Aviation Cyber Security: A New Security Landscape
|
|
|
- Dina Young
- 10 years ago
- Views:
Transcription
1 Aviation Cyber Security: A New Security Landscape ABSTRACT With the increasing adoption of digital technology across the aviation sector, cyber security is fast becoming a new landscape for aviation security. The aviation security community needs to adapt to this new landscape in order to formulate effective responses to the security challenges inherent to the vast network formed by complicated linkages between aviation technologies. Prominent cyber security challenges in air traffic management (ATM) technologies, airport networks, and e-enabled aircraft have arisen, and the aviation sector should embark on technical, regulatory and cooperative approaches in order to boost the cyber resilience of the aviation sector.
2 THE AUTHORS Mr Martin Siu is Manager for the Aviation Security and Emergency Preparedness Division in the Civil Aviation Authority of Singapore (CAAS). His key responsibilities involve the development and implementation of the aviation security oversight framework for the protection of Singapore s air navigation services, including the establishment of security provisions in the areas of physical security, cyber security, security response and security assurance. Mr Siu is also responsible for the conduct of aviation security oversight activities on the air navigation service provider to ensure its compliance to national civil aviation security requirements. Mr Daniel Goh is Manager for Information Communication Technology Strategy, Governance and Security in CAAS. He is responsible for the cyber security programme for aviation Critical Information Infrastructures. His task involves establishing cyber security oversight for the protection of critical cyber assets, cyber security monitoring and cyber security incident management. Mr Goh began his cyber security career with the Singapore Infocomm Technology Security Authority before joining CAAS in He maintains security certifications including (ISC)2 Certified Information Systems Security Professional and GIAC Security Essentials Certification. Ms Cheri Lim is Head (Aviation Security and Facilitation) of the Aviation Security and Emergency Preparedness Division in CAAS. Her key responsibilities include reviewing aviation security and air transport facilitation policies and working with stakeholders to facilitate implementation in accordance with international standards. She is also the secretariat to both the National Air Transport Facilitation Committee and the National Civil Aviation Security Committee. Ms Lim is an ICAO Certified Instructor and Universal Security Audit Programme Auditor. She is also an instructor for the ICAO Aviation Security Professional Management Course.
3 Martin Siu, Daniel Goh and Ms Cheri Lim Civil Aviation Authority of Singapore INTRODUCTION Over the past decade, the aviation sector has rapidly leveraged the advancement of digital technology to enhance the execution of key aviation processes such as airport baggage handling systems, flight information display systems and air traffic management information and communication technologies. Adoption of passenger self-service initiatives, upgrades to ATM technologies and wireless in-flight entertainment systems are but a few examples which exemplify how the aviation sector has become increasingly propelled into cyberspace. While there are exponential benefits to be reaped, this development has also spawned threats and black swans to information and communication systems. Past incidents involving aviation information and communication technology systems underscore the potential damage that digital technology poses to the aviation sector. In 1997, the security risk posed by increasingly networked airports was exploited when a teenager accessed the Supervisory Control and Data Acquisition (SCADA) systems at Worcester Regional Airport, Massachusetts, US and disrupted the telecommunication service to the Federal Aviation Administration (FAA) tower at Worcester airport, Worcester Airport Fire Department, weather service and air freight organisations (Stern,1998). The vulnerability of ATM to threats against communication systems was highlighted in 2009, when a truck driver carrying a Global Positioning System (GPS) jammer managed (without intent) to cause outages to Newark Liberty International Airport s GPS ground-based augmentation systems (Strunsky, 2013). Another incident highlighting how unsupervised software engineering may compromise cyber security was reported in an International Civil Aviation Organization (ICAO) working paper by the International Coordinating Council of Aerospace Industries Associations (ICAO, 2012). In June 2011, the check-in operations of a newly opened airport terminal were disrupted, and three software engineers working on the system were suspected of sabotaging the programme code. As such, it is incumbent on the aviation community to adapt to this new security landscape. This paper will discuss the issues involved in the area of aviation cyber security. The definition of cyber security in this paper is drawn from ICAO Doc 9985 (ICAO, 2014) which refers to all matters pertaining to the security of information and communication systems, technology or applications of all kinds. This includes analogue or digital devices, and encompasses radio, telecommunications, computer and network hardware and software, data storage systems Journal of Aviation Management
4 and devices, satellite systems, surveillance systems, navigation systems, as well as the various services and applications associated with them. It argues that, because managing cyber security in aviation is largely different from that of a regional approach to aviation security, new strategies are needed to respond to this new security landscape. Prominent challenges have arisen due to the vulnerabilities of ATM technologies, airport systems and networks, as well as e-enabled aircraft to cyber-attacks. To respond adequately, the aviation sector needs to adopt technical, regulatory and cooperative approaches in order to work toward and achieve cyber resilience. THE WEAKNESS OF REGIONAL APPROACHES TO SECURITY While overcoming current cyber security concerns require technical expertise, the aviation security community should address this new security landscape holistically and aim for cyber resilience, rather than merely plugging gaps in the current cyber security architecture deployed in the aviation systems. This necessitates the adoption of concepts which differ from those that govern aviation security in the physical world today. Traditionally, aviation security is largely based on differentiating physical spaces into a number of security regions. The notion of a regional approach to security is drawn from Actor-network Theory (ANT) in the discipline of geography. Based on ANT, space can be treated as being configured by various entities into three possibilities: region, network, or fluid. Regional space most conforms to classical geography and the common sense way by which we speak of space; but with the appearance of new modes of action, other notions of what space is and how it functions would arise. For an elaboration on ANT see (Law, 2002). Each region is separated by a perimeter, and can only be entered through controlled access points with various processes (e.g. security screening, recording of particulars, verification of identity or credentials, etc.) before one can be cleared to enter the particular security region. Regional approaches to security are highly dependent on the integrity of perimeters which differentiate one region from another, and the effectiveness of access control points in conforming entities attempting entrance to security requirements, both of which hinge on the solidity of the security region. Even in the physical world, the solidity of a security region is not guaranteed. Perimeters between regions can be breached due to the lack of maintenance, and the spatial solidity of regions can be undone by events such as the addition of a new wing to the airport, the reconfiguration of security screening arrangements (e.g. from decentralised to centralised screening, or vice versa), or the blurring of boundaries between security regions due to poor application of security controls. During such events, entities which do not conform to the security requirements of the region may be introduced, or access control points can be by-passed. In such situations, security agencies may be forced to revise their requirements so as to accommodate the new spatial reality temporarily or permanently, or step up measures to reinforce pre-existing boundaries. Access control points can also fail to perform their functions due to factors such as equipment 74 Journal of Aviation Management 2014
5 failure, poor organisation and oversight, or human lethargy. Moreover, the security screening regime itself may not be able to weed out dangers which were previously undetected such as insider threats, thereby necessitating the deployment of technologies such as CCTV cameras to track the movement of entities within and between the security regions. A NEW SECURITY LANDSCAPE This erosion of perimeters is an even greater problem in the realm of cyber security. To begin with, what is commonly called cyberspace is less of a space divided into regions than a network of various systems connected at different nodes. This makes a regional approach to security which divides the network into various sectors and placing security controls at the nodes increasingly untenable. The rapid addition of information and communication technologies to current ATM systems, and developments such as cloud computing and internet-of-things (IOT) concept will exponentially add to the number of nodes via which data and systems can be accessed. In addition, these connections are often created by different parties within the same organisation, with no whole-of-organisation level oversight from a security perspective. This creates difficulties for mapping out the ever-expanding network of systems into different regions and creating solid perimeters between them, allowing external parties to access critical systems and information through unsecured nodes. Challenges also abound with regards to the application of security controls on entities attempting to access aviation systems and information. Information on aircraft movement communicated by way of Very High Frequency (VHF) radio or Automatic Dependent Surveillance-broadcast (ADS-B) can be accessed with radio receivers and mobile device applications (e.g. the mobile phone application, Flightradar24) without undergoing security controls which would verify the identity of persons acquiring that information. Another example is the use of commercial off-theshelf software (COTS); such software is often deployed without proper knowledge of its source and application code, and it is difficult to verify their security features. Without knowledge of possible incompatibilities and security risks, operators may unintentionally integrate unsecured software into their networks, thereby linking an entity with cyber security risks to their critical systems and data. The permeability of security perimeters and difficulty in applying security controls to entities accessing the network of aviation technologies demonstrate that a regional approach to security is inadequate in the cyber security landscape. Cyberspace, unlike physical space, is a network of systems and at the same time much more fluid in constitution (Pieters, 2011). Aviation cyber security cannot rely solely on the concept of securing regions from unlawful access and interference, and should consider practices and models which are more suited for the security of networks instead of individual systems 1. Regional thinking about cyber security is still relevant, as seen in methods of securing systems such as infrastructural isolation, application 1 A possible area for future research in relation to cyber security is the discipline of epidemiology, which studies the causes and effects of health events and characteristics in their distributions and patterns in various populations. For the relevance of public health policy to cyber security, see (Rowe et al., 2012). Journal of Aviation Management
6 of firewalls, and de-militarised zones; but the cyber security threat only serves to remind the aviation community of the need to think out of the proverbial box in order to formulate effective responses to the security challenges inherent to the vast network formed by complicated linkages between aviation technologies. CYBER SECURITY CHALLENGES IN ATM As the array of information and communication technologies deployed across the aviation sector grows, protecting systems and information from unauthorised access, preventing tampering, and detecting attacks becomes increasingly urgent. Prominent challenges in the areas of ATM, airport networks and e-enabled aircraft have arisen, requiring aviation security regulators to take action to ensure the safety and security of passengers and customers of aviation services worldwide. In the area of ATM systems, security challenges lay in two areas. Firstly, current systems may not be fitted with the necessary information and communication security measures. A key example is the use of radio frequency in today s ATM environment. Radio is commonly used for functions such as communication between air traffic control and aircraft, navigation, and surveillance. This makes the ATM networks highly vulnerable to unauthorised transmissions through the use of VHF transceivers. While it is possible to encrypt radio transmissions, this would limit the number of available channels for communications between air traffic control and aircraft. Systems reliant on radio are also vulnerable to radio jamming, as demonstrated in October 2013 when a portable transceiver was used to jam the Unicom frequency at Central Maine Airport (Mark, 2013). Secondly, new technologies that have been incorporated into the current ATM networks may create unsecured access points through which critical information and systems can be compromised in novel ways. ADS-B technology is being increasingly adopted in ATM systems today due to its ability to provide wider coverage and improve air traffic control s situational awareness, thereby increasing air traffic capacity. However, as ADS-B ground stations rely on the 1090 MHz spectrum for the receiving of ADS-B messages from aircraft, communications between ground station and aircraft can be jammed by generating interfering signals on the 1090 MHz spectrum in the vicinity of the ground station (Purton et al., 2014). In addition, as ADS-B currently does not require authentication at the data link layer, false transmission is possible, or messages broadcast from legitimate sources can be modified by overshadowing them with a high-powered signal (Strohmeier et al., 2014). Both technical and legal approaches should be considered to ensure that the identity of the message transmitter can be authenticated, and their messages to selected recipients can be limited. In the future, as more Communication, Navigation, and Surveillance (CNS) and ATM systems become reliant on digital technology and are incorporated into the system wide information management platforms, other vulnerabilities related to increased connectivity may also surface. 76 Journal of Aviation Management 2014
7 VULNERABILITY OF SCADA-DEPENDENT SYSTEMS The interconnectedness of heterogeneous digital assets and systems in airports also pose a cyber security challenge. SCADA applications are widely deployed in airports due to their flexibility and ability to provide for monitoring, control and data acquisition functions across a wide range of systems. Baggage and freight handling, apron and runway lighting, energy supply, and ATM are just some examples of systems which depend on SCADA for their proper function. However, as SCADA applications are largely designed to be open and easily operable rather than secure, hackers need not be highly skilled to conduct attacks on its applications. As the systems which rely on SCADA are often critical for the smooth and continued function of an airport, the vulnerabilities which SCADA are prone to can be worrying from a cyber security perspective. Aside from the aforementioned attack on Worcester Airport in 1997, infrastructure dependent on SCADA, especially those in the energy sector, have also suffered coordinated cyber-attacks. As such, an airport cyber security programme must include measures to guard SCADA systems from being exploited to paralyse key airport operations. RISKS TO E-ENABLED AIRCRAFT Lastly, the creation of new e-enabled aircraft such as the Airbus 380 (A380) and A350, the Boeing 787 and upcoming 777X have also introduced cyber vulnerabilities to air travel. Aircraft systems are now increasingly linked to the systems of airports, airlines, and the operation centres of original equipment manufacturers through networks such as Health and Usage Monitoring Systems and class 3 Electronic Flight Bags, as important information for safety monitoring and flight operations is transmitted through these networks. Airlines need to step up on ensuring that their systems are not compromised unnecessarily by poor cyber hygiene habits which could introduce malware or other more malicious agents to these systems, causing them to malfunction. On board, the deployment of Avionics Full-Duplex Switched Ethernet protocols linking the flight deck to aircraft systems and the introduction of wireless passenger services also create potential cyber vulnerabilities which may not be immediately apparent and covered by regulations 2. As the IOT concept becomes increasingly applied to aircraft design and maintenance or repair functions (as seen in General Electric s development of GEnx Engine) (Lampitt, 2013), more on-board connections between systems will be forged. Scrutiny of these connections needs to be increased from both airworthiness and security perspectives in order to prevent the creation of further vulnerabilities. ADOPTING CURRENT STANDARDS AND BEST PRACTICES In view of the abovementioned cyber threats, the aviation community needs to adopt a holistic approach to reduce the risks inherent in this new security landscape. Securing the nebulous 2 For a case in which concerns Boeing s 777X aircraft, see (Accessed 26 May 2014). Journal of Aviation Management
8 and fluid network of technologies will require the widespread adoption of appropriate standards and best practices by all stakeholders, a regulatory approach which focuses on attaining cyber resilience, and cooperation between government and industry. Currently, cyber security standards and best practices are already available. The ISO/IEC 27002: 2013 standard, published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), provide best practices for information security which stakeholders in the aviation sector should readily adopt (ISO/IEC, 2013). The ISO/IEC (2014) standard, which concerns supply chain security and is currently under development, should also be taken into account as organisations rapidly expand their information and communication technology networks by outsourcing projects to IT solution providers. Practices such as the identification of critical systems and information, penetration testing and the development of organisation-wide cyber security culture should be widely adopted and considered baseline standards in the aviation sector. Appropriate authorities for aviation security, airport and aircraft operators can also refer to the guidance material provided by the ICAO on mitigating cyber threats. Chapter 18 of Document 8973 (ICAO, 2011) elaborates on basic measures which organisations should take to mitigate cyber threats to critical aviation information and communication technology systems. Contracting States and air navigation service providers (ANSPs) should also take note of the need to comply with Standard 3.5 of Annex 17 (ICAO, 2013a), which states that Each Contracting State shall require air traffic service providers operating in that State to establish and implement appropriate security provisions to meet the requirements of the national civil aviation security programme of that State. The ICAO s Document 9985 (ICAO, 2013b) provides guidance on the development of adequate requirements and measures for the protection of air navigation services from both physical and cyber-attacks. ESTABLISHING REGULATORY FRAMEWORKS Governments can play a key role in providing a robust cyber security regulatory framework for the aviation sector by identifying critical systems and infrastructure in both private and public entities. This is crucial, as aviation systems and infrastructures are often connected, and securing such vast networks requires coordination between the multiple agencies and private organisations which own these systems. The principle of risk management needs to be applied to differentiate between crucial and non-crucial systems, allowing regulators to guide regulated entities in identifying the most critical systems to secure. Subsequently, threat analysis should be conducted to determine how current aviation information and technology networks may be exploited to threaten critical systems and infrastructure, as well as what impacts the exploitation of non-crucial systems may pose to aviation information and communication technology systems as a whole. 78 Journal of Aviation Management 2014
9 Secondly, governments can establish appropriate legislation to tackle threats which impact the aviation sector as a whole. In particular, state agencies should seek to control or license the sale or purchase of equipment which may pose a threat to communications systems such as GNSS jammers, radio transceivers, ADS-B receivers and transmitters. This would reduce the circulation of equipment which may be used to exploit current vulnerabilities in CNS/ ATM equipment. Legislation may also be required to address the protection of personal data. Organisations handling passenger information should abide by appropriate data protection standards to protect the privacy of their customers. Doing so would ensure that the suite of personalised digital services increasingly being offered by the aviation industry is safe and secure for customer use. Thirdly, the aviation cyber security regulatory framework should include a robust and legally empowered oversight programme to promote cyber resilience, whereby regulated entities are ready to respond to threats which can or cannot be predicted. This is important, as current technical cyber security measures are largely designed to repel only known attacks, while cyberthreat vectors are in reality much more numerous and unpredictable than the physical world due to the nature of its digital networks. To achieve this, the oversight programme should audit for and encourage regulated entities to put in place policies mandating the necessary technical measures to protect, prevent, and detect cyber security incidents. Documentation of these policies and measures should be made available throughout the organisation, regularly reviewed to ensure that they are updated to protect against the latest threats, and cover newly installed system and technology. The regulated entity should establish proper cyber incident management processes, including the provision of redundancies and cyber forensics analysis, which are tested regularly for their effectiveness in responding to cyber crises. Training of staff should be made mandatory to promote an effective cyber security culture, and internal quality control activities should be conducted to assess the efficacy of the abovementioned efforts. In particular, manufacturers of aviation technology software and hardware should be required, as in the case of the FAA s application of special actions to Boeing s 777 aircraft, to put in place necessary measures to ensure that no further serious vulnerabilities are introduced to existing networks. In the area of ATM cyber security, Eurocontrol has released a comprehensive Manual for National Air Traffic Management Security Oversight (Eurocontrol, 2012); aviation security regulators may find it useful in their own establishment and implementation of oversight programmes. ANSPs may wish to consult the Cyber Security and Risk Assessment Guide produced by the Civil Air Navigation Services Organisation (CANSO), which provides guidance as to how ANSPs may take a first step toward understanding the risks which their assets face, so as to better evaluate the readiness of their organisations for responding to cyber threats, as well as which security controls they may wish to give priority of implementation to (CANSO, 2014). Journal of Aviation Management
10 WORKING TOGETHER TO ENHANCE CYBER SECURITY Even though regulation is necessary, aviation cyber security should be viewed as a collaborative effort between national agencies, private entities and international organisations, instead of merely as a top down regulatory exercise. As discussed in the first section of this paper, while the regional approach to aviation security focused on the hardening of and differentiation between security regions, aviation cyber security would require new strategies which emphasise on communication and collaboration between stakeholders. Similar to approaches taken in public health management, aviation cyber security regulators, the aviation industry, and international aviation organisations such as ICAO and IATA can work together to determine the responsibilities of various stakeholders. Platforms for the sharing of information on cyber security vulnerabilities and joint development of standards and measures which protect the aviation information and communication technology network from known threats should be created to best leverage the strengths, capabilities, and experiences of the various stakeholders. A notable example is The Boeing Company s cooperation with the US National Institute of Standards and Technology s request for information on improving critical infrastructure framework, which yielded extensive information on current risk management practices, best practices and standards, as well as industry specific practices relevant to the aviation sector. Both public and private entities in the aviation sector should also take note of cyber security developments in other industrial sectors to assess whether the aviation sector is also subject to similar vulnerabilities. In addition, aviation cyber security regulators and major aviation industry players can cooperate to promote good cyber security practices to the wider aviation community. These include encryption of transferred personal data and security assurance for COTs, as well as discouraging practices which introduce cyber risks to aviation software, hardware and systems. CONCLUSION The novelty of cyber security challenges to the aviation sector may seem perplexing and daunting, especially to those who do not possess an information security or ATM background. However, cyber resilience is not achieved merely with technical expertise, but through a combination of regulatory and cooperative approaches. In these two areas, aviation security has made much progress in the past decade. In facing up to the new cyber security threats, the aviation security community may need to acquire a new body of technical knowledge. More importantly, it must acquire the ability to grasp the contours of the very different security landscape which information and communication systems and technologies brought about, and formulate effective approaches to achieve cyber resilience. 80 Journal of Aviation Management 2014
