One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 1890544
Date de publication 2020-08-31 11:00:00 (vue: 2020-08-31 12:05:37)
Titre Aviation cybersecurity: Hurdles of staying secure on the ground and at 36,000 feet
Texte This blog was written by an independent guest blogger. picture of a plane Image Source: Pexels Digitization has made its way into every industry. With this shift comes many benefits as well as the risk of a cyber attack. This is especially true in aviation. No matter how securely companies can build networks to ward off cyber attacks, the risk is never absent. With planes operating thousands of feet off the ground — often full of commercial passengers — a digital attack can potentially cost lives as well as millions in damages. To mitigate these risks, aviation companies operate strict cybersecurity processes. Even still, there are hurdles to cybersecurity both on the ground and in the air that airlines are working to address as the future slips into increasingly digital territory. Here, we’ll explore these threats and the means with which progress is being made in aviation cybersecurity. Cybersecurity Hurdles on the Ground The safety of any flight starts on the ground. While an airplane sits on the tarmac of an airport, data and digital processes are at-risk within the terminal. One of the primary methods that cybercriminals may go about an attack on an airline is through the use of ransomware. Ransomware works by holding a computer system hostage until a ransom is paid to the criminal. It is a frequent method of attack on large organizations, comprising the biggest threat to security in the modern world. In the case of Albany County Airport in New York, a cybercriminal seized airport information through encrypting files on the maintenance server until a ransom was paid. While this particular instance reportedly did not result in stolen traveler data, it demonstrated how at-risk airport information is. With travelers utilizing wireless devices all the time — along with the connected tech on the plane — ransomware and other malware attacks are more than just a financial concern. Cybersecurity Hurdles in the Air In the air, planes are at risk of cyberattacks through a variety of channels. Connected devices and smart tools utilizing the Internet of Things (IoT) give access points for potential criminals. Drone use and hacking impact safety. Additionally, the means with which airplanes are managed and tracked leave them open to interference. Wireless Devices and IoT The Internet of Things is what allows for smart devices to communicate with a broader network for data tracking and digital access. Everything from in-flight entertainment systems to devices that track needed repairs and fuel efficiency operates within an IoT network. At every access point, data and operations are at risk for hacker interference and attack, potentially creating safety issues on-flight in addition to the financial damages that can occur from stolen data. Drone Use Drones present a risk to aviation cybersecurity in a variety of ways. With the ability of a drone to spy on procedures and systems through the same IoT in-flight systems as well as with cameras, the use of drones presents a rising threat to aviation cybersecurity. Since their remote-controlled, network-based structures leave them open to attack, aircraft have to take the risk of drones exc
Envoyé Oui
Condensat 000 360 500 ability about absent access across addition additionally address ads air aircraft aircraft’s airline airlines airplane airplanes airport airwaves albany all allow allows along also another any anyone approach are assistance attack attacks authentication automatic available avenue aviation based being benefits better biggest block blog blogger both broadcast broadening broader build built but call cameras can capabilities case channels combat combatting comes commercial communicate communications companies complexity compounded comprehensive comprising compromise compromises computer concern conjunction connected connectivity controlled cost could county covid create creating criminal criminals cyber cyberattacks cybercriminal cybercriminals cybersecurity cybersecurity: damages data demonstrated dependent detection developing device devices did digital digitization drone drones efficiency efficient encrypting encryption endpoint entertainment entrepreneur especially even every everything exceedingly exist explore explored face faces fact feet field files financial finding flight flights frequent from fuel full functioning future give global ground guest hacker hacking has have here holding hopeful host hostage hour how hurdles image impact implementation improperly improvement increased increasingly independent individual industry industry: inform information innovated innovation instance insurmountable integrated interference internet intrusion iot issues its just know large last leave letting liable little live lives location luckily made maintenance make malware manage managed managing many matter may means messaging method methods miles millions mind mitigate modern more must navigation necessary needed network networks never new noise not occur off often onboard one open operate operates operating operations organizations other others paid particular passengers per pexels plane planes point points posed position post potential potentially prepare present presents primary private problem problems procedures processes professionals progress prominent puts ransom ransomware reduction remote repairs reportedly resources result rising risk risks safety same satellite scans secure securely security seem seized separately seriously server shift since sits six slips smart software solutions source source: spy starts statistical staying steal stolen stop stopping strategies strict structured structures such surveillance suspicious system systems take talent tamper tampering tarmac teams tech technology terminal territory than them then these thing things thirty those thousand thousands threat threats through time tools track tracked tracking training traveler travelers traveling true until use used utilized utilizing valuable variety vital vulnerable wants ward way ways we’ll well what where which wireless within work workaround working works world written york
Tags Ransomware Malware Threat
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: