Guidebook on best practices for airport cybersecurity
Material type: TextSeries: Airport cooperative research program ; ACRP Report no.140Publication details: Washington D.C. Transportation Research Board 2015Description: viii,151p.CD-ROMISBN:- 9780309308809
- 387.7364 MUR
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|
Book | CEPT Library | Faculty of Planning | 387.7364 MUR | Available | 014462 | |||
Non Book Material | CEPT Library | NBK | 387.7364 MUR | Available | 014462/CD |
CONTENTS
Summary
Chapter 1 Introduction 1
Chapter 2 What Is Cybersecurity? 4
Chapter 3 An Approach to Cybersecurity at Airports 10
Overview 10
Primary Activities 10
Key Roles and Responsibilities 12
Cybersecurity Tasks 12
Threats 14
Affected Data and Systems 15
Countermeasures 18
Chapter 4 Implementing Countermeasures 20
Airport Systems 20
IT Infrastructure 20
End-Point Systems 22
Industrial Control Systems 23
Wi-Fi 26
Cloud-Based Services 27
Global Positioning System 28
Human Considerations 28
Social Engineering 29
Bring Your Own Device 30
Use of Social Media 32
Malicious Insiders 33
Service Providers 34
Service Providers That Can Increase the Likelihood of a Cyberattack 34
Service Providers That Help Protect an Airport 35
Passengers, Greeters, and Other Occupants 37
Private, Confidential, and Sensitive Information 38
Chapter 5 Developing a Cybersecurity Program 39
Cybersecurity Governance 39
Legal Requirements and Regulation 40
Standards and Guidelines 41
Payment Card Industry Data Security Standards 43
Policies 46
Contracts and Procurement Considerations 47
Software and Information Security Assurance 49
Resources Required 51
Staffing 52
Funding 56
External Support 58
Cybersecurity Training 59
Awareness Training 60
Specialized Training 61
Training Resources 62
Sustaining a Cybersecurity Program 62
Risk of Implementing a Cybersecurity Program 63
Chapter 6 Detecting, Responding to, and Recovering from Attacks 65
Detecting Attacks 65
Responding to an Attack 67
Recovery to Normal Operations 68
Lessons Learned 69
Chapter 7 Conclusions and Suggested Research 70
Conclusions 70
Suggested Research 71
Glossary, Abbreviations, Acronyms, and Symbols 73
References 76
Appendix A Categorized List of Cybersecurity Threats 80
Appendix B Airport Systems 89
Appendix C Countermeasures 94
Appendix D Using the Multimedia Material 149
There are no comments on this title.