Cyber Security At Schiphol Airport Is Ineffective

A cyber security audit  carried out by Dutch Border Police at Amsterdam Schiphol Airport says that the border controls in operation there are neither adequate nor future-proof.

In particular, the IT systems are subjected to very few security tests and the software for two of these IT systems is currently being used despite not having passed the requisite approval procedures. 

Handling almost 80 million passengers every year, Amsterdam Schiphol Airport is not merely the country’s main airport, it is also a vital gateway to Europe and the European Union (EU), and Europe’s second biggest transport hub. 

The systems are not linked to the detection capacity of the Dutch Ministry of Defence and passengers are only checked at the passport desk and via electronic self-service gates, although travellers from outside the Schengen area are also screened with pre-assessment before arrival.

The importance of IT in border control is huge, and growing and digitisation makes it faster and more thorough, but at the same time, it creates dependence and new risks.

The passport counter, electronic self-service gates and the pre-assessment stage each have their own separate IT systems and the audit suggests that the cyber security of border controls operated by Dutch border guards at Amsterdam Schiphol Airport is not as effective in practice as it could be. For the purpose of safeguarding the cyber security of border controls, the Minister of Justice and Security makes use of the expertise and IT infrastructure of the Ministry of Defence and Schiphol NV. 

Although the Dutch Ministry of Defence possesses the expertise needed to guarantee a high level of cyber security, it seems that itdoes not always make use of this expertise in practice in accordance with the arrangements madein its own guidelines. 

In the light of all the impending technological developments, it is believed that the current level of cyber security in relation to the border controls is neither adequate nor future-proof. Due to the importance of Amsterdam Schiphol Airport and the huge volume of personal data involved, the border controls could well form an attractive target for hackers.

RekenKamer:         Computer Weekly:         Airbus:    

You Might Also Read:

Air Travel Needs Stronger Cyber Security:

 

 

« Coronavirus Track & Trace Apps On A Deadline
Cyber Attacks Knock 7.2% Off The Average Company Share Price »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Securosis

Securosis

Securosis is an information security research and advisory firm dedicated to improving the practice of information security.

Green Hills Software

Green Hills Software

Green Hills Software is the largest independent vendor of embedded secure software solutions for applications including the Internet of Things.

Logscape

Logscape

Logscape provides a big data analytical tool for log file analysis and operational analytics.

Deep Instinct

Deep Instinct

Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices.

High Sec Labs (HSL)

High Sec Labs (HSL)

High Sec Labs develops high-quality, cyber-defense solutions in the field of network and peripheral isolation.

vdiscovery

vdiscovery

vdiscovery is a provider of proprietary and best-in-breed solutions in computer forensics, document review, and electronic discovery.

Arm

Arm

Arm technology is building the future of computing. We architect, develop, and license high-performance, low-cost, and energy-efficient IP solutions for CPUs, GPUs, NPUs and interconnect technologies.

M2SYS

M2SYS

M2SYS is a worldwide leader in identification and authentication solutions.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

IEEE Cyber Science and Technology Congress (CyberSciTech)

IEEE Cyber Science and Technology Congress (CyberSciTech)

CyberSciTech provides a platform for scientists, researchers, and engineers to share their latest ideas and advances in the broad scope of cyber-related science, technology, and application topics.

Grip Security

Grip Security

Grip Security provides comprehensive visibility, governance and data security to help enterprises effortlessly secure a burgeoning and chaotic SaaS ecosystem.

Plex IT

Plex IT

Plex IT provides managed IT services to organisations along with managed security services.

Proximus Ada

Proximus Ada

Proximus Ada is the first Belgian center of excellence combining artificial intelligence and cybersecurity.

Helix Security Services

Helix Security Services

Helix Security provides IT & information security consultancy to government and businesses across New Zealand.

MLSecOps Community

MLSecOps Community

The MLSecOps Community is a collaborative space for machine learning security experts and industry leaders to connect and shape the future of AI/ML security.

CyberCure

CyberCure

CyberCure provide specialised roles and services to manage your organisations cybersecurity requirements and professional advisory services in governance, risk and compliance.