Traffic Data Flow Assessment of Railway Networks

nsplsh_6e52693972676c65435230_mv2_d_4000_6000_s_4_2.jpg

THE CHALLENGE 

Lose control of your network by failing to understand the risks

When designing a network there is one key goal that system builders have, they want to get data from point A to point B in the most efficient way possible. Security may be considered at the earliest stages, but as the complexity of the network increases, the challenge of accurately tracking the network traffic flows also increases significantly.

Then considering the challenge of adding devices from third parties, and suddenly you have lost control of the onboard network layout. The map you produced is out of date before the train is delivered.

Having an accurate representation of the onboard traffic data flows is important because you cannot develop a fully compliant risk register without understanding the risks that you are exposing through the onboard or signalling network

 
nsplsh_e933eccee1c64e219a2ca47808855ae0_mv2.jpg

THE SOLUTION  

Maintain an accurate picture of the data flow between systems

A RazorSecure Data Study will produce a full report of the layer 2 and layer 3 connectivity and traffic observed, create full packet captures of the observed traffic for bench testing and recommend key locations within the network to improve the cyber security monitoring.

We typically start a Data Study by reviewing any existing network maps that are available, most companies have a relatively accurate layer 2 mapwhich will inform the best places to deploy packet capture to complete theData Study. We then work with your team to plan and then complete the data study, minimising the need for onsite work where possible.

The data that is captured during the study will then be analysed by our team, with a report produced including the network maps. This report will then be shared with you including any recommendations.

 

 

Solution Outcomes

Benchmark  'normal' system activity 

Discovery system abnormalities to detect malicious activity

 Understand your network traffic

Gain an understanding of your data flows for better risk management

Receive a full data study report

Start your cyber security programme with accurate data