Twelfth air navigation conference


Download 47.03 Kb.
Pdf ko'rish
bet3/5
Sana09.03.2023
Hajmi47.03 Kb.
#1255215
1   2   3   4   5
Bog'liq
ANConfWP122.1.1.ENonly

DISCUSSION 
2.1 
There are already a number of examples of cyber security incidents and vulnerabilities: 
a) vulnerability: An extract from the media in July 2012: “At a recent conference Dr. Andrei 
Costin gave an unnerving demonstration of weaknesses in the air traffic control systems 
coming into use. He showed that with just $2 000 worth of store-bought electronics an ADS-
B beacon could be ‘spoofed’ to show that a non-existent aircraft was coming in to land. This 
‘Ghost Plane’ presentation was possible because air traffic control systems have no way of 
verifying where messages are coming from”; 


- 3 - 
AN-Conf/12-WP/122 
b) incident: Three software engineers were accused of disrupting operations at a new terminal at 
an airport in June 2011. They worked for a sub-contractor and when they didn’t get a pay rise 
they sabotaged the program code. Check-in services failed 3 days later, and 50 flights were 
delayed, causing knock-on delays elsewhere; 
c) vulnerability: There have been incidents involving crashes or tail strikes when flight crew 
have made errors in calculating take-off performance parameters using electronic flight bags 
(EFBs). These were the result of human error, but there is the potential for the EFB 
programming to be corrupted maliciously (hacked), particularly when these devices are 
connected to external networks to receive updates; and 
d) vulnerability: There is an increasing reliance on GPS systems for position, navigation and 
timing (PNT) services. However, reception of GPS signals can easily be jammed and there 
have been accidental and malicious incidents of jamming across metropolitan-scale areas. 
Too much reliance on GPS thus puts aviation services at risk if alternative PNT sources are 
not available. 
2.2 
It is also worth considering the systemic risks posed by the new, more interconnected systems. As 
an example there is the theoretical potential for a cyber attack to affect multiple connected systems, which could 
(in the future) have an effect analogous with the recent Icelandic volcanic ash problems, shutting down air travel 
across parts of Europe for several days. In that case estimated costs run into the billions of dollars or Euros: 

Download 47.03 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling