Image from Google Jackets

Guidebook on best practices for airport cybersecurity

By: Material type: TextTextSeries: Airport cooperative research program ; ACRP Report no.140Publication details: Washington D.C. Transportation Research Board 2015Description: viii,151p.CD-ROMISBN:
  • 9780309308809
Subject(s):
DDC classification:
  • 387.7364 MUR
Online resources:
Contents:
CONTENTS Summary Chapter 1 Introduction 1 Chapter 2 What Is Cybersecurity? 4 Chapter 3 An Approach to Cybersecurity at Airports 10 Overview 10 Primary Activities 10 Key Roles and Responsibilities 12 Cybersecurity Tasks 12 Threats 14 Affected Data and Systems 15 Countermeasures 18 Chapter 4 Implementing Countermeasures 20 Airport Systems 20 IT Infrastructure 20 End-Point Systems 22 Industrial Control Systems 23 Wi-Fi 26 Cloud-Based Services 27 Global Positioning System 28 Human Considerations 28 Social Engineering 29 Bring Your Own Device 30 Use of Social Media 32 Malicious Insiders 33 Service Providers 34 Service Providers That Can Increase the Likelihood of a Cyberattack 34 Service Providers That Help Protect an Airport 35 Passengers, Greeters, and Other Occupants 37 Private, Confidential, and Sensitive Information 38 Chapter 5 Developing a Cybersecurity Program 39 Cybersecurity Governance 39 Legal Requirements and Regulation 40 Standards and Guidelines 41 Payment Card Industry Data Security Standards 43 Policies 46 Contracts and Procurement Considerations 47 Software and Information Security Assurance 49 Resources Required 51 Staffing 52 Funding 56 External Support 58 Cybersecurity Training 59 Awareness Training 60 Specialized Training 61 Training Resources 62 Sustaining a Cybersecurity Program 62 Risk of Implementing a Cybersecurity Program 63 Chapter 6 Detecting, Responding to, and Recovering from Attacks 65 Detecting Attacks 65 Responding to an Attack 67 Recovery to Normal Operations 68 Lessons Learned 69 Chapter 7 Conclusions and Suggested Research 70 Conclusions 70 Suggested Research 71 Glossary, Abbreviations, Acronyms, and Symbols 73 References 76 Appendix A Categorized List of Cybersecurity Threats 80 Appendix B Airport Systems 89 Appendix C Countermeasures 94 Appendix D Using the Multimedia Material 149
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Book CEPT Library Faculty of Planning 387.7364 MUR Available 014462
Non Book Material CEPT Library NBK 387.7364 MUR Available 014462/CD
Total holds: 0

CONTENTS
Summary
Chapter 1 Introduction 1
Chapter 2 What Is Cybersecurity? 4
Chapter 3 An Approach to Cybersecurity at Airports 10
Overview 10
Primary Activities 10
Key Roles and Responsibilities 12
Cybersecurity Tasks 12
Threats 14
Affected Data and Systems 15
Countermeasures 18
Chapter 4 Implementing Countermeasures 20
Airport Systems 20
IT Infrastructure 20
End-Point Systems 22
Industrial Control Systems 23
Wi-Fi 26
Cloud-Based Services 27
Global Positioning System 28
Human Considerations 28
Social Engineering 29
Bring Your Own Device 30
Use of Social Media 32
Malicious Insiders 33
Service Providers 34
Service Providers That Can Increase the Likelihood of a Cyberattack 34
Service Providers That Help Protect an Airport 35
Passengers, Greeters, and Other Occupants 37
Private, Confidential, and Sensitive Information 38
Chapter 5 Developing a Cybersecurity Program 39
Cybersecurity Governance 39
Legal Requirements and Regulation 40
Standards and Guidelines 41
Payment Card Industry Data Security Standards 43
Policies 46
Contracts and Procurement Considerations 47
Software and Information Security Assurance 49
Resources Required 51
Staffing 52
Funding 56
External Support 58
Cybersecurity Training 59
Awareness Training 60
Specialized Training 61
Training Resources 62
Sustaining a Cybersecurity Program 62
Risk of Implementing a Cybersecurity Program 63
Chapter 6 Detecting, Responding to, and Recovering from Attacks 65
Detecting Attacks 65
Responding to an Attack 67
Recovery to Normal Operations 68
Lessons Learned 69
Chapter 7 Conclusions and Suggested Research 70
Conclusions 70
Suggested Research 71
Glossary, Abbreviations, Acronyms, and Symbols 73
References 76
Appendix A Categorized List of Cybersecurity Threats 80
Appendix B Airport Systems 89
Appendix C Countermeasures 94
Appendix D Using the Multimedia Material 149

There are no comments on this title.

to post a comment.
Excel To HTML using codebeautify.org Sheet Name :- Location Chart
Location Chart Basement 1 (B1) Class No. 600 - 649, 660 - 699
(B1) :Mezzanine 1 Class No. 700 - 728
(B1) :Mezzanine 2 Class No. 728.1 - 799, 650 - 659, Reference Books, Faculty work
Basement 2 (B2) Class No. 000 - 599, 800-999
Basement 3 (B3) (Please Inquire at the Counter for resources) Theses, Students' works, Bound Journals, Drawings, Atlas, Oversize Books, Rare Books, IS codes, Non-book Materials