Cyber Threats to Civilian Flights

1204airplane.jpg?w=620

Darkening clouds hang over aviation from emerging cyber vulnerabilities.

Many people are afraid to fly. Most of them fear than the plane will suffer a malfunction they have no control over midflight, as they’re sitting on it. 

In the past, the main concern was from a technical malfunction or terrorist hijacking, but one the main threats to commercial aerial transportation today is cyber attack. In the past cyber threats weren’t so substantial when it came to airplanes, as the field was fairly digital. 

Computers have only infiltrated planes in the 1970s, after the U.S. has developed the first stealth aircraft. About twenty years later, in the 1990s, computer became more and more present even in passenger planes and today the role of the computer is so central that it’s possible to say that the pilot is running the computer as the computer is running the plane. The computer controls all of the plane’s core systems in charge of its flight capabilities. Therefore, it only makes sense that the fear of cyber attack by hostile elements is keeping a lot of people very busy.
So what are the cyber dangers is today’s civilian airplane facing? David Stupples from City University in London claims that breaking in the airplane’s computer systems by the wireless Internet on deck is not possible and that the only way to get into the computer system is by injecting it with malware. 

However, even this is very hard to do since it means that one the plane’s computer programmers has done it intentionally and that’s highly unlikely since one would think that inspections and background checks are being done to prevent the wrong people from working in such important positions. 

Another way is taking over the plane after successfully integrating the malware in computers on the plane itself, but this also demands very high abilities and a high level of sophistication from the attacker. Stupples and his colleagues have conducted a research that has shown that most likely option to enter malware into a plane’s computer systems is by doing it during development by a corrupt employee backed by a large criminal body or even a country.
I-HLS: http://bit.ly/1SKGXCl

 

« US vs Hackers: Still Losing
AI is as Dangerous as Nuclear Weapons »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Bulb Security

Bulb Security

Whether your internal red team or penetration testing team needs training, or you lack internal resources and need an outsourced penetration test, Bulb Security can help.

LexisNexis Risk Solutions

LexisNexis Risk Solutions

LexisNexis Risk Solutions provides technology solutions for Anti-Money Laundering, Fraud Mitigation, Anti-Bribery and Corruption, Identity Management, Tracing and Investigation.

Fortress Group

Fortress Group

Fortress is specialized in confidential and discrete recruitment solutions and temporary staffing in the field of security and risk management.

Cobalt Strike

Cobalt Strike

Cobalt Strike is penetration testing software designed to execute targeted attacks.

Comarch

Comarch

Comarch is a provider of IT business solutions to optimize operational and business processes. Cyber security solutions are focused on Identity Management and Security Assessment services.

SK IT Cyber Security

SK IT Cyber Security

SK IT provide services and solutions for cybersecurity and advanced information system engineering.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

Hacken

Hacken

Hacken provide a range of cybersecurity services including security assessments, blockchain security audits, and secure software development.

Cyber Security Africa

Cyber Security Africa

Cyber Security Africa is a full-service Information Security Consulting firm offering a comprehensive range of Services and Products to help organizations protect their valuable assets.

Dcode

Dcode

Dcode connects the tech industry and government to drive commercial innovation in the federal market.

CYSEC SA

CYSEC SA

Cysec is equipped to deliver agile security solutions for the most challenging IT infrastructures around the world.

Trilateral Research

Trilateral Research

Trilateral Research provide regulatory and policy advice; develop new data-driven technologies and contribute to the latest standards in safeguarding privacy, ethics and human rights.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.

Flawnter

Flawnter

Flawnter is a security testing software that finds hidden security and quality flaws in your applications.

Runecast Solutions

Runecast Solutions

Runecast Solutions is a global leader in AI-powered risk mitigation, security, continuous compliance and more efficient IT operations management.

Cyber Husky

Cyber Husky

Cyber Husky is an agile technology company that specializes in cloud solutions, cybersecurity, and managed IT services.