SlideShare una empresa de Scribd logo
1 de 26
With Ref to Doc ICAO 12-WP/122
ICAO – International Civil
Aviation Organization
WHY ?
• Cyber security is an issue because many civil aviation
organizations rely on electronic systems for critical
parts of their operations, including safety-critical
functions. The protection of electronic systems from
malicious electronic attack (unlawful interference) and
the means of dealing with the consequences of such
attacks is encompassed by the term cyber security. It
comprises managerial, operational and technical
activities, and relates to the electronic systems
themselves and to the information held and processed
by such systems. Cyber security is also often referred
to as information security, and while the two terms are
not synonymous they are similar enough that the
differences can be ignored in this context.
Currently cyber security is a relatively minor issue in civil aviation,
but this is changing. Although the adoption of new technology is
an ongoing activity in civil aviation, the current pace and extent of
new information technologies is notably increasing the risk from
cyber attacks. This is due to a number of factors:

• There is an increased reliance on a small number of technologies,
such as Linux, Windows, IPv6 protocols and Ethernet (AFDX), and
these technologies are widely used in the IT industry

• As a result there is widespread understanding of these
technologies, and of their weaknesses and vulnerabilities

• Systems are becoming more interconnected and security lapses in
one system are likely to affect others

•There is greater impact from systems failures due to increased
reliance on them.
• Over and above these factors, there is the potential for
unforeseen systematic problems due to weaknesses in
oversight. This is mainly due to a lack of coherence
between the many groups working on cyber security, and
a lack of expertise and understanding amongst those
who might provide the coherence. Some knowledge of
these problems exists within the industry, but knowledge
of the big picture is more limited.
• ICAO estimates that US$120 billion will be
spent on the transformation of air transportation
systems in the next ten to fifteen years. This
transformation will bring significant benefits
for safety, efficiency and the environment. Stakeholders,
including service providers, regulators, airspace users
and manufacturers, will face increased levels of
interaction as new, modernized ATM operations are
implemented.       Security    issues    related  to   the
transformation of the aviation system are coming into
view, issues that will require closer collaboration among
experts in safety and security disciplines. As the agenda
for AN-Conf/12 states, security matters should be
considered in the system changes that lie ahead.
Technologies Involved
NextGen – Next Generation Air Transportation
  System

 The Next Generation Air Transportation System (NextGen) is the
  name given to a new National Airspace System due for
  implementation across the United States in stages between 2012 and
  2025.

 The Next Generation Air Transportation System (NextGen) proposes
  to transform America’s air traffic control system from an aging
  ground-based system to a satellite-based system.

