Aviation Security (cyberterrorism)
Innovative security solutions to improve
airport's flow efficiencies and security feature more and more digital aspects
introduce new cyber risks to the airport. As cyberterrorism is becoming a growing risk to large
infrastructure organizations such as airports, these assets may become more
vulnerable than ever before. There is an increase of connectivity and
integration of screening equipment with wider airport security systems.
Once-isolated equipment is now being connected to larger airport networks. Screening
systems use more and more standard IT technologies such as operating systems.
This exposes them to external threats, such as malware and hackers, which they
were never expected to encounter. Airports are also increasingly relying on
cloud-based computing services, delivered via the internet. When using this
off-premises computing solution, airports no longer have the same level of
physical control over the security of their data and systems.
The intelligence and Joint Terrorism Task Force are the two most effective layers of U.S. Aviation Securities to combat cyberterrorism. In view of the rapid development of digitalization and the associated risks, the cyber risks should also be mitigated through close cooperation and monitoring of the third parties in the supply chain. Close collaboration between various departments and stakeholders, such as IT security teams, engineering operations and physical security operations managers is needed.
I believe in order to further mitigate cyberterrorism each airport should have a specific taskforce looking at specific cyber risks for the airport and even more specific ones with focus on a specific airport organization and a specific department. This taskforce will conduct audits and simulated cyber-attacks on random departments within the airport to better prepare and improve the performance of the department in case of an actual attack. Since each airport have a taskforce specifically focuses on cyberterrorism, the taskforces can share the data and information among other taskforces in different airports around the country to strengthen and safeguard the millions of travelers.
Word count: 318
- TSA Strategy/Transportation Security Administration
- Insider Look: TSA Layers of Security
- Extending the airport boundary: Connecting physical security and cybersecurity
Comments
Post a Comment