National Academies Press: OpenBook

Guidebook on Best Practices for Airport Cybersecurity (2015)

Chapter: Chapter 1 - Introduction

« Previous: Summary
Page 4
Suggested Citation:"Chapter 1 - Introduction." National Academies of Sciences, Engineering, and Medicine. 2015. Guidebook on Best Practices for Airport Cybersecurity. Washington, DC: The National Academies Press. doi: 10.17226/22116.
×
Page 4
Page 5
Suggested Citation:"Chapter 1 - Introduction." National Academies of Sciences, Engineering, and Medicine. 2015. Guidebook on Best Practices for Airport Cybersecurity. Washington, DC: The National Academies Press. doi: 10.17226/22116.
×
Page 5
Page 6
Suggested Citation:"Chapter 1 - Introduction." National Academies of Sciences, Engineering, and Medicine. 2015. Guidebook on Best Practices for Airport Cybersecurity. Washington, DC: The National Academies Press. doi: 10.17226/22116.
×
Page 6

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

4An increased use of technology within an environment of increasing threat necessitates a vigilant approach to cybersecurity. Airport managers and staff; airline, concession, and other tenants; contractors and consultants; travelers; and shippers are progressively reliant on computers, electronic devices, and network infrastructure. These rapidly advancing technologies offer better service, enhanced capacity, improved safety, and operational efficiency. Unfortunately, they also increase an airport’s exposure to individuals, organizations, and countries looking to cause disruption, steal information, or harm critical infrastructure by exploiting weaknesses in technology. They also create opportunities for insiders to deliberately cause harm or well-intentioned individuals to make mistakes that can have similar consequences. An increased use of technology within an environment of increasing threat necessitates a vigilant approach to cybersecurity. The objective of this guidebook is to provide guidance that will help airports achieve that vigilance by implementing cybersecurity best practices. It offers an approach to identifying threats, prioritizing them based on the potential impact they may have on critical systems, and implementing countermeasures that can help airports prevent and recover from successful attacks. These guidelines will help airports establish an effective cybersecurity program that fits their budget and technical capabilities. They can also help airports that already have an established cybersecurity program validate or improve their program based on industry best practices. The best practices are based on lessons learned from peer airports as well as organizations in financial, health care, utility transmission, communications, and defense industries. This guidebook also identifies government resources, guidelines, policies, and regulations that have been rapidly emerging to help thwart the growing threat of cyberattack within the United States. Private-sector resources are described along with suggestions on how to identify and select the most appropriate product or resource. After this introduction, Chapter 2 of this guidebook defines cybersecurity and highlights why it is a subject of growing importance. Chapter 3 offers an approach to addressing the cybersecurity needs of an airport, detailing the threats that exist, the airport systems that may be vulnerable, and the countermeasures that can be taken to reduce those vulnerabilities or to respond if an attack is successful. These and other basic terms are shown conceptually in Figure 1. Chapter 4 provides specific details on implementing countermeasures in key areas of vulnerability. Each area is introduced; common threats are identified; countermeasures are recommended; and additional resources are offered. Chapter 5 provides guidance on establishing and maintaining a cybersecurity program based on industry best practices. Throughout the guidebook symbols are used to denote threats ( ), affected data and systems ( ), countermeasures ( ), and resources ( ). This guidance is intended to help those responsible for cybersecurity at an airport prioritize, fund, and execute the most relevant aspects of a strong program. Finally, the guidebook identi- fies ongoing activities that airports should follow to detect and respond to attacks. Appendixes C H A P T E R 1 Introduction This report provides guidance on establishing and maintaining a cybersecurity program based on industry best practices.

Introduction 5 provide a glossary of relevant terms. Throughout the guidebook are references to literature and public resources that airport managers and staff may find helpful. Research findings from this project indicate that chief information officers (CIOs), IT managers, CISOs, cybersecurity managers, other staff positions, and a few chief executive officers (CEOs) [based on 41 of 44 (93%) of those that responded to the question] are the ones responsible for establishing and maintaining airport cybersecurity programs. This guidebook is intended to help them fulfill this responsibility by offering guidance, resources, and tools. This guidebook is accompanied by a CD containing multimedia material that offers airports training, documentation, tools, and resources that they can leverage to cost-effectively implement cybersecurity best practices. The audience for this multimedia material encompasses airport senior management, IT managers, department managers, and staff. Other airport stakeholders such as agencies that oversee airports, airlines, concessionaires, consultants, contractors, and others may find the material helpful as well. Both this written guidebook and the accompanying multimedia material are organized to make it easy for readers to find the material best suited for them. This multimedia material should work on any computer and does not require technical expertise to use. Figure 1. Basic cybersecurity terms. Content that is supported by relevant multimedia material is highlighted with an icon (shown at left) and enclosed in a box. Instructions on how to use the multimedia material can be found in Appendix D. This guidebook and the accompanying multimedia material were developed based on targeted industry research as well as on the experience of the research team and its advisors. The research started with a literature search to identify relevant (and credible) research papers, journal articles, conference proceedings, research papers, and books on airport cybersecurity and related topics. These documents were reviewed and relevant findings were extracted and included in the report, as cited. In addition, dialogue with the growing number of researchers, committee chairs, and association members who are focused on cybersecurity helped identify the current state of prac- tice. Next, airports and other relevant organizations were asked to complete an online survey,