 GPS technology will be used to shorten routes, save time and fuel,
  reduce traffic delays, increase capacity, and permit controllers to
Elements within NextGen
Automatic dependent surveillance-broadcast(ADS-B).
 ADS-B will use Global Positioning System (GPS)
 satellite signals to provide air traffic controllers and
 pilots with much more accurate information that will
 help to keep aircraft safely separated in the sky and
 on runways. Aircraft transponders receive GPS signals
 and use them to determine the aircraft's precise
 position in the sky. These and other data are then
 broadcast to other aircraft and air traffic control.
 Once fully established, both pilots and air traffic
 controllers will, for the first time, see the same real-
 time display of air traffic, substantially improving
 safety.
• Next Generation Data Communications
  Current communications between aircrew and
air traffic control, and between air traffic
controllers, are largely realised through voice
communications. Initially, the introduction of
data communications will provide an additional
means of two-way communication for air traffic
control clearances, instructions, advisories,
flight crew requests and reports. With the
majority of aircraft data link equipped, the
exchange of routine controller-pilot messages
and clearances via data link will enable
controllers to handle more traffic. This will
improve air traffic controller productivity,
enhancing capacity and safety.
• Next Generation Network Enabled Weather
(NNEW)
 Seventy percent of NAS delays are attributed to
weather every year. The goal of NNEW is to cut
weather-related delays at least in half. Tens of
thousands of global weather observations and
sensor reports from ground-, airborne- and space-
based sources will fuse into a single national
weather information system, updated in real time.
NNEW will provide a common weather picture
across the national airspace system, and enable
better air transportation decision making.
• System Wide Information Management
(SWIM).
  SWIM will provide a single infrastructure and
information management system to deliver data
to many users and applications. By reducing the
number and types of interfaces and systems,
SWIM will reduce data redundancy and better
facilitate multi-user information sharing. SWIM
will also enable new modes of decision making
as information is more easily accessed.
• NAS voice switch (NVS).
  There are currently seventeen different voice
switching systems in the NAS, some in use for
more than twenty years. NVS will replace these
systems with a single air/ground and
ground/ground voice communications system.
Brief Working ADS-B
SSR Transponder (Secondary Surveillance
Radar)
Incidents and Vulnerabilities
             In late 2009, Newark Liberty International
             airport experienced sporadic outages of
             the GPS Ground Based Augmentation
             System (GBAS), used for precision
             approach landing, were observed for
             several weeks. Though not a directed
             cyber security attack, this event shows
             the potential impact that could occur in a
             jamming scenario. The ground station,
             located approximately 300 feet away from
             the New Jersey Turnpike experienced
             signal interference every day about the
             same time. After an investigation, the
             FAA discovered the cause of the outage:
             a passing truck driver on the turnpike
             using a widely available $33 personal
             GPS jammer to avoid being tracked by
             the employer.
An extract from the media in July
2012: “At a recent conference Dr.
Andrei Costin gave an unnerving
demonstration of weaknesses in
the air traffic control systems
coming into use. He showed that
with just $2 000 worth of store-
bought electronics an ADS-B
beacon could be ‘spoofed’ to
show that a non-existent aircraft
was coming in to land. This
‘Ghost Plane’ presentation was
possible because air traffic control
systems have no way of verifying
where messages are coming
from”
Since ADS-B is supposed to support mission-critical
automatic and human decisions, and have direct impact on
the overall air-traffic safety, it is imperative that technology
behind ADS-B meets operational, performance and security
requirements.
However, the main problem with ADS-B is the lack
security mechanisms, specifically:
• lack of entity authentication to protect against message
injection from unauthorized entities.
• lack of message signatures or authentication codes to
protect against tampering of messages or impersonating
aircrafts.
• lack of message encryption to protect against eavesdropping.
• lack of challenge-response mechanisms to protect
against replay attacks.
• lack of ephemeral identifiers to protect against privacy
tracking attacks.
           We did not include Denial of service (DoS), e.g., by
jamming radio signals, because it affects RF-based communication
in general, and is not specific to ADS-B.
Threats ADS-B
Jamming, denial of service
Eavesdropping
Spoofing, impersonation
Message injection/replay
Message manipulation
There have been incidents
involving crashes or tail strikes
when flight crew have made
errors in calculating take-off
performance parameters using
electronic flight bags (EFBs).
These were the result of human
error, but there is the potential
for the EFB programming to be
corrupted maliciously (hacked),
particularly when these devices
are connected to external
networks to receive updates.
Conclusion & Recommendation

recognize the risks in the current situation and the
 potential for future problems

create a Cyber Security Task Force (CSTF) to evaluate
 the extent of the problem and draw up a global cyber
 security architecture, which includes contributions
 from industry
Cont..
encourage states to provide the Aeronautical
 Communications Panel (ACP) with the resources to
 complete its work in developing a robust, secure
 aeronautical telecommunication network (ATN)
 using IPV6 as a foundational part of the next
 generation air traffic management systems
encourage States and industry to contribute to the
 work of the CSTF to ensure aircraft can interoperate
 with air navigation service providers (ANSPs) around
 the globe.
Thank You !!!

Más contenido relacionado

La actualidad más candente

Aviation security -_chpt1
Aviation security -_chpt1Aviation security -_chpt1
Aviation security -_chpt1
carlinclarke
 
Aviation accidents and incidents
Aviation accidents and incidentsAviation accidents and incidents
Aviation accidents and incidents
stargate1280
 
AVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATIONAVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATION
Paul Mears Phd.
 

