Skip to main content

Currently Skimming:


Pages 65-69

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 65...
... 65 It is no longer a question of if your organization will be attacked, it is a question of when. This chapter describes techniques that airports can follow to detect, respond, and recover from cybersecurity attacks.
From page 66...
... 66 Guidebook on Best Practices for Airport Cybersecurity be able to spot anomalies that will help you identify an attack" (Karol 2013)
From page 67...
... Detecting, Responding to, and Recovering from Attacks 67 managers but also the IT and facility project managers, who may be more familiar with the technical requirements, should conduct these reviews. The detection of attacks and inappropriately applied countermeasures is a large but critical task.
From page 68...
... 68 Guidebook on Best Practices for Airport Cybersecurity All response activities should adhere to the airport's policy and procedures. Since time is of the essence during a response, individuals who fulfill the roles required during a response should already be aware of and trained on these policies and procedures.
From page 69...
... Detecting, Responding to, and Recovering from Attacks 69 common goal of an attack. If such credentials are or are suspected of being lost, they should be reset so that users have to establish new passwords or are issued new user identifiers.

Key Terms



This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.