*Intersection Management, Cybersecurity, and Local Government: ITS Applications, Critical… DOI: http://dx.doi.org/10.5772/intechopen.101815*

technologies have also increased the exposure to numerous cybersecurity threats [7]. Of specific interest here are the cybersecurity threats posed by various types of connectivity, not only external, but also from "credible" sources [8, 9]. Although these threats can extend in severity all the way to the level of terrorism, some of those primary threats include:

