Aviation Security
Prior to 9/11, aircraft hijackings became a primary threat in the aviation industry that left the world feeling vulnerable and demonstrated that terrorists can weaponize an aircraft to cause destruction. Two decades have passed since the tragic events of September 11, 2001, which changed the aviation industry to continuously revolutionize their layers of security and develop strategic measures that will mitigate along with proactively address potential risk.
In recent times, the evolving threats and severity in aviation security has now developed into a new era of cybersecurity from emerging technologies and cyber-physical interdependency within the transportation's infrastructure. Needless to say, airlines have access to very sensitive information and operate a critical component of infrastructure (CnSight, 2021). A cyberattack could quickly result in serious fatalities and utter catastrophe; likewise, it can potentially destroy the trust in a single company in the aviation sector while cascading the dire effects on the entire industry.
The Government Accountability Office (GAO) reported in January 2015, that the Federal Aviation Administration (FAA) has taken steps to protect its Air Traffic Control (ATC) systems from cyber-based threats; however, significant security- control weaknesses still remains to threaten the agency’s ability to ensure the safe and uninterrupted operation of the national airspace system (GAO, 2015). The Next Generation Air Transportation System (NextGen) and the FAA faces cybersecurity challenges in at least three areas:
- Protecting ATC information systems
- Protecting aircraft avionics used to operate and guide aircraft, and
- Clarifying cybersecurity roles and responsibilities among multiple FAA offices.
- Host processing and power control
- Systems communication via fiber optic Ethernet
- Data bus input/output
A virus or malware planted in websites visited by passengers could provide an opportunity for malicious attacker to access the IP-connected onboard information and cause malfunctions to the CCS. Investigations have concluded that it is theoretically possible for a person to:
- Hijack the navigation system
- Bypass the Network firewall
- Gain access to the airplane’s network, and
- Commandeer the plane through the in-plane network
- Strengthening the effectiveness of TSA’s core capabilities in aviation security
- Identifying cyber security risks
- Reducing vulnerabilities in their systems and critical infrastructure across the transportation systems sector
- Mitigating consequences if and when incidents do occur
- Modernize transportation vetting
- Advance global transportation security standards, and
- Strengthening security and ensure the resilience of the system
The effectiveness of the TSA and the DHS was shown during a cyberattack that crippled nearly half the East Coast fuel supply in May of 2021 at the Colonial Pipeline Station. This highlighted the vulnerability of critical infrastructure to online attacks and mitigated the DHS to regulate cybersecurity in the pipeline industry for the first time (Nakashima, 2021). The attack lasted 11 days; however, if it had gone much longer, it could have affected airlines, mass transit and chemical refineries that rely on diesel fuel.
After the attack, the TSA implemented that all pipeline operators are now required to report any cyberattacks on their systems to the federal government within 12 hours and have a 24/7 on-call cybersecurity coordinator to work with in case of an attack. Companies had then reported more than 220 cybersecurity incidents within a two months timeframe of the Colonial Pipeline attack in May 2021 and have since strength the pipelines infrastructure along with advancing its security standards.
One recommendations that can further help both the TSA and the DNS from cyberattacks or black hat hackers is to start training more cyber protection specialist to fill in the jobs that are lacking within the National Security sector. Since this is a new era of cybersecurity threats, the shortfall lies from the fact that cybersecurity degrees are still relatively new within the academics of Computer Science.
The cybersecurity agenda does not just stop there. Other transportation companies and airliners should start assessing the levels of cyber protection in their operational technology (OT) and informational technology (IT) equipment as well as programs to safeguard the most vulnerable application from an attacker. For example, adopting a complex IT security model called Zero-Trust will assume that every device, user, or application attempting to interact with the network is a potential threat. This will help eliminate the possible treat of any hacker that is trying to hijack a navigation system, bypass an aircraft's firewall to access the network or to commandeer an aircraft.
Technology will always rapidly increase through the years; thus, maintaining a hands-off approach in cybersecurity will only encounter more aggressive hackers to cause destruction towards all platforms of National Security.
References:
CnSight By TDI. (2021, April 16). Top 5 Cyber Attacks in the Aviation Industry. CnSight.Io - Cybersecurity Performance Improvement. https://cnsight.io/2021/04/16/top-5-cyber-attacks-in-the-aviation-industry/
GAO. (2015, April). AIR TRAFFIC CONTROL - FAA Needs a More Comprehensive Approach to Address Cybersecurity As Agency Transitions to NextGen. https://www.gao.gov/assets/gao-15-370.pdf
Nakashima, E., & Aratani, L. (2021, May 25). DHS to issue first cybersecurity regulations for pipelines after Colonial hack. Washington Post. https://www.washingtonpost.com/business/2021/05/25/colonial-hack-pipeline-dhs-cybersecurity/
National Press Release. (2018, December 4). TSA releases Cybersecurity Roadmap | Transportation Security Administration. TSA. https://www.tsa.gov/news/press/releases/2018/12/04/tsa-releases-cybersecurity-roadmap
Comments
Post a Comment