems of transportation systems could risk passengers\u2019 safety.<\/p>\n<p>For these reasons, the Department of Homeland Security has issued the <a href=\"https:\/\/www.cisa.gov\/publication\/tss-cybersecurity-framework-implementation-guide\" target=\"_blank\" rel=\"noopener noreferrer\">Transportation Systems Sector (TSS) Cybersecurity Framework Implementation Guidance<\/a>, which helps TSS owners to adapt the requirements of the NIST Cybersecurity Framework to the needs of the transportation sector to help reduce cyber risks. At the same time, the European Commission has <a href=\"https:\/\/ec.europa.eu\/transport\/themes\/its_en\" target=\"_blank\" rel=\"noopener noreferrer\">launched projects<\/a> in the framework of the Digital Single Market Strategy to promote solutions that result in a more efficient management of the transport network for passengers and businesses.<\/p>\n<h2>Security and privacy risks in the maritime sector<\/h2>\n<p>In the maritime sector, Information Technology (IT) and Operational Technology (OT) systems onboard ships are used for a multitude of purposes, such as controlling engines and associated systems, cargo management, navigational systems, administration, etc. Until recent years, these systems were commonly isolated from each other and from any external shore-based systems. The increased integration of systems and the greater use of digital ship-to-shore communication and data links now exposes ships to cybersecurity risks.<\/p>\n<p>\u201cVessels digitalization with the numerous different OT devices deployed creates a digital landscape previously unknown to a big extent due to the specific hardware and software being used. New security risks are evolved with the impact being very significant mainly due to the direct connection with the physical world and the consequent operational damage,&#8221; says Isidoros Monogioudis, Adjunct\u00a0Professor at the Hellenic American University.<\/p>\n<p>The maritime digital environment includes systems such as Vessel Integrated Navigation System (VINS), GPS, satellite communications, Automatic Identification System (AIS), and engine control systems. Fault tolerance and near-real-time response to incidents are crucial to ensure the high availability of ships. With more IoT devices onboard and the use of Artificial Intelligence, the future of Internet of Ships and Maritime Autonomous Systems (MAS) is imminent.<\/p>\n<p>A completely digitalized shipping means greater reliance on systems that exchange sensitive data for the management of cargo and the ship. A cyber incident in ships might have severe consequences for the crew, the passengers, and the cargo on board. Considering that many ships carry harmful substances, such as chemicals, a cyber incident might have severe environmental consequences or might lead to hijacking the ship to steal the cargo.<\/p>\n<p>For these reasons, the United Nations <a href=\"http:\/\/www.imo.org\/en\/OurWork\/Security\/Guide_to_Maritime_Security\/Documents\/MSC-FAL.1-Circ.3%20-%20Guidelines%20On%20Maritime%20Cyber%20Risk%20Management%20(Secretariat).pdf\" target=\"_blank\" rel=\"noopener noreferrer\">International Maritime Organization (IMO)<\/a> and <a href=\"https:\/\/www.bimco.org\/about-us-and-our-members\/publications\/the-guidelines-on-cyber-security-onboard-ships\" target=\"_blank\" rel=\"noopener noreferrer\">Baltic and International Maritime Council (BIMCO)<\/a> have issued guidelines which offer guidance to shipowners and operators on how to assess their operations and develop the necessary procedures and actions to improve resilience and maintain the integrity of cyber systems onboard their ships.<\/p>\n<p>\u201cBoth proactive and reactive measures must be developed and applied with the real-time security awareness and visibility being possibly the most critical solution since OT environment remains extremely sensitive in providing timely and accurate services,&#8221; says Isidoros Monogioudis.<\/p>\n<h2 class=\"navy\">Is that all?<\/h2>\n<p>Cybersecurity controls are important to preserve the reliability of the smart transportation and shipping systems and the integrity and confidentiality of the mission-critical and personal data required for the operation of these systems. These measures are also required to preserve the safety of the passengers and the goods shipped. In the case of the safety of products and substances, distinct regulations apply, such as the U.S. Coast Guard <a href=\"https:\/\/en.wikipedia.org\/wiki\/Maritime_Transportation_Security_Act_of_2002\" target=\"_blank\" rel=\"noopener noreferrer\">Maritime Transportation Security Act (MTSA)<\/a>, which creates a consistent security program for all ports to better identify and deter threats, or the CISA <a href=\"https:\/\/www.cisa.gov\/chemical-facility-anti-terrorism-standards\" target=\"_blank\" rel=\"noopener noreferrer\">Chemical Facility Anti-Terrorism Standards<\/a>.<\/p>\n<p>While technology transforms the transportation and shipping organizations, it introduces new security risks and challenges. Organizations must take all required security measures proactively to minimize the likelihood of an event that may jeopardize people and environment safety.<\/p>\n<p><a href=\"http:\/\/72.52.228.46\/~itegriti\/\">ITEGRITI<\/a> helps protect some of the nation\u2019s most critical infrastructure, serving clients in the energy, healthcare, transportation, education, retail and financial sectors.\u00a0 We develop and implement programs that mitigate cyber and compliance risk, supported by internal controls to measure, monitor and report ongoing program effectiveness. Our programs help companies avoid hacks and minimize business impact during a cybersecurity event.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Intelligent or smart public transportation and shipping systems require more and more data to function efficiently and effectively. Governments and companies alike need to take measures to safeguard the cybersecurity and privacy of these systems.