Aircraft Cyber Security Risk Assessment: Bringing Air Traffic Control and Cyber-Physical Security to the Forefront

2019 ◽  
Author(s):  
Krishna Sampigethaya
2021 ◽  
Vol 9 (12) ◽  
pp. 1384
Author(s):  
Iosif Progoulakis ◽  
Paul Rohmeyer ◽  
Nikitas Nikitakos

The integration of IT, OT, and human factor elements in maritime assets is critical for their efficient and safe operation and performance. This integration defines cyber physical systems and involves a number of IT and OT components, systems, and functions that involve multiple and diverse communication paths that are technologically and operationally evolving along with credible cyber security threats. These cyber security threats and risks as well as a number of known security breach scenarios are described in this paper to highlight the evolution of cyber physical systems in the maritime domain and their emerging cyber vulnerabilities. Current industry and governmental standards and directives related to cyber security in the maritime domain attempt to enforce the regulatory compliance and reinforce asset cyber security integrity for optimum and safe performance with limited focus, however, in the existing OT infrastructure and systems. The use of outside-of-the-maritime industry security risk assessment tools and processes, such the API STD 780 Security Risk Assessment (SRA) and the Bow Tie Analysis methodologies, can assist the asset owner to assess its IT and OT infrastructure for cyber and physical security vulnerabilities and allocate proper mitigation measures assuming their similarities to ICS infrastructure. The application of cyber security controls deriving from the adaptation of the NIST CSF and the MITRE ATT&CK Threat Model can further increase the cyber security integrity of maritime assets, assuming they are periodically evaluated for their effectiveness and applicability. Finally, the improvement in communication among stakeholders, the increase in operational and technical cyber and physical security resiliency, and the increase in operational cyber security awareness would be further increased for maritime assets by the convergence of the distinct physical and cyber security functions as well as onshore- and offshore-based cyber infrastructure of maritime companies and asset owners.


Author(s):  
Priyanka Peter ◽  
Prof. Vaibhav S. Umap

Aviation crashes all over the world have recently been on the high rise, stemming from negligence, mechanical faults, weather, ground control errors, pilot errors, taxing and maintenance crew errors as are probable reasons for such accidents. This case study models the probabilistic risk assessment of runway incursion data endeavored to determine the correlation in between the reported incursions that occurred at Nagpur airport between fiscal years 2005 and 2015 and the meteorological conditions, times of day, and presence of an air traffic control tower of Nagpur Airport. With runway incursions long-plaguing the safety of aviators, their passengers, and aviation refining the body of knowledge underpinning incursions coupled with ongoing prevention efforts aspire to diminish the annual incidence of incursions, increase safety, and save lives. In accordance with this mission, mining the Civil Organization (ICAO), and Federal Aviation Association (FAA) runway incursion databases and analyzing the resulting hours, and at airport with an air traffic control tower.


2018 ◽  
pp. 192-211
Author(s):  
Harold Patrick ◽  
Ziska Fields

Information technology is rapidly increasing and evolving all the time in pursuit for better solutions and products for the digitized world. Technology advancement and greater connectivity has moved organizations to better economic markets for sustainability. Together with better technology and greater connectivity, cybercrime is swiftly growing on par with these developments. This chapter focuses on the cyber security landscape and threats faced by organizations. The growth and sophistication of cybercrime is stressed. Cyber security creative approaches security risk assessment, cloud collaboration and data analytics are provided. This chapter ends with propositions that security creative approaches should be used as a method of managing cybercrime and ensuring that the organization's sustainability and governance are improved.


2014 ◽  
Vol 1030-1032 ◽  
pp. 2028-2033
Author(s):  
Zhao Ning Zhang ◽  
Hui Qiao ◽  
Ting Ting Lu

Paired departure to closed spaced parallel runways can effectively improve capacity of terminal, and also can solve congestion of busy airport, but it also increases the complexity of air traffic control .For ensuring safety operation of paired departure, the longitudinal collision risk of paired departure to closed spaced parallel runways was studied. Based on the acceleration error distribution and requirements on wake avoidance during paired departure, a longitudinal collision risk safety assessment model of closed spaced parallel runways paired departure was built. The parameters in this model were determined by providing the calculation models. In the end, an example was calculated to verify the model, and it turns out that this model is feasible.


Sign in / Sign up

Export Citation Format

Share Document