Cyber Threats to Civilian Flights

1204airplane.jpg?w=620

Darkening clouds hang over aviation from emerging cyber vulnerabilities.

Many people are afraid to fly. Most of them fear than the plane will suffer a malfunction they have no control over midflight, as they’re sitting on it. 

In the past, the main concern was from a technical malfunction or terrorist hijacking, but one the main threats to commercial aerial transportation today is cyber attack. In the past cyber threats weren’t so substantial when it came to airplanes, as the field was fairly digital. 

Computers have only infiltrated planes in the 1970s, after the U.S. has developed the first stealth aircraft. About twenty years later, in the 1990s, computer became more and more present even in passenger planes and today the role of the computer is so central that it’s possible to say that the pilot is running the computer as the computer is running the plane. The computer controls all of the plane’s core systems in charge of its flight capabilities. Therefore, it only makes sense that the fear of cyber attack by hostile elements is keeping a lot of people very busy.
So what are the cyber dangers is today’s civilian airplane facing? David Stupples from City University in London claims that breaking in the airplane’s computer systems by the wireless Internet on deck is not possible and that the only way to get into the computer system is by injecting it with malware. 

However, even this is very hard to do since it means that one the plane’s computer programmers has done it intentionally and that’s highly unlikely since one would think that inspections and background checks are being done to prevent the wrong people from working in such important positions. 

Another way is taking over the plane after successfully integrating the malware in computers on the plane itself, but this also demands very high abilities and a high level of sophistication from the attacker. Stupples and his colleagues have conducted a research that has shown that most likely option to enter malware into a plane’s computer systems is by doing it during development by a corrupt employee backed by a large criminal body or even a country.
I-HLS: http://bit.ly/1SKGXCl

 

« US vs Hackers: Still Losing
AI is as Dangerous as Nuclear Weapons »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Acumin Recruitment

Acumin Recruitment

Acumin is an internationally established Cyber Security recruitment specialist.

Eversheds Sutherland

Eversheds Sutherland

Eversheds Sutherland is a global multinational law practice offering a full range of commercial and IT law services including Privacy, Data Protection and Cyersecurity.

Daon

Daon

Daon offers a universal biometric authentication platform for mobile devices.

ID Agent

ID Agent

ID Agent provides a comprehensive set of threat intelligence and identity monitoring solutions.

Fluency Security

Fluency Security

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

Infowhiz solutions

Infowhiz solutions

Infowhiz provides solutions for backup/disaster recovery and network security.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

Avatao

Avatao

Avatao is an online training platform for building secure software, offering a rich library of hands-on IT security exercises for software engineers to teach secure programming.

BrandShelter

BrandShelter

BrandShelter specializes in providing online brand protection for companies and trademark owners.

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

TransUnion

TransUnion

TransUnion is a global information and insights company that makes it possible for businesses and consumers to transact with confidence.

SOC Prime

SOC Prime

SOC Prime is the only Threat Detection Marketplace where researchers monetize their content to help security teams defend against attacks easier, faster and more efficiently than ever.

Cyber Tzar

Cyber Tzar

Cyber Tzar is a new approach at dealing with an old problem; assessing and managing risks to your IT estate.

Lansafe

Lansafe

Lansafe stands as a leading managed service provider in the UK, seamlessly integrating IT, Telecoms, Security, Electrical and Cyber Security solutions.

American Binary

American Binary

American Binary is a Quantum Safe Networking (TM) and post-quantum encryption company.

CQURE

CQURE

CQURE is divided into four main cybersecurity excellence areas: CQURE Consulting, CQURE Academy, CQURE Knowledge Sharing and CQURE Cyber Lab.