La actualidad más candente (20)

Aviation security -_chpt1
Aviation security -_chpt1Aviation security -_chpt1
Aviation security -_chpt1
 
Security Aspects in Aviation Sector
Security Aspects in Aviation SectorSecurity Aspects in Aviation Sector
Security Aspects in Aviation Sector
 
Air traffic control & air navigation
Air traffic control & air navigationAir traffic control & air navigation
Air traffic control & air navigation
 
ACARS
ACARSACARS
ACARS
 
Aviation accidents and incidents
Aviation accidents and incidentsAviation accidents and incidents
Aviation accidents and incidents
 
Aircraft accident investigation ppt
Aircraft accident investigation   pptAircraft accident investigation   ppt
Aircraft accident investigation ppt
 
General Aviation Security
General Aviation SecurityGeneral Aviation Security
General Aviation Security
 
Human factors for crew&members
Human factors for crew&membersHuman factors for crew&members
Human factors for crew&members
 
Aviation Safety Training
Aviation Safety TrainingAviation Safety Training
Aviation Safety Training
 
ACARS
ACARSACARS
ACARS
 
Cold weather operations
Cold weather operationsCold weather operations
Cold weather operations
 
Safety Management Systems (SMS) Fundmentals: Policy
Safety Management Systems (SMS) Fundmentals: PolicySafety Management Systems (SMS) Fundmentals: Policy
Safety Management Systems (SMS) Fundmentals: Policy
 
AIRPORT EMERGENCY PLAN FAAN.pdf
AIRPORT EMERGENCY PLAN FAAN.pdfAIRPORT EMERGENCY PLAN FAAN.pdf
AIRPORT EMERGENCY PLAN FAAN.pdf
 
Introduction to Air Traffic Management
Introduction to Air Traffic ManagementIntroduction to Air Traffic Management
Introduction to Air Traffic Management
 
AVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATIONAVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATION
 
Comparison of Bombardier Q400 & ATR 72
Comparison of Bombardier Q400 &  ATR 72Comparison of Bombardier Q400 &  ATR 72
Comparison of Bombardier Q400 & ATR 72
 
Aeronautical Decision Making And Risk Management For Pilots
Aeronautical Decision Making And Risk Management For PilotsAeronautical Decision Making And Risk Management For Pilots
Aeronautical Decision Making And Risk Management For Pilots
 
Aviation safety management
Aviation safety managementAviation safety management
Aviation safety management
 
AEP
AEPAEP
AEP
 
AUTOMOTIVE CYBER SECURITY PPT
AUTOMOTIVE CYBER SECURITY PPTAUTOMOTIVE CYBER SECURITY PPT
AUTOMOTIVE CYBER SECURITY PPT
 

Destacado

cyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIcyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNI
fEngel
 
Airport security 2013 cyber security panel discussion
Airport security 2013   cyber security panel discussionAirport security 2013   cyber security panel discussion
Airport security 2013 cyber security panel discussion
Russell Publishing
 
Business plan presentation
Business plan presentationBusiness plan presentation
Business plan presentation
Hamed Jabbari
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
june21harsh
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 

Destacado (17)

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
cyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIcyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNI
 
Airport security 2013 cyber security panel discussion
Airport security 2013   cyber security panel discussionAirport security 2013   cyber security panel discussion
Airport security 2013 cyber security panel discussion
 
Cyber Security in Transportation
Cyber Security in TransportationCyber Security in Transportation
Cyber Security in Transportation
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
Q1 2017 Rockwell Collins, Inc. Earnings Conference Call
Q1 2017 Rockwell Collins, Inc. Earnings Conference CallQ1 2017 Rockwell Collins, Inc. Earnings Conference Call
Q1 2017 Rockwell Collins, Inc. Earnings Conference Call
 
Cyber Security: Protecting Today's Mission Critical Public Safety Networks
Cyber Security: Protecting Today's Mission Critical Public Safety NetworksCyber Security: Protecting Today's Mission Critical Public Safety Networks
Cyber Security: Protecting Today's Mission Critical Public Safety Networks
 
Business Values for IoT Solutions
Business Values for IoT SolutionsBusiness Values for IoT Solutions
Business Values for IoT Solutions
 
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdfCyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf
 
Business plan presentation
Business plan presentationBusiness plan presentation
Business plan presentation
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar a Cyber Security in Civil Aviation

Adv_Low_Vis_Tech_B_English
Adv_Low_Vis_Tech_B_EnglishAdv_Low_Vis_Tech_B_English
Adv_Low_Vis_Tech_B_English
Brian O'Donnell
 
Running head Fiber Optic SecurityFiber Op.docx
Running head Fiber Optic SecurityFiber Op.docxRunning head Fiber Optic SecurityFiber Op.docx
Running head Fiber Optic SecurityFiber Op.docx
wlynn1
 
Infrastucture Harmonization - Vision Series
Infrastucture Harmonization - Vision SeriesInfrastucture Harmonization - Vision Series
Infrastucture Harmonization - Vision Series
Eric Jacobs
 
Cost of dependency on TCPIP based Aircrafts
Cost of dependency on TCPIP based AircraftsCost of dependency on TCPIP based Aircrafts
Cost of dependency on TCPIP based Aircrafts
Ambreen Zafar
 
Connected Aircraft White Paper Aug 2015
Connected Aircraft White Paper Aug 2015Connected Aircraft White Paper Aug 2015
Connected Aircraft White Paper Aug 2015
Josh Marks
 

Similar a Cyber Security in Civil Aviation (20)

Nextgen
NextgenNextgen
Nextgen
 
0503 al achkar-jabbour_lebanese_univ_rev
0503 al achkar-jabbour_lebanese_univ_rev0503 al achkar-jabbour_lebanese_univ_rev
0503 al achkar-jabbour_lebanese_univ_rev
 
Air Traffic Control Using Ad Hoc Networking
Air Traffic Control Using Ad Hoc NetworkingAir Traffic Control Using Ad Hoc Networking
Air Traffic Control Using Ad Hoc Networking
 
Adv_Low_Vis_Tech_B_English
Adv_Low_Vis_Tech_B_EnglishAdv_Low_Vis_Tech_B_English
Adv_Low_Vis_Tech_B_English
 
Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Conne...
Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Conne...Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Conne...
Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Conne...
 
ASL_V25N4_rao
ASL_V25N4_raoASL_V25N4_rao
ASL_V25N4_rao
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
Quick History and Notable Successes in Aviation Weather Safety
Quick History and Notable Successes in Aviation Weather SafetyQuick History and Notable Successes in Aviation Weather Safety
Quick History and Notable Successes in Aviation Weather Safety
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
 
Running head Fiber Optic SecurityFiber Op.docx
Running head Fiber Optic SecurityFiber Op.docxRunning head Fiber Optic SecurityFiber Op.docx
Running head Fiber Optic SecurityFiber Op.docx
 
Infrastucture Harmonization - Vision Series
Infrastucture Harmonization - Vision SeriesInfrastucture Harmonization - Vision Series
Infrastucture Harmonization - Vision Series
 
Jb3515641568
Jb3515641568Jb3515641568
Jb3515641568
 
Cost of dependency on TCPIP based Aircrafts
Cost of dependency on TCPIP based AircraftsCost of dependency on TCPIP based Aircrafts
Cost of dependency on TCPIP based Aircrafts
 
Drone Guardian: Countering the drone threat to commercial airports
Drone Guardian: Countering the drone threat to commercial airportsDrone Guardian: Countering the drone threat to commercial airports
Drone Guardian: Countering the drone threat to commercial airports
 
Connected Aircraft White Paper Aug 2015
Connected Aircraft White Paper Aug 2015Connected Aircraft White Paper Aug 2015
Connected Aircraft White Paper Aug 2015
 
Hyperelliptic curve based authentication for the internet of drones
Hyperelliptic curve based authentication for the internet of  dronesHyperelliptic curve based authentication for the internet of  drones
Hyperelliptic curve based authentication for the internet of drones
 
Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...
Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...
Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...
 
White paper: Enhance mobility and driver experience with multihop data exchan...
White paper: Enhance mobility and driver experience with multihop data exchan...White paper: Enhance mobility and driver experience with multihop data exchan...
White paper: Enhance mobility and driver experience with multihop data exchan...
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 

Más de Network Intelligence India

Más de Network Intelligence India (20)

Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
 
The Economics of Security
The Economics of SecurityThe Economics of Security
The Economics of Security
 
Web Application Security Strategy
Web Application Security Strategy Web Application Security Strategy
Web Application Security Strategy
 
ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics Implementation
 
National Cyber Security Policy 2013
National Cyber Security Policy 2013National Cyber Security Policy 2013
National Cyber Security Policy 2013
 
RBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on ITRBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on IT
 
PCI DSS for Penetration Testing
PCI DSS for Penetration TestingPCI DSS for Penetration Testing
PCI DSS for Penetration Testing
 
Understanding Governance
Understanding GovernanceUnderstanding Governance
Understanding Governance
 
Spear Phishing Methodology
Spear Phishing MethodologySpear Phishing Methodology
Spear Phishing Methodology
 
Mobile Device Management (MDM)
Mobile Device Management (MDM)Mobile Device Management (MDM)
Mobile Device Management (MDM)
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Distributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing MethodologyDistributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing Methodology
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
XML Interfaces to the popular Nessus Scanner
XML Interfaces to the popular Nessus ScannerXML Interfaces to the popular Nessus Scanner
XML Interfaces to the popular Nessus Scanner
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
 
Application security enterprise strategies
Application security enterprise strategiesApplication security enterprise strategies
Application security enterprise strategies
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 

Cyber Security in Civil Aviation

  • 1. With Ref to Doc ICAO 12-WP/122
  • 2. ICAO – International Civil Aviation Organization
  • 4. • Cyber security is an issue because many civil aviation organizations rely on electronic systems for critical parts of their operations, including safety-critical functions. The protection of electronic systems from malicious electronic attack (unlawful interference) and the means of dealing with the consequences of such attacks is encompassed by the term cyber security. It comprises managerial, operational and technical activities, and relates to the electronic systems themselves and to the information held and processed by such systems. Cyber security is also often referred to as information security, and while the two terms are not synonymous they are similar enough that the differences can be ignored in this context.
  • 5. Currently cyber security is a relatively minor issue in civil aviation, but this is changing. Although the adoption of new technology is an ongoing activity in civil aviation, the current pace and extent of new information technologies is notably increasing the risk from cyber attacks. This is due to a number of factors: • There is an increased reliance on a small number of technologies, such as Linux, Windows, IPv6 protocols and Ethernet (AFDX), and these technologies are widely used in the IT industry • As a result there is widespread understanding of these technologies, and of their weaknesses and vulnerabilities • Systems are becoming more interconnected and security lapses in one system are likely to affect others •There is greater impact from systems failures due to increased reliance on them.
  • 6. • Over and above these factors, there is the potential for unforeseen systematic problems due to weaknesses in oversight. This is mainly due to a lack of coherence between the many groups working on cyber security, and a lack of expertise and understanding amongst those who might provide the coherence. Some knowledge of these problems exists within the industry, but knowledge of the big picture is more limited.
  • 7. • ICAO estimates that US$120 billion will be spent on the transformation of air transportation systems in the next ten to fifteen years. This transformation will bring significant benefits for safety, efficiency and the environment. Stakeholders, including service providers, regulators, airspace users and manufacturers, will face increased levels of interaction as new, modernized ATM operations are implemented. Security issues related to the transformation of the aviation system are coming into view, issues that will require closer collaboration among experts in safety and security disciplines. As the agenda for AN-Conf/12 states, security matters should be considered in the system changes that lie ahead.
  • 8. Technologies Involved NextGen – Next Generation Air Transportation System  The Next Generation Air Transportation System (NextGen) is the name given to a new National Airspace System due for implementation across the United States in stages between 2012 and 2025.  The Next Generation Air Transportation System (NextGen) proposes to transform America’s air traffic control system from an aging ground-based system to a satellite-based system.  GPS technology will be used to shorten routes, save time and fuel, reduce traffic delays, increase capacity, and permit controllers to
  • 9. Elements within NextGen Automatic dependent surveillance-broadcast(ADS-B). ADS-B will use Global Positioning System (GPS) satellite signals to provide air traffic controllers and pilots with much more accurate information that will help to keep aircraft safely separated in the sky and on runways. Aircraft transponders receive GPS signals and use them to determine the aircraft's precise position in the sky. These and other data are then broadcast to other aircraft and air traffic control. Once fully established, both pilots and air traffic controllers will, for the first time, see the same real- time display of air traffic, substantially improving safety.
  • 10. • Next Generation Data Communications Current communications between aircrew and air traffic control, and between air traffic controllers, are largely realised through voice communications. Initially, the introduction of data communications will provide an additional means of two-way communication for air traffic control clearances, instructions, advisories, flight crew requests and reports. With the majority of aircraft data link equipped, the exchange of routine controller-pilot messages and clearances via data link will enable controllers to handle more traffic. This will improve air traffic controller productivity, enhancing capacity and safety.
  • 11. • Next Generation Network Enabled Weather (NNEW) Seventy percent of NAS delays are attributed to weather every year. The goal of NNEW is to cut weather-related delays at least in half. Tens of thousands of global weather observations and sensor reports from ground-, airborne- and space- based sources will fuse into a single national weather information system, updated in real time. NNEW will provide a common weather picture across the national airspace system, and enable better air transportation decision making.
  • 12. • System Wide Information Management (SWIM). SWIM will provide a single infrastructure and information management system to deliver data to many users and applications. By reducing the number and types of interfaces and systems, SWIM will reduce data redundancy and better facilitate multi-user information sharing. SWIM will also enable new modes of decision making as information is more easily accessed.
  • 13. • NAS voice switch (NVS). There are currently seventeen different voice switching systems in the NAS, some in use for more than twenty years. NVS will replace these systems with a single air/ground and ground/ground voice communications system.
  • 15. SSR Transponder (Secondary Surveillance Radar)
  • 16.
  • 17.
  • 18. Incidents and Vulnerabilities In late 2009, Newark Liberty International airport experienced sporadic outages of the GPS Ground Based Augmentation System (GBAS), used for precision approach landing, were observed for several weeks. Though not a directed cyber security attack, this event shows the potential impact that could occur in a jamming scenario. The ground station, located approximately 300 feet away from the New Jersey Turnpike experienced signal interference every day about the same time. After an investigation, the FAA discovered the cause of the outage: a passing truck driver on the turnpike using a widely available $33 personal GPS jammer to avoid being tracked by the employer.
  • 19. An extract from the media in July 2012: “At a recent conference Dr. Andrei Costin gave an unnerving demonstration of weaknesses in the air traffic control systems coming into use. He showed that with just $2 000 worth of store- bought electronics an ADS-B beacon could be ‘spoofed’ to show that a non-existent aircraft was coming in to land. This ‘Ghost Plane’ presentation was possible because air traffic control systems have no way of verifying where messages are coming from”
  • 20.
  • 21. Since ADS-B is supposed to support mission-critical automatic and human decisions, and have direct impact on the overall air-traffic safety, it is imperative that technology behind ADS-B meets operational, performance and security requirements. However, the main problem with ADS-B is the lack security mechanisms, specifically: • lack of entity authentication to protect against message injection from unauthorized entities. • lack of message signatures or authentication codes to protect against tampering of messages or impersonating aircrafts. • lack of message encryption to protect against eavesdropping. • lack of challenge-response mechanisms to protect against replay attacks. • lack of ephemeral identifiers to protect against privacy tracking attacks. We did not include Denial of service (DoS), e.g., by jamming radio signals, because it affects RF-based communication in general, and is not specific to ADS-B.
  • 22. Threats ADS-B Jamming, denial of service Eavesdropping Spoofing, impersonation Message injection/replay Message manipulation
  • 23. There have been incidents involving crashes or tail strikes when flight crew have made errors in calculating take-off performance parameters using electronic flight bags (EFBs). These were the result of human error, but there is the potential for the EFB programming to be corrupted maliciously (hacked), particularly when these devices are connected to external networks to receive updates.
  • 24. Conclusion & Recommendation recognize the risks in the current situation and the potential for future problems create a Cyber Security Task Force (CSTF) to evaluate the extent of the problem and draw up a global cyber security architecture, which includes contributions from industry
  • 25. Cont.. encourage states to provide the Aeronautical Communications Panel (ACP) with the resources to complete its work in developing a robust, secure aeronautical telecommunication network (ATN) using IPV6 as a foundational part of the next generation air traffic management systems encourage States and industry to contribute to the work of the CSTF to ensure aircraft can interoperate with air navigation service providers (ANSPs) around the globe.