SlideShare uma empresa Scribd logo
1 de 31
Baixar para ler offline
Creating and Using an Airport Threats
Analysis Framework
Dr John McCarthy
ServiceTec Research Fellow
Cranfield University / UK Defence Academy
Creating an Airport Threat
Analysis Framework
Dr John McCarthy Ph.D. B.Sc. (hons) MBCS
Vice President of Cyber Security ServiceTec International
Inc./ServiceTec Research Fellow at Cranfield University / UK Defence
Academy
Partners
Cyber-Physical Systems Research Centre
based at Cranfield and sponsored by
ServiceTec
Centre for the Protection of National
Infrastructures
University of Nebraska
Federal Aviation Authority
Joint Information Operations Warfare
Centre, Vulnerability Assessment Branch
(JVAB) USA
What is it?
A means of measuring an airports
capability to resist and recover from
cyber-attack – on going research
The problem
There is no question that the whole
arena of cyber attacks, developing
technologies in the information area
represent potential battlefronts for the
future.
I have often said that there is a strong
likelihood that the next Pearl Harbor
that we confront could very well be a
cyber attack that cripples our power
systems, our grid, our security systems,
our financial systems, our governmental
systems
Defense Secretary Panetta 2011
The problem – Not just
standard ITSCADA systems
BYOD
Electronic boarding passes
Common Use IT systems with multiple
users on multiple machines
Social engineers to take advantage of
high staff turnover and a busy
environment to access IT systems
Shared Systems
CUPPS
The ProblemTo emphasize this, Bob Cheong, Chief Information
Security Officer of the Los Angeles Airport, report that a
variety of cyber-attacks in Los Angeles have occurred in
the last several years:
 there were over 6,400 attempts to hack into a new file
server two days after it was deployed;
 In a one-year period, nearly 59,000 Internet misuse
and abuse attempts were blocked;
 Finally, in that same one-year period, 2.9 million
hacking attempts were blocked
The problem – Not just
standard IT• To add to the problem cyber
security policies are deployed and
acted upon during ICT stasis. As
airports rapidly expand ICT
systems may be in a state of flux
• The earlier work by the authors
has shown that this is when they
are at their most vulnerable
Who is the enemy?
• Cyber terrorist
• Hacktivists
• Cyber criminals
• Organized crime
• Disgruntled
employees
• Kiddies
• Foreign
governments
Dom Nessi
In October of 2011,
Dom Nessi
delivered an
address to the
Airports Council
International of
North America
outlining the cyber
security threats
facing airports, the
potential vectors
that might be used
in an attack, and
tactics for securing
known
Dom Nessi
• Amongst Nessi’s threats were several
that were focused on external airport
operations, such as:
• external airport or airline websites
• concession point-of-sale
• credit card transaction information
• passenger’s wireless devices.
Dom Nessi
However, the overall impact of cyber-
attacks on systems external to airport
operations is small when compared to
attacks on systems required to perform
internal airport operations.
Nessi points out several potential
targets within this realm, including:
access control and perimeter intrusion
systems
eEnabled aircraft systems
radar systems
SCADA - Historical problems
Supervisory Control And Data Acquisition
(SCADA) systems act as the hidden
computer equipment behind large
infrastructures that are essential to
maintaining the quality of our life.
These infrastructures include electrical
power grids, water purification and delivery,
gas, and other utilities, as well as trains and
transportation systems.
Legacy SCADA systems, planned and
implemented possibly decades ago, were
Why is Security an issue for
SCADA?
The SCADA environment is
different:
 SCADA computations and logic have a direct affect on
the physical world
 Safety and efficiency sometimes conflict with security
in the design and operation of control systems
 Ordered list of security expectations from SCADA
1. availability
2. integrity
3. confidentiality
16
The Empire State Building
and midtown New York City
are shown during the 2003
blackout. Photo)
SCADA Attacks
A water treatment plant near
Harrisburg, PA was attacked. The
hacker planted malicious software into
the control systems and could
