{"id":51,"date":"2014-04-01T22:44:31","date_gmt":"2014-04-01T22:44:31","guid":{"rendered":"https:\/\/sites.erau.edu\/trbcybersecurity\/?p=51"},"modified":"2014-10-20T16:54:01","modified_gmt":"2014-10-20T16:54:01","slug":"malaysian-plane-and-cyber-security","status":"publish","type":"post","link":"https:\/\/sites.erau.edu\/trbcybersecurity\/malaysian-plane-and-cyber-security\/","title":{"rendered":"Malaysian Plane and Cyber Security"},"content":{"rendered":"<div><\/div>\n<div><strong>This was written by Dr. Jon Haass Embry-Riddle Aeronautical University<br \/>\n<\/strong><\/div>\n<p><span style=\"font-family: Calibri, sans-serif;font-size: small\"><span style=\"color: black;font-size: medium\">Most industries understand that cyber threats can impact business, their reputation, the confidence of their customers.\u00a0 The airlines and transportation industry we are reminded can cost lives when a threat occurs.\u00a0 Although we still don\u2019t know the details, pieces are becoming public regarding tracking mechanisms that are part of the engines on the airplane that is missing.\u00a0<\/span><\/span><\/p>\n<div><span style=\"font-family: Calibri, sans-serif;font-size: small\"><span style=\"color: black;font-size: medium\">For a number of days there was a lot of interest around two passengers with fake passports, then we learned that some travelers did not fly and their baggage removed.\u00a0 Both of these discoveries point to the information systems used within airports to monitor passengers and the materials brought on board with them.<\/span><\/span><\/div>\n<div><\/div>\n<div><span style=\"font-family: Calibri, sans-serif;font-size: small\"><span style=\"color: black;font-size: medium\">As time passes and little new information is forth coming, questions arise concerning the true ability of governments, industry to cooperate and share critical data.\u00a0 Information is gathered and used in silos.\u00a0 Ticketing systems are not readily connected to information regarding identification.\u00a0 Passenger lists raise privacy concerns if released for efforts to determine criminal or fraudulent activities.<\/span><\/span><\/div>\n<div><\/div>\n<div><span style=\"font-family: Calibri, sans-serif;font-size: small\"><span style=\"color: black;font-size: medium\">Remarkably our communication and surveillance systems as sophisticated as they are do not allow the tracking of a plane once it leaves the primary aviation radar systems.\u00a0 Will this change as the industry embraces Automatic dependent surveillance-broadcast (ADS-B)?\u00a0 Does this suggest that the system must be protected from pilot, crew and perhaps even maintenance crew modification?<\/span><\/span><\/div>\n<div><\/div>\n<div><span style=\"font-family: Calibri, sans-serif;font-size: small\"><span style=\"color: black;font-size: medium\">Airports like any other organization today rely on computers, networks, and associated data as part of its real time operations.\u00a0 The tools available to cyber threats do not care about the industry and yet the aviation business has been focused so heavily on physical security that it is time to re-evaluate the cyber stance.<\/span><\/span><\/div>\n<div><\/div>\n<div><span style=\"font-family: Calibri, sans-serif;font-size: small\"><span style=\"color: black;font-size: medium\">What is your airport doing about cyber security?\u00a0 Is there a plan in place?\u00a0 Who is in charge, the IT department is often too overwhelmed by help desk activity to be able to respond to the different needs of detection and mitigation of threats.<\/span><\/span><\/div>\n<div><span style=\"font-family: Calibri, sans-serif;font-size: small\">\u00a0<\/span><\/div>\n<div><span style=\"font-family: Calibri, sans-serif;font-size: small\">\u00a0<\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This was written by Dr. Jon Haass Embry-Riddle Aeronautical University Most industries understand that cyber threats can impact business, their reputation, the confidence of their customers.\u00a0 The airlines and transportation industry we are reminded can cost lives when a threat &hellip; <a href=\"https:\/\/sites.erau.edu\/trbcybersecurity\/malaysian-plane-and-cyber-security\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,8,4,3],"tags":[],"class_list":["post-51","post","type-post","status-publish","format-standard","hentry","category-attacks-breaches","category-education","category-threats","category-vulnerabilities"],"_links":{"self":[{"href":"https:\/\/sites.erau.edu\/trbcybersecurity\/wp-json\/wp\/v2\/posts\/51","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.erau.edu\/trbcybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.erau.edu\/trbcybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.erau.edu\/trbcybersecurity\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.erau.edu\/trbcybersecurity\/wp-json\/wp\/v2\/comments?post=51"}],"version-history":[{"count":0,"href":"https:\/\/sites.erau.edu\/trbcybersecurity\/wp-json\/wp\/v2\/posts\/51\/revisions"}],"wp:attachment":[{"href":"https:\/\/sites.erau.edu\/trbcybersecurity\/wp-json\/wp\/v2\/media?parent=51"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.erau.edu\/trbcybersecurity\/wp-json\/wp\/v2\/categories?post=51"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.erau.edu\/trbcybersecurity\/wp-json\/wp\/v2\/tags?post=51"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}