Implementation and Maintenance Responses
Problem 1
The technological aspect of the Positive Train Control (PTC) is the primary source of security issues for the system. For example, the use of a 5G network that is always online to allow communication with dispatchers and enables people on the network access to change the operations of the train poses a Cyber Security problem (FCC, 2017). Such a network gives hackers opportunities to interrupt the safe operations of the train for financial or ideological reasons, among others. For instance, if a terrorist group wants to cause human deaths in New York, they would only have to hack the network and change signals and shut out everyone else, and this could lead to a definite crash of the train while the terrorist remains at a safe distance. Also, there is a possibility of software defects (Young, N/d). For instance, if the software were to malfunction thus causing the system to send or show wrong signals, a false clear could lead to the crashing of trains or some other fatal accident on the tracks. For these reasons, it will never be safe to remove the conductor from the cab of the locomotive. They should increase the number of conductors to have enough people always checking to see that everything is working correctly.
Problem 2
Whether accidental or targeted, a breach of information security can have harmful and even fatal consequences. It could mean a violation of privacy, loss of assets and malpractice due to altered information among others. Administrators should always have this in mind when establishing safeguards and security tools; in fact, they should still know what kind of threats they are fending off and why. For this reason, according to Sharkasi (2015), administrators should conduct a regular inventory analysis where they determine what it is they are protecting. A well-maintained inventory will tell the administrator what security measures to take. Subsequently, the administrator should keep up with the risks of emerging technology because all technologies come with their vulnerabilities. If not checked, they can be used to attack or manipulate existing systems. Most importantly, the administrators should conduct a frequent risk assessment for their system because they allow for the update of possible risks and possible preventive measures and solutions.