11 References CANSO. (2014) CANSO Cyber Security and Risk Assessment Guide. The Netherlands. Civil Air Navigation Services Organisation. EUROCONTROL. (2012). Manual for National Air Traffic Management Security Oversight (1st Edn). Brussels. European Organisation for the Safety of Air Navigation. ICAO. (2011). Document 8973 (Restricted) Aviation Security Manual (8th Edn). Montreal. International Civil Aviation Organization. ICAO. (2012). Working Paper: AN-Conf/12-WP/122 Cyber Security for Civil Aviation, Montreal. International Civil Aviation Organization. ICAO. (2013a). Annex 17 to the Convention on International Civil Aviation Security (9th Edn). Montreal. International Civil Aviation Organization. ICAO. (2013b). Document 9985 Air Traffic Management Security Manual (1st Edn). Montreal. International Civil Aviation Organization. ISO/IEC. (2013). ISO/IEC Switzerland. The International Organization for Standardization and the International Electrotechnical Commission. ISO/IEC. (2014). ISO/IEC Switzerland. The International Organization for Standardization and the International Electrotechnical Commission. Lampitt, A. (2013). General Electric lays out big plans for big data. InforWorld. com/d/big-data/general-electric-lays-out-big-plans-big-data (Accessed 5 June 2014). Law, J. (2002). Objects and Spaces, Theory, Culture and Society, 19, pp Mark, R.P. (2013). Radio Jamming at Maine Airport Continues. ainsafety/ /radio-jamming-maine-airport-continues (Accessed 5 June 2014). Pieters, W. (2011). Representing Humans in System Security Models: An Actor-Network Approach, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2, (1), pp Purton, L., Abbass, H., Alam, S. (2010). Identication of ADS-B System Vulnerabilities and Threats. Australasian Transport Research Forum Proceedings 2010, pg 8, (Accessed 14 October 2014). Rowe, B., Hapern, M. and Letnz, T. (2012). Is a Public Health Framework the Cure for Cyber Security? CrossTalk: The Journal for Software Defense Engineering, 25, (6), pp Stern, D. (1998). Teen hacker faces federal charges. juvenile.hacker/ (Accessed 5 June 2014). Strohmeier, M., Lenders, V. and Martinovic, I. (2014) On the Security of the Automatic Dependent Surveillance-Broadcast Protocol, arxiv: v2 [cs.cr], pg 5, (Accessed 20 May 2014). Strunsky, S. (2013). N.J. man fined $32K for illegal GPS device that disrupted Newark airport system. system.html (Accessed 5 June 2014). Journal of Aviation Management
12
Emerging Threats from Cyber Security in Aviation Challenges and Mitigations
Emerging Threats from Cyber Security in Aviation Challenges and Mitigations ABSTRACT Security threats to civil aviation operations have become more sophisticated and challenging to deal with. One that
Introduction. The Bricks and Bytes of Our Aviation Infrastructure
Civil Aviation Infrastructure: Protecting A System-of-Systems Brian M. Legan, Vice President Christopher Kelly, Senior Vice President Booz Allen Hamilton, Inc. Introduction Homeland Security Presidential
Civil Aviation and CyberSecurity Dr. Daniel P. Johnson Honeywell Aerospace Advanced Technology
Civil Aviation and CyberSecurity Dr. Daniel P. Johnson Honeywell Aerospace Advanced Technology Outline Scope Civil aviation regulation History Cybersecurity threats Cybersecurity controls and technology
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
Security Management Systems (SEMS) for Air Transport Operators. Executive Summary
Security Management Systems (SEMS) for Air Transport Operators Executive Summary March 2011 Security Management Systems (SeMS) for Air Transport Operators Introduction and Scope Executive Summary In early
Understanding Compliance with Automatic Dependent Surveillance Broadcast (ADS-B) Out
Understanding Compliance with Automatic Dependent Surveillance Broadcast (ADS-B) Out White Paper Doc No.: WHTP-2013-14-05 Revised, October 2014 Safely guiding pilots and their passengers worldwide for
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
Chicago Center Fire Contingency Planning and Security Review
Chicago Center Fire Contingency Planning and Security Review Background In the early morning hours of September 26, 2014, the Federal Aviation Administration s (FAA) Chicago Air Route Traffic Control Center
Aircraft Tracking & Flight Data Recovery
Airframer view Presented by: Claude Pichavant Aircraft Tracking & Flight Data Recovery Aircraft Tracking & Flight Data Recovery Airbus has contributed to the Aircraft Tracking Task Force (ATTF), to the
Emirates Airline. Cargo Security The EK Experience
Emirates Airline Cargo Security The EK Experience The aim of Aviation Security The aim of aviation security is to safeguard passengers, crew, ground personnel and the general public from acts of unlawful
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.
Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues
The Connectivity Challenge: Protecting Critical Assets in a Networked World. A Framework for Aviation Cybersecurity. An AIAA Decision Paper
The Connectivity Challenge: Protecting Critical Assets in a Networked World A Framework for Aviation Cybersecurity An AIAA Decision Paper August 2013 America must also face the rapidly growing threat
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
airsight Company Profile
airsight Company Profile Company Consulting Training Software Consulting Innovative consulting services based on in-depth knowledge for various aviation aspects Training Expert know-how on aviationspecific
The 7 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 15 th 2012
The 7 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 15 th 2012 COMMUNICATION ISSUES OF UAV 1 INTEGRATION INTO NON 1 st. Lt. Gábor Pongrácz, ATM
DRAFT. Date: DRAFT Initiated by: AFS-300
DRAFT U.S. Department of Transportation Federal Aviation Administration Advisory Circular Subject: Airworthiness and Operational Approval of Aircraft Network Security Program (ANSP) Date: DRAFT Initiated
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Security for NG9-1-1 SYSTEMS
The Next Generation of Security for NG9-1-1 SYSTEMS The Challenge of Securing Public Safety Agencies A white paper from L.R. Kimball JANUARY 2010 866.375.6812 www.lrkimball.com/cybersecurity L.R. Kimball
A Systems Approach to Protecting the U.S. Air Traffic Control System Against Cyber-Terrorism
A Systems Approach to Protecting the U.S. Air Traffic Control System Against Cyber-Terrorism Arthur Pyster Deputy Assistant Administrator for Information Services and Deputy Chief Information Officer [email protected]
The evolution of data connectivity
Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
SESAR Air Traffic Management Modernization. Honeywell Aerospace Advanced Technology June 2014
SESAR Air Traffic Management Modernization Honeywell Aerospace Advanced Technology June 2014 Honeywell in NextGen and SESAR Honeywell active in multiple FAA NextGen projects ADS-B Surface Indicating and
Airports and their SCADA Systems. Dr Leigh Armistead, CISSP. Peregrine Technical Solutions
Airports and their SCADA Systems Dr Leigh Armistead, CISSP Peregrine Technical Solutions What We May Face For an attack to be successful it only has to cause disruption not loss of life to a significant
SYSTEM GLOBAL NAVIGATION SATELLITE SYSTEM LANDING TECHNOLOGY/PRODUCT DEVELOPMENT
GLOBAL NAVIGATION SATELLITE SYSTEM LANDING SYSTEM The aviation industry is developing a new positioning and landing system based on the Global Navigation Satellite System (GNSS). The GNSS landing system
Intelligent. Buildings: Understanding and managing the security risks
Version 2 IET Sector Insights Intelligent Buildings: Understanding and managing the security risks More efficient and cost-effective use of the built environment is increasingly being driven by economic
ISO 27001: Information Security and the Road to Certification
ISO 27001: Information Security and the Road to Certification White paper Abstract An information security management system (ISMS) is an essential part of an organization s defense against cyberattacks
VENDOR MANAGEMENT. General Overview
VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor
Cisco SAFE: A Security Reference Architecture
Cisco SAFE: A Security Reference Architecture The Changing Network and Security Landscape The past several years have seen tremendous changes in the network, both in the kinds of devices being deployed
ENSURING SECURITY IN AND FACILITATING INTERNATIONAL TRADE. Measures toward enhancing maritime cybersecurity. Submitted by Canada SUMMARY
E FACILITATION COMMITTEE 39th session Agenda item 7 FAL 39/7 10 July 2014 Original: ENGLISH ENSURING SECURITY IN AND FACILITATING INTERNATIONAL TRADE Measures toward enhancing maritime cybersecurity Submitted
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs EXECUTIVE SUMMARY Supervisory Control and Data Acquisition (SCADA) systems are used for remote
PLANNIN WORKING PAPER. International. Theme 1: WORK. (Presented by SUMMARY. in this paper. feasibility of. system in the future.
International Civil Aviation Organization HLSC/15-WP/3 21/11/14 WORKING PAPER SECOND HIGH-LEV VEL SAFETY CONFERENCE 2015 (HLSC 2015) PLANNIN G FOR GLOBAL AVIATION SAFETY IMPROVEMENT Montréal, 2 to 5 February
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
The data can be transmitted through a variety of different communications platforms such as:
COMMUNICATION NETWORK General Overview of SCADA Communications Without a properly designed communication network system, a SCADA system cannot exist. All supervisory control and data acquisition aspects
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Federal Aviation Administration
Federal Aviation Administration Current Contract Security Capabilities Prepared by: FAA Telecommunications Infrastructure (FTI)-2 Program Office, AJM-3170 Date: October 5, 2015 1 Table of Contents 1.0
Opinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005
AUDITOR GENERAL S REPORT Protection of Critical Infrastructure Control Systems Report 5 August 2005 Serving the Public Interest Serving the Public Interest THE SPEAKER LEGISLATIVE ASSEMBLY THE PRESIDENT
Cybersecurity on a Global Scale
Cybersecurity on a Global Scale Time-tested Leadership A global leader for more than a century with customers in 80 nations supported by offices in 19 countries worldwide, Raytheon recognizes that shared
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment By Jerome Farquharson, Critical Infrastructure and Compliance Practice Manager, and Alexandra Wiesehan, Cyber Security Analyst,
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems
Page 1 of 5 Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems In July the Payment Card Industry Security Standards Council (PCI SSC) published
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
Electronic Payment Schemes Guidelines
BANK OF TANZANIA Electronic Payment Schemes Guidelines Bank of Tanzania May 2007 Bank of Tanzania- Electronic Payment Schemes and Products Guidleness page 1 Bank of Tanzania, 10 Mirambo Street, Dar es
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
White Paper. April 2006. Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks
White Paper April 2006 Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks According to a recent Harris Interactive survey, the country s leading business executives consider
PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM
Overlook Systems Technologies, Inc. 1950 Old Gallows Road, Suite 400 Vienna, VA 22182 (703)-893-1411 PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM A PROPOSED SOLUTION TO ADDRESS RISK TO U.S. CRITICAL INFRASTRUCTURE
CYBER SECURITY IN CIVIL AVIATION
CYBER SECURITY IN CIVIL AVIATION August 2012 This is version 1 of this report, describing the situation as of August 2012, and the intention is to update it periodically as the situation changes. We welcome
INTRUSION PREVENTION SYSTEMS: FIVE BENEFITS OF SECUREDATA S MANAGED SERVICE APPROACH
INTRUSION PREVENTION SYSTEMS: FIVE BENEFITS OF SECUREDATA S MANAGED SERVICE APPROACH INTRODUCTION: WHO S IN YOUR NETWORK? The days when cyber security could focus on protecting your organisation s perimeter
How small and medium-sized enterprises can formulate an information security management system
How small and medium-sized enterprises can formulate an information security management system Royal Holloway Information Security Thesis Series Information security for SMEs Vadim Gordas, MSc (RHUL) and
Cyber Security Risk Management
Our Ref.: B1/15C B9/29C 15 September 2015 The Chief Executive All Authorized Institutions Dear Sir/Madam, Cyber Security Risk Management I am writing to draw your attention to the growing importance of
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
developing your potential Cyber Security Training
developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company
Integration of QMS, SMS,
Integration of QMS, SMS, WMO/QM Task Team, 4th Meeting 20.-22. January 2015 / Gerold Fletzer DIESER TEXT DIENT DER NAVIGATION Since last meeting the world has changed: 2015 we are facing ISO 9001:2015
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information
Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the
Testimony Statement for the Record Martin Casado, Senior Vice President Networking and Security Business Unit VMware, Inc. Before the U.S. House of Representatives Committee on Science, Space, and Technology
IN FLIGHT SECURITY INCIDENT MANAGEMENT
1. Introduction IN FLIGHT SECURITY INCIDENT MANAGEMENT The tragic events on 9/11 drastically changed the way in-flight security incidents are managed. That day, the world witnessed an unprecedented dimension
Developing National Frameworks & Engaging the Private Sector
www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
White paper. The Big Data Security Gap: Protecting the Hadoop Cluster
The Big Data Security Gap: Protecting the Hadoop Cluster Introduction While the open source framework has enabled the footprint of Hadoop to logically expand, enterprise organizations face deployment and
¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India
CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing
Our Commitment to Information Security
Our Commitment to Information Security What is HIPPA? Health Insurance Portability and Accountability Act 1996 The HIPAA Privacy regulations require health care providers and organizations, as well as
MSRC Best Practices. Communications Infrastructure Security, Access & Restoration Working Group
MSRC Best Practices MEDIA SECURITY AND RELIABILITY COUNCIL Adopted Best Practices Recommendations Communications Infrastructure Security, Access & Restoration Working Group National Recommendations Prevention
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
ISACA rudens konference
ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial
Technology Risk Management
1 Monetary Authority of Singapore Technology Risk Guidelines & Notices New Requirements for Financial Services Industry Mark Ames Director, Seminar Program ISACA Singapore 2 MAS Supervisory Framework Impact
Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com
Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests
Safety Oversight Audit Section
Safety Oversight Audit Section Regional Seminar on the Preparation, Conduct and Reporting of an ICAO Safety Oversight Audit Beijing, China, 12 to 15 December 2006 Introduction to the Audit Protocols Module
DeltaV System Cyber-Security
January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Cyber-hijacking Airplanes:
Cyber-hijacking Airplanes: Truth or Fiction? Dr. Phil of Bloomsburg University @ppolstra http://philpolstra.com Captain Polly of University of @CaptPolly Why This Talk? Lots of bold claims concerning
Unit title: Cyber Security Fundamentals (SCQF level 4)
National Unit specification General information Unit code: H9T5 44 Superclass: CC Publication date: October 2015 Source: Scottish Qualifications Authority Version: 01 Unit purpose The purpose of this Unit
The Education Fellowship Finance Centralisation IT Security Strategy
The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
Announcement of a new IAEA Co-ordinated Research Programme (CRP)
Announcement of a new IAEA Co-ordinated Research Programme (CRP) 1. Title of Co-ordinated Research Programme Design and engineering aspects of the robustness of digital instrumentation and control (I&C)