<\/p>\n","protected":false},"author":10,"featured_media":1814,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2179,13],"tags":[1941],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Intelligent Transportation and Shipping Pose Security and Privacy Risks - kw022024<\/title>\n<meta name=\"description\" content=\"Intelligent or smart public transportation and shipping systems require more and more data to function efficiently and effectively. Governments and companies alike need to take measures to safeguard the cybersecurity and privacy of these systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intelligent Transportation and Shipping Pose Security and Privacy Risks\" \/>\n<meta property=\"og:description\" content=\"Intelligent or smart public transportation and shipping systems require more and more data to function efficiently and effectively. Governments and companies alike need to take measures to safeguard the cybersecurity and privacy of these systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-27T08:00:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-12T04:45:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog25.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anastasios Arampatzis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Governments and companies alike need to take measures to safeguard the cybersecurity and privacy of these systems.\" \/>\n<meta name=\"twitter:creator\" content=\"@TassosAramp\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasios Arampatzis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/\"},\"author\":{\"name\":\"Anastasios Arampatzis\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\"},\"headline\":\"Intelligent Transportation and Shipping Pose Security and Privacy Risks\",\"datePublished\":\"2020-07-27T08:00:23+00:00\",\"dateModified\":\"2021-04-12T04:45:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/\"},\"wordCount\":1414,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog25.jpg\",\"keywords\":[\"12 Minute Read\"],\"articleSection\":[\"Compliance\",\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/\",\"name\":\"Intelligent Transportation and Shipping Pose Security and Privacy Risks - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog25.jpg\",\"datePublished\":\"2020-07-27T08:00:23+00:00\",\"dateModified\":\"2021-04-12T04:45:20+00:00\",\"description\":\"Intelligent or smart public transportation and shipping systems require more and more data to function efficiently and effectively. Governments and companies alike need to take measures to safeguard the cybersecurity and privacy of these systems.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog25.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog25.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intelligent Transportation and Shipping Pose Security and Privacy Risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\",\"name\":\"Anastasios Arampatzis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"caption\":\"Anastasios Arampatzis\"},\"description\":\"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.\",\"sameAs\":[\"http:\/\/www.welcometobora.com\",\"https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/\",\"https:\/\/x.com\/TassosAramp\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Intelligent Transportation and Shipping Pose Security and Privacy Risks - kw022024","description":"Intelligent or smart public transportation and shipping systems require more and more data to function efficiently and effectively. Governments and companies alike need to take measures to safeguard the cybersecurity and privacy of these systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/","og_locale":"en_US","og_type":"article","og_title":"Intelligent Transportation and Shipping Pose Security and Privacy Risks","og_description":"Intelligent or smart public transportation and shipping systems require more and more data to function efficiently and effectively. Governments and companies alike need to take measures to safeguard the cybersecurity and privacy of these systems.","og_url":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2020-07-27T08:00:23+00:00","article_modified_time":"2021-04-12T04:45:20+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog25.jpg","type":"image\/jpeg"}],"author":"Anastasios Arampatzis","twitter_card":"summary_large_image","twitter_description":"Governments and companies alike need to take measures to safeguard the cybersecurity and privacy of these systems.","twitter_creator":"@TassosAramp","twitter_site":"@itegriti","twitter_misc":{"Written by":"Anastasios Arampatzis","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/"},"author":{"name":"Anastasios Arampatzis","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673"},"headline":"Intelligent Transportation and Shipping Pose Security and Privacy Risks","datePublished":"2020-07-27T08:00:23+00:00","dateModified":"2021-04-12T04:45:20+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/"},"wordCount":1414,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog25.jpg","keywords":["12 Minute Read"],"articleSection":["Compliance","Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/","url":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/","name":"Intelligent Transportation and Shipping Pose Security and Privacy Risks - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog25.jpg","datePublished":"2020-07-27T08:00:23+00:00","dateModified":"2021-04-12T04:45:20+00:00","description":"Intelligent or smart public transportation and shipping systems require more and more data to function efficiently and effectively. Governments and companies alike need to take measures to safeguard the cybersecurity and privacy of these systems.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog25.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog25.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/intelligent-transportation-and-shipping-pose-security-and-privacy-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Intelligent Transportation and Shipping Pose Security and Privacy Risks"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673","name":"Anastasios Arampatzis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","caption":"Anastasios Arampatzis"},"description":"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.","sameAs":["http:\/\/www.welcometobora.com","https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/","https:\/\/x.com\/TassosAramp"],"url":"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1809"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=1809"}],"version-history":[{"count":8,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1809\/revisions"}],"predecessor-version":[{"id":1982,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1809\/revisions\/1982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/1814"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=1809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=1809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=1809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}