Aviation Cyber Security
Yulissa Menendez
Aviation Management
Business 360 – Airport Safety & Security
Dr. Robert Aceves
Section: PQ
March 2nd, 2015
Abstract
The aviation industry has rapidly changed and is constantly expanding because of new technology entering the market. Currently the passengers are more linked with airlines and flights though technology. New technology produces a high risk of disturbance. Thus, airlines need to take action to maintain passengers and flight information confidential and secured. However, controlling security in aviation is not a simple task. Examining flight data information, radar recordings, passenger data, Air Traffic Control and Pilot recordings, is a very difficult because the
…show more content…
There is a great possibility of a cyber attack in the aviation industry. The threats can interrupt the safety and security of the passengers and the aircraft. Common attacks can consist of altering information that would make the information looks true and valid. American and United airlines wear both hacked in December 2014. According to an article in the daily news titled “Thousands of American and United airlines accounts hacked, with thieves booking dozens of free trips “ without unauthorized access, gained control of the reservation system and booked flights The hackers stole passenger’s username and password consequently booking flights, and stealing their miles usage. This cyber robbery affected about 10,000 passengers. However, American and United airlines both reveal that their system was not hacked. Technology has become reliable and available for everyone; this means that cyber threats have to be taken seriously. Actions to avoid this should be taken immediately instead of waiting until something occurs. The American Institute of Aeronautics and Astronautics (AIAA) announced “A framework for Aviation Cyber security” decision paper. According to the president of the AIAA Elect Jim Albaugh, the purpose of this paper is to outline a method that the aviation industry should follow. The decision paper focuses on
This report is prepared to assist the aircraft solutions (AS), a well-known company for equipment and component fabrication in Southern California, in identifying the most important security vulnerabilities. This report also discusses possible threats, the likelihood of the threats occurring
The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their
Aircraft Solutions is aircraft Design Company that allows internal and external users to access its system. As a result of this, the company has made itself vulnerability to certain threats.
The purpose of this paper is to explore and assess computer security as it relates to Aircraft Solutions. Aircraft Solutions provides products and services to a range of companies that require highly specialized skills. Information is accessed by internal and external users via their Business
Aviation Operations, Safety, and Security, Communications, Technology, Innovation and the Internet, Consumer Protection, Product Safety, Insurance, and Data Security
An assessment of Aircraft Solutions (AS) as to what Security Vulnerabilities that might be found, two areas discussed are Hardware & Policy weakness and impact.
The aim of this assessment is to address weaknesses and provide recommendations on the network security of Aircraft Solutions. Aircraft Solutions is a recognized leader in the design and fabrication of component materials and services for companies in the electronics, commercial, defense, and aerospace industry.
Just recently there has been uproar over airport security and the use of body scanners on passengers. After 9/11 many airlines have toughen up their security measures in order to prevent this tragic accident to ever occur again. In order to improve security and make our lives a lot safer airlines have implemented many different types of technology. Technology aids airline security to see what passengers are possibly carrying under their clothing. Making passengers go through X-Ray screenings can not only prevent passengers from boarding a plane with harmful equipment but it can also deter the thought of someone actually making an attempt to board while carrying a weapon. Other technological advancements such as surveillance cameras are being
At Aircraft Solutions, there are several samples of concerns that could lead to a breach of information or compromised branch of their system. Due to the design of their geographical layout, secure connections that encrypt
Since the beginning of aviation, aircraft have been used for other intentions besides carrying passengers and cargo. They have been used as weapons of war dating all the way back to the first world war, and the use of aircraft has enlightened the advancement of the aviation. “Throughout the history of aviation, the greatest progress in flight has been made during time when either war or the threat of war was present” (Millspaugh, et al., 2008, p. 33). However, the war we face today has been triggered by the deliberate use of aircraft to cause death, destruction, and mayhem.
In line with this Program Outcome, the issue of safety systems for airlines and related facilities will be addressed. The research will involve consideration of the safety and security challenges arising from the 9/11 attacks. The different topics on safety systems including system and industrial safety will be assessed as they were affected by the attacks.
America on September 11, 2001 required that we reform our nation’s aviation security system in fundamental ways. Three years after the Sept. 11 tragedies, how far has airport and airlines come? It depends on the source. While it is important for airports to heighten security after the attacks of 9/11, the policies of profiling passengers are inadequate and a necessitate revision.
Cyber security, also referred to as information technology security, focuses on protecting computers, networks, software programs and data from unintended or unauthorized access, change or destruction. Post 9/11 and other terrorist attacks, the United States grows its endeavors to repulse cyberattacks, U.S. corporate organizations and the government agencies wind up in strife over how to adjust to new methods of security and privacy. The current state of security measure protocols and privacy policies placed by the US government in cyberspace raises concerns for the 99%. This is due to the recent cyber-attacks on American corporate organization systems and government alike, where their digital information and network infrastructures within the systems were compromised, and personal data was hacked and stolen.
The Aviation & Transportation Security Act of 2001 was the act that created the TSA. However, the ATSA also created a conflict of interest within the TSA. Ybarra (2013) described the problem within the TSA as an, “agency that establishes transportation security policy and regulates those that provide transportation operations and infrastructure (airlines, airports, railroads, transit systems, etc.). But on the other hand, TSA itself is the operator of the largest component of airport security: passenger and baggage screening.”
Airport security is necessary for the safety and efficiency of airlines today. Attacks involving airlines have been “among the deadliest in terms of human lives and economic impact,” even though relatively few attacks have occurred using airlines compared to other terrorism methods (Szyliowicz, 2011, p.2). Airport Security has been administered using a government-operated system since the Aviation and Transportation Security Act was enacted in 2001. The Transportation Security Administration (TSA), now an agency of homeland security, replaced private security measures and personnel with at least 60,000 federal employees (Szyliowicz, 2011). However, privatization may be making a come-back. The following analysis will analyze