Hacking your ride: is Web 2.0 creating vulnerabilities to surface transportation?
MetadataShow full item record
The purpose of this thesis is to determine the threats that social media and social navigation (SMSN) pose to the surface transportation system. The research catalogs the types of threats and SMSN's vulnerabilities, and uncovers terrorists' malign use of social media for intelligence gathering. Academic researchers have already discovered threats in social navigation platforms such as Waze and Google Maps; Sybil and man-in-the-middle attacks allow malicious actors to create traffic congestion and alternate vehicle routing. While this has not yet caused an attributable security concern to the vehicle surface transportation system, in the hands of malicious actors, these vulnerabilities could be exploited to orchestrate an attack that devastates infrastructure and risks human lives.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2006-07);July 2006. The July 2006 issue of Homeland Security Affairs offers articles about risk perception, domestic right wing extremist groups, social network analysis, and the impact of foreign policy on homeland security. It ...
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2011);10 Years After: the 9/11 Essays. Homeland Security Affairs (HSA) is pleased to present this special collection of essays in remembrance of the ten-year anniversary of September 11, 2001. We chose to honor those who lost ...
Leonhardi, Eric V.; Murphy, Mark; Kim, Hannah (Monterey, California: Naval Postgraduate School, 2015-06);The emergence and rapid adoption of social media by society has forced the Department of Defense (DOD) to adapt, and ultimately develop and incorporate, social media policy into its cybersecurity strategy. While social ...