6 Guidebook on Best Practices for Airport Cybersecurity the results of which are incorporated into these materials. Although care must be taken when interpreting the results of any small population survey, the findings and trends identified are supportive. The survey led to face-to-face and telephone interviews with personnel at airports that have exemplary cybersecurity programs as well as industry, government, and private-sector providers who supplied complementary information and resources. The project deliverables also benefitted from the years of experience and background of the research team. The research team included individuals each with decades of experience in air- port IT or cybersecurity. It was augmented by a team member with many years of experience in implementing cybersecurity best practices within the financial sector. Team advisors from a major airport’s IT department helped ensure the results are applicable within typical airport organizations. The research that was conducted was also guided by a panel of experts assembled by the Airport Cooperative Research Program (ACRP). This panel included airport IT managers, representatives from federal agencies, an airport industry association, and consultants focused on cybersecurity. Their guidance during the proposal development, work planning, interim, and final deliverable stages of this project ensured that the guidebook addresses airport industry cybersecurity needs. Although the collective efforts of the research team, advisors, and panel members have con- tributed to the applicability, the thoroughness, and the quality of this guidebook, there are some inherent limitations: • The realm of cybersecurity is rapidly changing. This guidebook was written to have as much longevity as possible but to provide specifics; it is likely that some findings will soon be out of date. • Much of the information provided was shared on the condition of anonymity because of its sensitive, proprietary, or confidential nature. The result is that many of the findings are gen- eralized indicating the proportion, trend, or type of respondent and not providing details that respondents asked not be shared. • Care was taken to ensure that the information provided in this guidebook can be used to help airports protect themselves against cyberattack but that it did not provide details that would help potential attackers. This concern is shared by authors of similar documents in the indus- try. Some industry experts, however, suggest that modern cybercriminals are very sophisti- cated and not likely informed by guidance such as found in these deliverables. It was further noted that many of the protective measures that can have a significant impact are commonly known, just not commonly implemented. • There are many private-sector products and resources that can help airports establish and maintain cybersecurity programs. Recommendations of individual companies or consultants, however, are not provided in this guidebook or the accompanying multimedia material. To help address these limitations, the following forums are recommended and may provide the longevity, specifics, and referrals that this guidebook cannot. They are provided as a means of augmenting the resources cited in the remainder of the guidebook. Airports Council International–North America’s Business Information Technology Committee: www.aci-na.org/committee/business-information-technology/ Aviation Information Sharing and Analysis Center: a-isac.com/ Multi-State Information Sharing and Analysis Center: msisac.cisecurity.org/ National Crime Information Center: fas.org/irp/agency/doj/fbi/is/ncic.htm/ National Institute of Standards and Technology: www.nist.gov TRB’s Cybersecurity Subcommittee (sponsored under ABE40): www.abj50.org/subcommittees/ cybersecurity/

Next: Chapter 2 - What Is Cybersecurity? »
Guidebook on Best Practices for Airport Cybersecurity Get This Book
×
 Guidebook on Best Practices for Airport Cybersecurity
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

TRB’s Airport Cooperative Research Program (ACRP) Report 140: Guidebook on Best Practices for Airport Cybersecurity provides information designed to help reduce or mitigate inherent risks of cyberattacks on technology-based systems.

Traditional IT infrastructure such as servers, desktops, and network devices are covered along with increasingly sophisticated and interconnected industrial control systems, such as baggage handling, temperature control, and airfield lighting systems.

The guidebook also includes a CD-ROM of multimedia material that may be used to educate all staff at airports about the need, and how, to be diligent against cybersecurity threats.

The CD-ROM is also available for download from TRB’s website as an ISO image. Links to the ISO image and instructions for burning a CD-ROM from an ISO image are provided below.

Help on Burning an .ISO CD-ROM Image

Download the .ISO CD-ROM Image

(Warning: This is a large file and may take some time to download using a high-speed connection.)

CD-ROM Disclaimer - This software is offered as is, without warranty or promise of support of any kind either expressed or implied. Under no circumstance will the National Academy of Sciences or the Transportation Research Board (collectively "TRB") be liable for any loss or damage caused by the installation or operation of this product. TRB makes no representation or warranty of any kind, expressed or implied, in fact or in law, including without limitation, the warranty of merchantability or the warranty of fitness for a particular purpose, and shall not in any case be liable for any consequential or special damages.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!