Skip to content
STV
  • Our Work
    • MarketsThe infrastructure that powers our lives.
    • ServicesWe work harder so our solutions work better.
    • Infrastructure ReimaginedHow STV is shaping the future.
    • PortfolioProjects that are making communities better.
    • Infrastructure is economic development.

      Infrastructure is economic development.

      It helps create a better quality of life and more opportunities for communities.

  • About Us
    • How We WorkWe understand. We serve. We collaborate.
    • Where We Are60+ offices across North America.
    • What We BelieveMaking communities better with integrity, partnership and optimism.
    • How We Got HereGenerational impact for over a century.
    • We’re here to improve communities.

      We’re here to improve communities.

      Our sense of purpose drives us.

  • Careers
    • Make a Positive Impact on Your Local CommunityJoin us to create the future you want.
    • Life at STVWe are a team.
    • Job ListingsFind the right opportunity for you.
    • Forget the career ladder.

      Forget the career ladder.

      At STV, your career path grows around you.

  • Insights
    • Thought LeadershipFirst-person perspectives and reflections from our team.
    • Industry ExpertiseDeep dives for projects that makes communities better.
    • Project ExcellenceHow our work is shaping the trends moving the industry.
    • We have an eye on the future.

      We have an eye on the future.

      Learn what's next in the industry.

  • News & Events
    • NewsRead our timely news and latest stories.
    • EventsConnect with us at industry events in your community.
    • We're on the move.

      We're on the move.

      See what's happening at STV.

  • Contact Us

Future Focused

Cutting Direct Access Cybersecurity Threats Off at the Pass

Published

October 28, 2024

Cutting Direct Access Cybersecurity Threats Off at the Pass
A person working at their laptop holding a cell phone.

As critical infrastructure organizations continue to invest in cybersecurity technologies, they should remain vigilant at the intersections of physical security, information technology (IT) and operational technology (OT) because if these systems are not protected, it can make them vulnerable to adversaries gaining direct access to their systems.

Direct access is every adversary’s dream. It is one vector an attacker can use to gain access to a system and then use that access to steal, alter or damage data. Many organizations don’t consider direct access in their cybersecurity programs, but the fact is physical access to a computer can lead to catastrophic consequences for a company. Installing a keystroke logger, inserting a USB device to steal information, depositing malicious code, conducting an inductive charging-based attack on the system or otherwise physically sabotaging the system(s) or their functions are all potential outcomes that may be achieved with physical access.

Theft of a device or devices for future malicious use is also possible, as seen in the well-publicized attacks on the Maroochy Shire water system in Australia where a rogue actor used radio signals to release toxic waste in parks and other public areas. Alternatively, rogue devices, including cellular access points, may be added to a network. This small change may potentially allow an adversary to bypass several layers of security and access the network later from a safe, remote location.

For many of STV’s clients in the transit, transportation and water sectors, physical security and cybersecurity are still being treated as two distinct areas which often fall under the purview of different programs or personnel within an agency. To better support our clients, we have pulled together a team comprised of a robust mix of both physical security and cybersecurity experts that cover the entire spectrum of security to allow us to help agencies secure these intersections. The space between physical and cybersecurity is not a grey area with STV as a partner,

To mitigate direct access threats, critical infrastructure providers and agencies may consider the following:

  • Develop a program for asset identification, accountability and risk assessment.
  • Physically secure OT assets whenever practical.
  • Develop systems that deter, detect, delay, assess, communicate, and respond to physical security threats to their systems.
  • Utilize a six-wall perimeter (four sides plus ceiling and floor) for physical and electronic security systems.
  • Harden/secure field level devices.
  • Practice good “cyber-hygiene” including being mindful of locking doors, devices and cabinets; better password hygiene – i.e., not leaving passwords on post-it notes or on sticky labels. Also, have a responsible corporate and private device usage policy.
  • Conduct cybersecurity awareness training for both new hires during onboarding, and for long-standing employees.
  • Conduct regular physical reviews and walk-downs of an area.

While this is not a comprehensive list, these measures will support greater security outcomes for the agency. If you are looking for a customized program built to address your specific needs, STV’s mix of technical and practical expertise allows us to work with our partners to address physical security risks to OT systems and mitigate their impact an agency’s operations.

Beyond our clients, STV is working actively to improve cybersecurity across our practice areas. Our team features active participants in several subcommittees of the American Public Transportation Association including the Infrastructure & Systems Security Working Group, the Control and Communications Security Working Group and the Enterprise Cybersecurity Working Group. Further, we are actively participating in the development of international standards for rail system cybersecurity, traction power substations, physical security design standards, and groups working on the rollout of cyber-informed engineering.

A person working at their laptop holding a cell phone.

Thought Leader

Matthew Dimmick
Matthew DimmickManager, Physical and Cyber Security ConsultingSend email
advisory Cybersecurity design direct access information technology operational technology security technology

Featured

Related News & Insights

Cybersecurity locks over an illustrated city

Q+As

Creating a Road Map for Cybersecurity Resilience for Rail and Transit Agencies

Digital information overlaid on top of roadways.

Future Focused

Making Our Digital Roadway Infrastructure More Resilient Against Cyber Attacks

Lockheed Martin Office

Trendsetting

Building for Security: A Look Inside SCIF Design

  • Privacy Policy
  • STV Logo
  • Sitemap
This field is for validation purposes and should be left unchanged.

Copyright 2025 © STV Incorporated. All rights reserved.