Aviation Security (cyberterrorism)

 


    Innovative security solutions to improve airport's flow efficiencies and security feature more and more digital aspects introduce new cyber risks to the airport. As cyberterrorism is becoming a growing risk to large infrastructure organizations such as airports, these assets may become more vulnerable than ever before. There is an increase of connectivity and integration of screening equipment with wider airport security systems. Once-isolated equipment is now being connected to larger airport networks. Screening systems use more and more standard IT technologies such as operating systems. This exposes them to external threats, such as malware and hackers, which they were never expected to encounter. Airports are also increasingly relying on cloud-based computing services, delivered via the internet. When using this off-premises computing solution, airports no longer have the same level of physical control over the security of their data and systems.

    The intelligence and Joint Terrorism Task Force are the two most effective layers of U.S. Aviation Securities to combat cyberterrorism. In view of the rapid development of digitalization and the associated risks, the cyber risks should also be mitigated through close cooperation and monitoring of the third parties in the supply chain. Close collaboration between various departments and stakeholders, such as IT security teams, engineering operations and physical security operations managers is needed. 

     I believe in order to further mitigate cyberterrorism each airport should have a specific taskforce looking at specific cyber risks for the airport and even more specific ones with focus on a specific airport organization and a specific department. This taskforce will conduct audits and simulated cyber-attacks on random departments within the airport to better prepare and improve the performance of the department in case of an actual attack. Since each airport have a taskforce specifically focuses on cyberterrorism, the taskforces can share the data and information among other taskforces in different airports around the country to strengthen and safeguard the millions of travelers. 

Word count: 318

  

References 

  • TSA Strategy/Transportation Security Administration
https://www.tsa.gov/about/strategy
  • Insider Look: TSA Layers of Security
https://www.tsa.gov/blog/2017/08/01/inside-look-tsa-layers-security
  • Extending the airport boundary: Connecting physical security and cybersecurity
https://web-s-ebscohost-com.ezproxy.libproxy.db.erau.edu/ehost/pdfviewer/pdfviewer?vid=1&sid=57a9c38c-66ae-470a-af4f-2defaf04bfc8%40redis

Comments

Popular posts from this blog

9-2 Weather Hazard (Low-Level Wind Shear)