potentially have altered or stopped the
operation of the treatment plant
The water treatment facility in
Queensland’s was accessed by a
disgruntled past employee named who
used a wireless connection into the
An Examination of a Major
Hub AirportExamining a major hub airport in
North America the critical driver for
increased security has been the
implementation of Payment Card
Industry (PCI) compliance regulations
for secure credit card transactions.
PCI has forced many airports to
upgrade and improve security
measures or face the loss of revenue
An Examination of a Major
Hub Airport• There was also a widely held belief that the SCADA systems in the airport
were isolated from the main IT backbone. Often the car parking and
baggage control systems were separated from the main IT network by
hardware firewalls.
• These firewalls were “assumed” secure by IT staff and it was often unclear
who had responsibly for the managing and configuration of these
firewalls.
• Additional services could be added to the network without all relevant IT
staff being aware of the changes.
• There appeared to be no overarching group or committee that had a
direct focus on cyber security measures.
• Security measures were left in multiple hands and ad hoc systems were
assumed isolated due to previous hardware and software configurations
without ongoing checks and testing.
Towards a Solution
Mainstream Cyber Security
measures are often focused on the
traditional elements of an IT network
and will therefore fall short of fully
understanding the cyber needs of an
airport
A more holistic approach is needed
that encompasses wider elements of
the airport’s infrastructure
Towards a Solution
Nessi’s assessment settles on four
components within an airport that are
vulnerable to cyber attack, each
“require a different approach to
security:
the network
the device
the application
and the back-end system
Towards a Solution
• “social engineering awareness”
campaigns educating staff on proper
use of software, hardware and
access points and potential exploits
that expose human error and
provide access to unauthorized
persons;
• performing penetration testing by
both those with internal access and
Towards a solution
Full inter agency dialogue
A no “blame culture” about cyber
attacks
Banishing the idea of “us and them”
Large airports are “safer”
Smaller ones can swim on there own
and are not as important
Every plane that takes off lands, all
Playing Dirty - A Red Team
Strike
• The red team’s job is
straightforward: seek and destroy. A
red teamer will use every tool
available to compromise a target
network and tear down a blue
team’s defenses, with the ultimate
goal of taking control of one or more
critical systems in order to spy,
sabotage, or destroy.
Heathrow Dependency
ModellingTo fully understand how all the
systems work together we need to
create a dependency model – what
happens when?
We are undertaking this research
with the Centre for the Protection of
National Infrastructures at Heathrow
Unless we fully understand how our
Risk Management really is a
matter of life or Death!
19/10/2011 26Bow Ties and Incidents
How to Manage my Risk?
I’ve done this often
before
Will my boss/shareholders support me if ..…?
I want to be safe
Is it different from usual?
save
timesave
££££
I like to do a good
job
be safe
I want the business to succeed
I am judged on….
Does doing this feel
right?
19/10/2011 27
Our aim from a traditional
military viewpoint
A Multi Agency Approach
• Many agencies and governments
favour a multi-lateral approach to
solving cyber security.
• Thus any analysis framework
must be undertaken from a multi-
agency perspective.
• To ignore this perspective may
allow cyber threats to go
How do we achieve this across
multiple agencies, disciplines
and even countries?
• Tough challenge
• Will we need a cyber Perl Harbor
before we react?
• Raised more questions than answers
• Would you like to get involved?
“
”
I have often said that there is a strong likelihood that
the next Pearl Harbor that we confront could very
well be a cyber attack that cripples our power
systems, our grid, our security systems, our financial
systems, our governmental systems
Defense Secretary Panetta 2011
Email: john.mccarthy@servicetec.com
www.airportcybersecurity.com
Airport Cyber Security Podcast

Mais conteúdo relacionado

Mais procurados

Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatuChinatu Uzuegbu
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatMotorola Solutions
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information SecuritySimoun Ung
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)Wail Hassan
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Mark John Lado, MIT
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Study on Zeus Banking Malware
Study on Zeus Banking MalwareStudy on Zeus Banking Malware
Study on Zeus Banking MalwareShaik Anisa
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats ReportJuniper Networks
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksTripwire
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk MitigationMukalele Rogers
 
Social Engineering Role in Compromising Information/Network Security
Social Engineering Role in Compromising Information/Network SecuritySocial Engineering Role in Compromising Information/Network Security
Social Engineering Role in Compromising Information/Network SecurityOladotun Ojebode
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09Tammy Clark
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceDarren Argyle
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 

Mais procurados (20)

Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber Threat
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information Security
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Study on Zeus Banking Malware
Study on Zeus Banking MalwareStudy on Zeus Banking Malware
Study on Zeus Banking Malware
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
 
Social Engineering Role in Compromising Information/Network Security
Social Engineering Role in Compromising Information/Network SecuritySocial Engineering Role in Compromising Information/Network Security
Social Engineering Role in Compromising Information/Network Security
 
The red book
The red book  The red book
The red book
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Forensics
ForensicsForensics
Forensics
 

Destaque

Airport security 2013 cyber security panel discussion
Airport security 2013   cyber security panel discussionAirport security 2013   cyber security panel discussion
Airport security 2013 cyber security panel discussionRussell Publishing
 
IT Reference Architectures at Amsterdam Airport Schiphol
IT Reference Architectures at Amsterdam Airport SchipholIT Reference Architectures at Amsterdam Airport Schiphol
IT Reference Architectures at Amsterdam Airport SchipholMarc Chang Sing Pang
 
Airport security market assessment india
Airport security market assessment indiaAirport security market assessment india
Airport security market assessment indiaFreelancer
 
Integrated ip network for airport terminal
Integrated ip network for airport terminalIntegrated ip network for airport terminal
Integrated ip network for airport terminalTuckers Consultancy Ltd
 
Rethinking airports for future connected travelers
Rethinking airports for future connected travelersRethinking airports for future connected travelers
Rethinking airports for future connected travelersKevin May
 
Global Trends in the IT Industry
Global Trends in the IT IndustryGlobal Trends in the IT Industry
Global Trends in the IT IndustryCapgemini
 
Capgemini UK - Evolution of risk_management
Capgemini UK - Evolution of risk_managementCapgemini UK - Evolution of risk_management
Capgemini UK - Evolution of risk_managementJelger Groenland
 
Dcom be-en-data-assessment-approach
Dcom be-en-data-assessment-approachDcom be-en-data-assessment-approach
Dcom be-en-data-assessment-approachfwathelet
 
Cyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_videoCyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_videoOWASP Delhi
 
The Case For Change: Rethinking Library Services, Staffing, and Spaces
The Case For Change: Rethinking Library Services, Staffing, and SpacesThe Case For Change: Rethinking Library Services, Staffing, and Spaces
The Case For Change: Rethinking Library Services, Staffing, and Spacesbrightspot
 
Capgemini your global aviation partner CoE Aviation
Capgemini your global aviation partner CoE AviationCapgemini your global aviation partner CoE Aviation
Capgemini your global aviation partner CoE AviationHikmat Mahawat Khan
 
Solution deck capgemini cloud assessment
Solution deck capgemini cloud assessmentSolution deck capgemini cloud assessment
Solution deck capgemini cloud assessmentAdobe
 
Introduction to Safety Management - SLES Bahrain Technical Seminar on 06-Oct-...
Introduction to Safety Management - SLES Bahrain Technical Seminar on 06-Oct-...Introduction to Safety Management - SLES Bahrain Technical Seminar on 06-Oct-...
Introduction to Safety Management - SLES Bahrain Technical Seminar on 06-Oct-...walk_the_safety_talk
 
The Architecture of an API Platform
The Architecture of an API PlatformThe Architecture of an API Platform
The Architecture of an API PlatformJohannes Ridderstedt
 
Transportation Security Administration "TSA 101"
Transportation Security Administration "TSA 101"Transportation Security Administration "TSA 101"
Transportation Security Administration "TSA 101"TSA
 

Destaque (20)

Airport security 2013 cyber security panel discussion
Airport security 2013   cyber security panel discussionAirport security 2013   cyber security panel discussion
Airport security 2013 cyber security panel discussion
 
IT Reference Architectures at Amsterdam Airport Schiphol
IT Reference Architectures at Amsterdam Airport SchipholIT Reference Architectures at Amsterdam Airport Schiphol
IT Reference Architectures at Amsterdam Airport Schiphol
 
Aircraft Hijacked
Aircraft HijackedAircraft Hijacked
Aircraft Hijacked
 
Airport security market assessment india
Airport security market assessment indiaAirport security market assessment india
Airport security market assessment india
 
Integrated ip network for airport terminal
Integrated ip network for airport terminalIntegrated ip network for airport terminal
Integrated ip network for airport terminal
 
Rethinking airports for future connected travelers
Rethinking airports for future connected travelersRethinking airports for future connected travelers
Rethinking airports for future connected travelers
 
Social media-assessment
Social media-assessmentSocial media-assessment
Social media-assessment
 
Global Trends in the IT Industry
Global Trends in the IT IndustryGlobal Trends in the IT Industry
Global Trends in the IT Industry
 
Capgemini UK - Evolution of risk_management
Capgemini UK - Evolution of risk_managementCapgemini UK - Evolution of risk_management
Capgemini UK - Evolution of risk_management
 
Security Aspects in Aviation Sector
Security Aspects in Aviation SectorSecurity Aspects in Aviation Sector
Security Aspects in Aviation Sector
 
Dcom be-en-data-assessment-approach
Dcom be-en-data-assessment-approachDcom be-en-data-assessment-approach
Dcom be-en-data-assessment-approach
 
Cyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_videoCyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_video
 
The Case For Change: Rethinking Library Services, Staffing, and Spaces
The Case For Change: Rethinking Library Services, Staffing, and SpacesThe Case For Change: Rethinking Library Services, Staffing, and Spaces
The Case For Change: Rethinking Library Services, Staffing, and Spaces
 
What is Scrum
What is ScrumWhat is Scrum
What is Scrum
 
Aviation Security since September 2001
Aviation Security since September 2001Aviation Security since September 2001
Aviation Security since September 2001
 
Capgemini your global aviation partner CoE Aviation
Capgemini your global aviation partner CoE AviationCapgemini your global aviation partner CoE Aviation
Capgemini your global aviation partner CoE Aviation
 
Solution deck capgemini cloud assessment
Solution deck capgemini cloud assessmentSolution deck capgemini cloud assessment
Solution deck capgemini cloud assessment
 
Introduction to Safety Management - SLES Bahrain Technical Seminar on 06-Oct-...
Introduction to Safety Management - SLES Bahrain Technical Seminar on 06-Oct-...Introduction to Safety Management - SLES Bahrain Technical Seminar on 06-Oct-...
Introduction to Safety Management - SLES Bahrain Technical Seminar on 06-Oct-...
 
The Architecture of an API Platform
The Architecture of an API PlatformThe Architecture of an API Platform
The Architecture of an API Platform
 
Transportation Security Administration "TSA 101"
Transportation Security Administration "TSA 101"Transportation Security Administration "TSA 101"
Transportation Security Administration "TSA 101"
 

Semelhante a Airport security 2013 john mc carthy

Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clintonCIONET
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIRJET Journal
 
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfsulu98
 
0503 al achkar-jabbour_lebanese_univ_rev
0503 al achkar-jabbour_lebanese_univ_rev0503 al achkar-jabbour_lebanese_univ_rev
0503 al achkar-jabbour_lebanese_univ_revMona Al-achkar
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityIRJET Journal
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxbagotjesusa
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkJack Shaffer
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIAhmed Banafa
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich TopCyberNewsMAGAZINE
 

Semelhante a Airport security 2013 john mc carthy (20)

Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
Case Study.pdf
Case Study.pdfCase Study.pdf
Case Study.pdf
 
C018131821
C018131821C018131821
C018131821
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
 
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
 
0503 al achkar-jabbour_lebanese_univ_rev
0503 al achkar-jabbour_lebanese_univ_rev0503 al achkar-jabbour_lebanese_univ_rev
0503 al achkar-jabbour_lebanese_univ_rev
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
 

Mais de Russell Publishing

Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...Russell Publishing
 
Robin Forrest, International Relations, SNCF Security
Robin Forrest, International Relations, SNCF SecurityRobin Forrest, International Relations, SNCF Security
Robin Forrest, International Relations, SNCF SecurityRussell Publishing
 
Richard Aaroe, CEO, WaveTrainSystems (WTS)
Richard Aaroe, CEO, WaveTrainSystems (WTS)Richard Aaroe, CEO, WaveTrainSystems (WTS)
Richard Aaroe, CEO, WaveTrainSystems (WTS)Russell Publishing
 
Peter Guy, Operational Security & Continuity Planning Manager, Network Rail
Peter Guy, Operational Security & Continuity Planning Manager, Network RailPeter Guy, Operational Security & Continuity Planning Manager, Network Rail
Peter Guy, Operational Security & Continuity Planning Manager, Network RailRussell Publishing
 
Martyn Guiver, Head of Crime Management, Northern Rail
Martyn Guiver, Head of Crime Management, Northern RailMartyn Guiver, Head of Crime Management, Northern Rail
Martyn Guiver, Head of Crime Management, Northern RailRussell Publishing
 
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilMarc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilRussell Publishing
 
José Pires, Senior Security Advisor, International Union of Railways (UIC)
José Pires, Senior Security Advisor, International Union of Railways (UIC)José Pires, Senior Security Advisor, International Union of Railways (UIC)
José Pires, Senior Security Advisor, International Union of Railways (UIC)Russell Publishing
 
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)Russell Publishing
 
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer ElectronicDaniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer ElectronicRussell Publishing
 
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...Russell Publishing
 
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...Russell Publishing
 

Mais de Russell Publishing (20)

Elisabeth sinclair
Elisabeth sinclairElisabeth sinclair
Elisabeth sinclair
 
Elisabeth sinclair
Elisabeth sinclairElisabeth sinclair
Elisabeth sinclair
 
Denis castanet
Denis castanetDenis castanet
Denis castanet
 
Tim gray
Tim grayTim gray
Tim gray
 
Kari rouhonen
Kari rouhonenKari rouhonen
Kari rouhonen
 
Gunther koller
Gunther kollerGunther koller
Gunther koller
 
David thomasson
David thomassonDavid thomasson
David thomasson
 
Carl bjorgan
Carl bjorganCarl bjorgan
Carl bjorgan
 
Johnny sorenson
Johnny sorensonJohnny sorenson
Johnny sorenson
 
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
 
Robin Forrest, International Relations, SNCF Security
Robin Forrest, International Relations, SNCF SecurityRobin Forrest, International Relations, SNCF Security
Robin Forrest, International Relations, SNCF Security
 
Richard Aaroe, CEO, WaveTrainSystems (WTS)
Richard Aaroe, CEO, WaveTrainSystems (WTS)Richard Aaroe, CEO, WaveTrainSystems (WTS)
Richard Aaroe, CEO, WaveTrainSystems (WTS)
 
Peter Guy, Operational Security & Continuity Planning Manager, Network Rail
Peter Guy, Operational Security & Continuity Planning Manager, Network RailPeter Guy, Operational Security & Continuity Planning Manager, Network Rail
Peter Guy, Operational Security & Continuity Planning Manager, Network Rail
 
Martyn Guiver, Head of Crime Management, Northern Rail
Martyn Guiver, Head of Crime Management, Northern RailMartyn Guiver, Head of Crime Management, Northern Rail
Martyn Guiver, Head of Crime Management, Northern Rail
 
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilMarc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
 
José Pires, Senior Security Advisor, International Union of Railways (UIC)
José Pires, Senior Security Advisor, International Union of Railways (UIC)José Pires, Senior Security Advisor, International Union of Railways (UIC)
José Pires, Senior Security Advisor, International Union of Railways (UIC)
 
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
 
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer ElectronicDaniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
 
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
 
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
 

Último

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Último (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Airport security 2013 john mc carthy

  • 1. Creating and Using an Airport Threats Analysis Framework Dr John McCarthy ServiceTec Research Fellow Cranfield University / UK Defence Academy
  • 2. Creating an Airport Threat Analysis Framework Dr John McCarthy Ph.D. B.Sc. (hons) MBCS Vice President of Cyber Security ServiceTec International Inc./ServiceTec Research Fellow at Cranfield University / UK Defence Academy
  • 3. Partners Cyber-Physical Systems Research Centre based at Cranfield and sponsored by ServiceTec Centre for the Protection of National Infrastructures University of Nebraska Federal Aviation Authority Joint Information Operations Warfare Centre, Vulnerability Assessment Branch (JVAB) USA
  • 4. What is it? A means of measuring an airports capability to resist and recover from cyber-attack – on going research
  • 5. The problem There is no question that the whole arena of cyber attacks, developing technologies in the information area represent potential battlefronts for the future. I have often said that there is a strong likelihood that the next Pearl Harbor that we confront could very well be a cyber attack that cripples our power systems, our grid, our security systems, our financial systems, our governmental systems Defense Secretary Panetta 2011
  • 6. The problem – Not just standard ITSCADA systems BYOD Electronic boarding passes Common Use IT systems with multiple users on multiple machines Social engineers to take advantage of high staff turnover and a busy environment to access IT systems
  • 8. The ProblemTo emphasize this, Bob Cheong, Chief Information Security Officer of the Los Angeles Airport, report that a variety of cyber-attacks in Los Angeles have occurred in the last several years:  there were over 6,400 attempts to hack into a new file server two days after it was deployed;  In a one-year period, nearly 59,000 Internet misuse and abuse attempts were blocked;  Finally, in that same one-year period, 2.9 million hacking attempts were blocked
  • 9. The problem – Not just standard IT• To add to the problem cyber security policies are deployed and acted upon during ICT stasis. As airports rapidly expand ICT systems may be in a state of flux • The earlier work by the authors has shown that this is when they are at their most vulnerable
  • 10. Who is the enemy? • Cyber terrorist • Hacktivists • Cyber criminals • Organized crime • Disgruntled employees • Kiddies • Foreign governments
  • 11. Dom Nessi In October of 2011, Dom Nessi delivered an address to the Airports Council International of North America outlining the cyber security threats facing airports, the potential vectors that might be used in an attack, and tactics for securing known
  • 12. Dom Nessi • Amongst Nessi’s threats were several that were focused on external airport operations, such as: • external airport or airline websites • concession point-of-sale • credit card transaction information • passenger’s wireless devices.
  • 13. Dom Nessi However, the overall impact of cyber- attacks on systems external to airport operations is small when compared to attacks on systems required to perform internal airport operations. Nessi points out several potential targets within this realm, including: access control and perimeter intrusion systems eEnabled aircraft systems radar systems
  • 14. SCADA - Historical problems Supervisory Control And Data Acquisition (SCADA) systems act as the hidden computer equipment behind large infrastructures that are essential to maintaining the quality of our life. These infrastructures include electrical power grids, water purification and delivery, gas, and other utilities, as well as trains and transportation systems. Legacy SCADA systems, planned and implemented possibly decades ago, were
  • 15. Why is Security an issue for SCADA? The SCADA environment is different:  SCADA computations and logic have a direct affect on the physical world  Safety and efficiency sometimes conflict with security in the design and operation of control systems  Ordered list of security expectations from SCADA 1. availability 2. integrity 3. confidentiality
  • 16. 16 The Empire State Building and midtown New York City are shown during the 2003 blackout. Photo)
  • 17. SCADA Attacks A water treatment plant near Harrisburg, PA was attacked. The hacker planted malicious software into the control systems and could potentially have altered or stopped the operation of the treatment plant The water treatment facility in Queensland’s was accessed by a disgruntled past employee named who used a wireless connection into the
  • 18. An Examination of a Major Hub AirportExamining a major hub airport in North America the critical driver for increased security has been the implementation of Payment Card Industry (PCI) compliance regulations for secure credit card transactions. PCI has forced many airports to upgrade and improve security measures or face the loss of revenue
  • 19. An Examination of a Major Hub Airport• There was also a widely held belief that the SCADA systems in the airport were isolated from the main IT backbone. Often the car parking and baggage control systems were separated from the main IT network by hardware firewalls. • These firewalls were “assumed” secure by IT staff and it was often unclear who had responsibly for the managing and configuration of these firewalls. • Additional services could be added to the network without all relevant IT staff being aware of the changes. • There appeared to be no overarching group or committee that had a direct focus on cyber security measures. • Security measures were left in multiple hands and ad hoc systems were assumed isolated due to previous hardware and software configurations without ongoing checks and testing.
  • 20. Towards a Solution Mainstream Cyber Security measures are often focused on the traditional elements of an IT network and will therefore fall short of fully understanding the cyber needs of an airport A more holistic approach is needed that encompasses wider elements of the airport’s infrastructure
  • 21. Towards a Solution Nessi’s assessment settles on four components within an airport that are vulnerable to cyber attack, each “require a different approach to security: the network the device the application and the back-end system
  • 22. Towards a Solution • “social engineering awareness” campaigns educating staff on proper use of software, hardware and access points and potential exploits that expose human error and provide access to unauthorized persons; • performing penetration testing by both those with internal access and
  • 23. Towards a solution Full inter agency dialogue A no “blame culture” about cyber attacks Banishing the idea of “us and them” Large airports are “safer” Smaller ones can swim on there own and are not as important Every plane that takes off lands, all
  • 24. Playing Dirty - A Red Team Strike • The red team’s job is straightforward: seek and destroy. A red teamer will use every tool available to compromise a target network and tear down a blue team’s defenses, with the ultimate goal of taking control of one or more critical systems in order to spy, sabotage, or destroy.
  • 25. Heathrow Dependency ModellingTo fully understand how all the systems work together we need to create a dependency model – what happens when? We are undertaking this research with the Centre for the Protection of National Infrastructures at Heathrow Unless we fully understand how our
  • 26. Risk Management really is a matter of life or Death! 19/10/2011 26Bow Ties and Incidents
  • 27. How to Manage my Risk? I’ve done this often before Will my boss/shareholders support me if ..…? I want to be safe Is it different from usual? save timesave ££££ I like to do a good job be safe I want the business to succeed I am judged on…. Does doing this feel right? 19/10/2011 27
  • 28. Our aim from a traditional military viewpoint
  • 29. A Multi Agency Approach • Many agencies and governments favour a multi-lateral approach to solving cyber security. • Thus any analysis framework must be undertaken from a multi- agency perspective. • To ignore this perspective may allow cyber threats to go
  • 30. How do we achieve this across multiple agencies, disciplines and even countries? • Tough challenge • Will we need a cyber Perl Harbor before we react? • Raised more questions than answers • Would you like to get involved?
  • 31. “ ” I have often said that there is a strong likelihood that the next Pearl Harbor that we confront could very well be a cyber attack that cripples our power systems, our grid, our security systems, our financial systems, our governmental systems Defense Secretary Panetta 2011 Email: john.mccarthy@servicetec.com www.airportcybersecurity.com Airport Cyber Security Podcast