Cyber Security At Schiphol Airport Is Ineffective

A cyber security audit  carried out by Dutch Border Police at Amsterdam Schiphol Airport says that the border controls in operation there are neither adequate nor future-proof.

In particular, the IT systems are subjected to very few security tests and the software for two of these IT systems is currently being used despite not having passed the requisite approval procedures. 

Handling almost 80 million passengers every year, Amsterdam Schiphol Airport is not merely the country’s main airport, it is also a vital gateway to Europe and the European Union (EU), and Europe’s second biggest transport hub. 

The systems are not linked to the detection capacity of the Dutch Ministry of Defence and passengers are only checked at the passport desk and via electronic self-service gates, although travellers from outside the Schengen area are also screened with pre-assessment before arrival.

The importance of IT in border control is huge, and growing and digitisation makes it faster and more thorough, but at the same time, it creates dependence and new risks.

The passport counter, electronic self-service gates and the pre-assessment stage each have their own separate IT systems and the audit suggests that the cyber security of border controls operated by Dutch border guards at Amsterdam Schiphol Airport is not as effective in practice as it could be. For the purpose of safeguarding the cyber security of border controls, the Minister of Justice and Security makes use of the expertise and IT infrastructure of the Ministry of Defence and Schiphol NV. 

Although the Dutch Ministry of Defence possesses the expertise needed to guarantee a high level of cyber security, it seems that itdoes not always make use of this expertise in practice in accordance with the arrangements madein its own guidelines. 

In the light of all the impending technological developments, it is believed that the current level of cyber security in relation to the border controls is neither adequate nor future-proof. Due to the importance of Amsterdam Schiphol Airport and the huge volume of personal data involved, the border controls could well form an attractive target for hackers.

RekenKamer:         Computer Weekly:         Airbus:    

You Might Also Read:

Air Travel Needs Stronger Cyber Security:

 

 

« Coronavirus Track & Trace Apps On A Deadline
Cyber Attacks Knock 7.2% Off The Average Company Share Price »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Identity Theft Resource Center (ITRC)

Identity Theft Resource Center (ITRC)

ITRC is a non-profit organization established to empower and guide consumers, victims, business and government to minimize risk and mitigate the impact of identity compromise and crime.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

SIGA

SIGA

SIGA provides cyber security solutions for Industrial Control Systems SCADA systems used in critical infrastructures and industrial processes.

Stealthbits Technologies

Stealthbits Technologies

Stealthbits Technologies is a cybersecurity software company focused on protecting an organization's sensitive data and the credentials attackers use to steal that data.

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID) is the first platform in Indonesia to collect and validate reports from hackers (referred to as Bug Hunter) regarding vulnerabilities that exist in an organization.

CyberCX

CyberCX

CyberCX provides services from strategic consulting, security testing and training to world-class managed services and engineering solutions.

Depth Security

Depth Security

Depth Security assessment services provide organizations with real-world visibility into threats facing their infrastructure and applications.

cleverDome

cleverDome

cleverDome has created the first community built and proven model that redefines the standards for protecting the most confidential data and information of consumers in the cloud.

East Midlands Cyber Resilience Centre (EMCRC)

East Midlands Cyber Resilience Centre (EMCRC)

The East Midlands Cyber Resilience Centre is set up to support and help protect businesses across the region against cyber crime.

N-able

N-able

N-Able deliver simple and sophisticated monitoring, security, and business solutions that empower you to solve your toughest IT challenges.

SecureStream Technologies

SecureStream Technologies

SecureStream Technologies have built the IoT SafetyNet - the Network Security Analytics platform to Eliminate Security Threats, Guarantee Privacy, Ensure Compliance, Simply & Easily.

Imprivata

Imprivata

Imprivata is the digital identity company for life- and mission-critical industries, redefining how organizations solve complex workflow, security, and compliance challenges.

Rezonate

Rezonate

Rezonate discovers, profiles, and protects Identities and their entire access journey to cloud infrastructure and critical SaaS applications. Preventing and stopping cyberattacks.

Rampart AI

Rampart AI

Tackling DevSecOps Issues In Application Security. Rampart has revolutionized the shift left security approach, applying zero-trust to application development.

42Crunch

42Crunch

42Crunch provides API security testing and threat protection. We proactively test, fix and protect your APIs from development to runtime.

Hack-X Security

Hack-X Security

Hack-X Security provide IT risk assessment and Digital Security Services. We are a trusted standard for businesses that must protect their data from cyber-attacks.