Hackers shutting down train lines
1 / 5

Hackers Shutting down Train Lines - PowerPoint PPT Presentation

  • Uploaded on

Hackers Shutting down Train Lines. Teigh Berg ACM tech news: 12/30/11 Source: Reuters (12/28/11) URL:http:// www.reuters.com /article/2011/12/28/us-trains-security-idUSTRE7BR0C520111228. Summary.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'Hackers Shutting down Train Lines' - kimo

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Hackers shutting down train lines

Hackers Shutting down Train Lines

Teigh Berg

ACM tech news: 12/30/11

Source: Reuters (12/28/11)



“Hackers, using the same technique to shut down a website by overwhelming them with web traffic, could shut down the computers that control train switching systems,” According to Stefan Katzenbeisser at TechnischeUniversitat Darmstadt in Germany.

While Katzenbeisser says that “the trains could not crash, but service could be disrupted for quite some time”

What its all about
What its all about

  • The ethical issue of this case is the slowing down of the train schedule and its impact.

  • The stakeholders in this case are those who have jobs and businesses that require commuting by train. As well as the train operators and the people who have to work on the systems that control train switching.

  • Three solutions: a)make train switching manual, b)Make the system secure from all intrusion of any kind, c) Make only a few system admins with randomly generating passwords each week. The best case would be c) because it creates a system of relative security and has the best chance of being effective. The worst case is b) because it allows no work to be done on the system if something goes wrong. I personally would choose c) because it seems to be the most balanced.

What its all about continued
What its all about(continued)

  • I would personally allow everyone to use the solution I have provided because it is a smart way to security. This solution also treats people as both means and ends, because it has people in every part of the process except for password generation.

  • This solution is natural in the context of the environment that it is relevant. This solution is also balanced because it allows for people to access the system, but it does not allow for an active scenario where hacking the system can occur, as only a few people have access to the system and the passwords vary from week to week.

  • There would be a majority that think that this solution is the most efficient means to the end, as it secures the system and allows for only a few people to access the system. It will produce the greatest good for the greatest amount of people provided that people could be honest.

What its all about final
What its all about (Final)

  • I personally feel that this solution is the best one by far because it provides the best security and in my own conscience, because it would be the most sensible and allow for the most flexibility.

  • I personally feel that no philosophy actually affected this plan, but rather my personal morals are what influenced the morality of this solution and my sense of logic is what influenced how the solution was set up.

  • For the solution, it follows the ACM codes parts 1.1-1.3, as it helps with human well being by allowing people to get to work on time with a secure train system, it avoids harm to others, economic or physical, and it forces the admins of the system to be honest and trustworthy and not give out the system passwords to others.