Skip to main content

Cybersecurity in the German Railway Sector

  • Conference paper
  • First Online:
Critical Information Infrastructures Security (CRITIS 2022)

Abstract

Cybersecurity breaches are on the rise. Due to increased network interconnection, industrial systems are becoming more attractive targets for such attacks. Therefore, various industries must acquire knowledge and experience regarding cybersecurity for their IT and OT systems. One such sector is the safety-critical railway and public transport sector. Technological leaps like digital interlocking, fifth-generation networking, and the move from proprietary field busses to IP networking are driving the sector into an inter-connected age. This work scrutinizes the sector’s cybersecurity awareness, knowledge, and preparedness. To this end, we created a two-stage study comprising a quantitative online survey to gain comprehensive insight and qualitative interviews to deepen selected issues in a SWOT analysis. The results show that the sector still has a long way to go regarding cybersecurity, with the average company not meeting basic implementation levels. Furthermore, we identified multiple factors contributing to this result. Key issues are a lack of staff and management sensitivity to cybersecurity and support from authorities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adams, W.C.: Conducting semi-structured interviews. In: Handbook of Practical Program Evaluation, pp. 492–505. John Wiley & Sons, Inc. (2015). https://doi.org/10.1002/9781119171386.ch19

  2. Becker, J., Knackstedt, R., Pöppelbuß, J.: Developing maturity models for IT management. Bus. Inf. Syst. Eng. 1(3), 213–222 (2009). https://doi.org/10.1007/s12599-009-0044-5

  3. Framework for improving critical infrastructure cybersecurity, version 1.1. Technical report, National Institute of Standards and Technology (2017)

    Google Scholar 

  4. Leigh, D.: SWOT analysis. In: Handbook of Improving Performance in the Workplace: vol. 1–3, pp. 115–140 (2019). John Wiley & Sons, Inc. https://doi.org/10.1002/9780470592663.ch24

  5. Liveri, D., Theocharidou, M., Naydenov, R.: Railway cybersecurity. Technical report, European Union Agency for Cybersecurity, ENISA (2021). https://www.enisa.europa.eu/publications/railway-cybersecurity/@@download/fullReport

  6. Möller, D., et al.: Emerging technologies in the era of digital transformation: state of the art in the railway sector. In: Proceedings of the 19th International Conference on Informatics in Control, Automation and Robotics - ICINCO, pp. 721–728. INSTICC, SciTePress (2022)

    Google Scholar 

  7. Möller, D.P.F.: Cybersecurity in Digital Transformation. SCSSN, Springer, Cham (2020). https://doi.org/10.1007/978-3-030-60570-4

    Book  Google Scholar 

  8. Nord, M., Leppla, B., Möller, D., Krause, P., Lenski, N., Czerkewski, P.: Studie Security und geplanter Technologieeinsatz. Technical report, Deutsches Zentrum für Schienenverkehrsforschung beim Eisenbahn-Bundesamt (2022). https://doi.org/10.48755/dzsf.220011.01

Download references

Acknowledgments

This research paper originates from the German Centre for Rail Traffic Research (DZSF) project “Study Security & New Technologies”. We will publish the full report soon [8].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lukas Iffländer .

Editor information

Editors and Affiliations

Appendices

Sample Questions from the Online Questionnaire

  1. 1.

    What cybersecurity measures is your company pursuing?

  2. 2.

    What percentage of your company’s revenue do you plan to spend on cybersecurity over the next 3 years?

  3. 3.

    What percentage of your company’s staff are full-time equivalents dedicated to cybersecurity?

  4. 4.

    What forms of cyberattacks have occurred in your company in the last 3 years?

  5. 5.

    How many of the cyberattacks mentioned in the previous question have occurred as a total in your company in the last 3 years?

  6. 6.

    How do you assess the current cyber security risk considering current technologies in your company?

  7. 7.

    What benefits does your company see for implementing cybersecurity?

  8. 8.

    What obstacles may be standing in the way of your company’s cybersecurity goal?

  9. 9.

    What was the average loss you incurred from cyberattacks in the last 3 years, as a percentage of your company’s revenue?

  10. 10.

    Which statement(s) best describes the cybersecurity strategy in place at your company?

  11. 11.

    Does your company have a cybersecurity officer role?

  12. 12.

    Does your company have a strategy in place to sustainably counter attacks?

  13. 13.

    Does your company ensure that all employees are trained in cybersecurity?

  14. 14.

    Has your company implemented a monitoring process to assess cybersecurity awareness?

  15. 15.

    Are employees in your company able to identify and report cybersecurity anomalies?

  16. 16.

    Does your company have established processes for dealing with acute cybersecurity attacks?

  17. 25.

    Has your company defined measures for dealing with an acute cybersecurity attack?

  18. 40.

    Have you identified assets and their potential protection needs of the IT infrastructure used in your company?

  19. 41.

    Have you conducted a vulnerability assessment of the IT infrastructure deployed in your organization?

  20. 42.

    Have you conducted a threat analysis of the IT infrastructure used in your company?

  21. 57.

    Do you have measures in place to ensure cybersecurity in the supply chain at your company?

Interview Questions Adapted to Each Interview Partner

  • If, in the online questionnaire, the company stated to have a strategy for a certain NIST function, but we calculated a low degree of maturity for that function:

    • You stated that your cybersecurity strategy includes measures to ensure [description of the function in question]. Please explain how these are implemented in your company.

  • For each criterion mentioned in the online questionnaire to impede the improvement of cybersecurity within the company:

    • You stated that [description of the criterion] might be impeding the improvement of cybersecurity within your company. We would like to elaborate on that. Why is the [description of the criterion] missing, in your opinion?

  • The question depends on whether or not the company stated to provide cybersecurity training to their employees.

    • If they do not: You stated that employees do not receive cybersecurity training. Why was a decision against such training made?

    • If they do: You stated to provide training for cybersecurity to your employees. Please provide further detail for this training.

      [If they were not addressed in the answer, the following details would be inquired individually: frequency of training, obligation to complete training, the scope of the training, and review of understanding after the training]

  • For new technologies that the company stated to be using and highly knowledgeable about:

    • You stated to be using [description of the new technology] or to at least be conducting a pilot run with it. What are currently, or have been in the past, the biggest impediments in the use of this technology?

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Möller, D. et al. (2023). Cybersecurity in the German Railway Sector. In: Hämmerli, B., Helmbrecht, U., Hommel, W., Kunczik, L., Pickl, S. (eds) Critical Information Infrastructures Security. CRITIS 2022. Lecture Notes in Computer Science, vol 13723. Springer, Cham. https://doi.org/10.1007/978-3-031-35190-7_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-35190-7_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-35189-1

  • Online ISBN: 978-3-031-35190-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics