Cyber Threats to Civilian Flights

1204airplane.jpg?w=620

Darkening clouds hang over aviation from emerging cyber vulnerabilities.

Many people are afraid to fly. Most of them fear than the plane will suffer a malfunction they have no control over midflight, as they’re sitting on it. 

In the past, the main concern was from a technical malfunction or terrorist hijacking, but one the main threats to commercial aerial transportation today is cyber attack. In the past cyber threats weren’t so substantial when it came to airplanes, as the field was fairly digital. 

Computers have only infiltrated planes in the 1970s, after the U.S. has developed the first stealth aircraft. About twenty years later, in the 1990s, computer became more and more present even in passenger planes and today the role of the computer is so central that it’s possible to say that the pilot is running the computer as the computer is running the plane. The computer controls all of the plane’s core systems in charge of its flight capabilities. Therefore, it only makes sense that the fear of cyber attack by hostile elements is keeping a lot of people very busy.
So what are the cyber dangers is today’s civilian airplane facing? David Stupples from City University in London claims that breaking in the airplane’s computer systems by the wireless Internet on deck is not possible and that the only way to get into the computer system is by injecting it with malware. 

However, even this is very hard to do since it means that one the plane’s computer programmers has done it intentionally and that’s highly unlikely since one would think that inspections and background checks are being done to prevent the wrong people from working in such important positions. 

Another way is taking over the plane after successfully integrating the malware in computers on the plane itself, but this also demands very high abilities and a high level of sophistication from the attacker. Stupples and his colleagues have conducted a research that has shown that most likely option to enter malware into a plane’s computer systems is by doing it during development by a corrupt employee backed by a large criminal body or even a country.
I-HLS: http://bit.ly/1SKGXCl

 

« US vs Hackers: Still Losing
AI is as Dangerous as Nuclear Weapons »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Sepior

Sepior

Our vision is to make Sepior the leading provider of cloud-encryption software in the world.

CyberTrap

CyberTrap

CyberTrap is an advanced highly-interactive deception technology allowing real-time analysis and control of security breaches.

TÜV Informationstechnik (TÜViT)

TÜV Informationstechnik (TÜViT)

TÜViT is a leading service provider in the IT sector offering unbiased and independent tests and certifications of IT products, hardware, software, systems and processes.

HudsonCyber

HudsonCyber

HudsonCyber, part of HudsonAnalytix, provides leading cyber risk management services for the global maritime transportation industry.

Tenfold Software

Tenfold Software

Tenfold is the unique, centralized platform for managing user and permissions efficiently and automatically.

Egnyte

Egnyte

Egnyte delivers secure content collaboration, compliant data protection and simple infrastructure modernization; all through a single SaaS solution.

SBD Automotive

SBD Automotive

SBD Automotive are specialists in automotive technology providing independent research and consultancy to help create smarter, more secure, better connected, and increasingly autonomous cars.

Zymbit

Zymbit

Zymbit provides hardware security modules (HSM) for IoT devices, including Raspberry Pi and other single board computers.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Blockchain Research Institute (BRI)

Blockchain Research Institute (BRI)

Blockchain Research Institute (BRI) is an independent, global think-tank. We bring together the world’s top global researchers to undertake ground-breaking research on blockchain technology.

NJVC

NJVC

NJVC delivers IT automation, optimization and security to empower mission-enabling IT for customers with secure requirements.

Deft

Deft

Deft (formerly ServerCentral Turing Group) is a trusted provider of colocation, cloud, and disaster recovery services.

Kriptos

Kriptos

Kriptos helps businesses improve their cybersecurity, risk, and compliance strategies by locating critical information through a technology that automatically classifies and labels documents using AI.

NetRise

NetRise

NetRise was founded as a direct result of the many shortcomings currently in the device security market, specifically targeting the firmware of devices.

CyBourn

CyBourn

Cybourn's diverse offerings include engineering, analysis, product development, assessment, and advisory services in the cybersecurity space.

coc00n

coc00n

coc00n secures the devices of high-value and high-interest individuals against cyber attacks.