Aviation and Air Traffic Control in particular risk to be a prominent target for hackers. There is no reason to panic, as there are solutions. But the technical teams, ATSEP in particular need to get active, now!
June and July 2021 were shocking for the interconnected world. Supposedly protected areas like the American gas pipelines, the Irish health system, Air India, and now central American cloud service providers were compromised by hackers, demanding (and partially getting) high amounts of ransom.
Since March 2020, attacks have become more intelligent. Classical security services like the Microsoft Defender are not bullet proof anymore (as stated by Gartner).
We get lots of requests on what to do. The first step, to quote Douglas Adams: "Don't Panic !"
Panic will only lead to immature solutions and risks to create even more open flanks for hackers.
I would like to develop an answer in 4 steps:
You cannot completely protect your infrastructure against attacks. But you can get very close. It is in fact a cat and mouse game of attackers finding new loopholes and defenders closing them. And for the case, that attacks success in bypassing the security systems, ATC needs subsequent breach & attack detection (and elimination).
We speak of attack vectors when we talk of the means, by which the intruder gets access. The attack surface is the area that is being attacked. Mary Shacklett published a nice article on TechTarget, for those who want to dive deeper.
Important to know: there are
Attacks can only get in, when there are weak flanks.
We can divide them into
And who are these hackers. There are two main groups:
A third group are political activists who want a reach a political goal, independent of any official body. A small group consists of joyriders who attack for fun. This can be a costly hobby, especially for the parents when these attackers are minors.
We cannot close these loopholes by a100%. But we can get very close and avoid damage.
We could hermetically seal off systems. Disconnect them from the outside world. However offline-subsystems are increasingly impossible in our data- and AI-driven world.
A major step into the right direction is to set up cryptographic public key infrastructures (PKI), where the keys are generated in a highly protected hardware security module (HSM). Public key infrastructures are procedures implemented across specific hardware and software which manage digital certificates and keys. These certificates and keys are used to encrypt data at rest, in use or in transit, so that no unauthorized person or system can read it. Everything within an organization should be protected. Even a firewall is powered by such a key. All your financial transactions are too.
An intruder who cannot access or read data is helpless1).
But these certificates and keys are used for more. Digital identities assign a certificate to a person, and the authenticity of that person is supervised by a certificate authority (which is a system, controlled by security experts). To make it really safe, digital identities should be verified by Qualified Trust Service Providers. These are external organizations, certified by governments, e.g., by the European Commission in compliance with the eIDAS regulation.
Also systems (like the computer of an employee or a radar) can be protected by such keys and certificates. Modern publications use the word "machines" to describe such systems, and "machine identity". The cartridge term "machine" embraces mobile devices, Internet of Things (IoT) devices including radars, Network appliances and routers, Web services and application servers, cloud instances, containers, microservices, clusters or smart algorithms. All those "machines" can get a specific cryptographic identity. So the tower will always know whether data is really coming from a radar / employee, or from a malicious agent.
When enforcing multifactor authentication (e.g. a password, an sms TAN combined with a digital identity or a biometric recognition system), hackers really have difficulties in breaking into a system. Let us not talk about simple password protected systems in ATC. Such a policy is simply grossly negligent.
There are three layers of systems which are needed in ATC
The NIST has published a nice list of pros and cons for either of these solutions.
Our standpoint is clear:
ATC can implement such a bipedal solution through a staged approach:
Gartner by the way highlighted cyber-savvy boards as one of the top 3 trends in cyber-defense.
SkyRadar can help you with our Breach, Attack and Defense Simulator for Cybersecurity in ATC.
1) Comment on the statement: "An intruder who cannot access or read data is helpless":
I discussed this simplified statement with the cryptography expert Martin Rupp. The statement is valid with respect to data privacy. The hacker cannot decrypt the data as long as he does not have the key. However he could over-encrypt the data a second time with a key, unknown to the owner of the data. That would enable him to ask for ransom money in exchange of turning data readable again. From that point of view, threat defense and analytics is very important.
The author, Dr. Ulrich Scholten is cofounder of SkyRadar. He has been working on internet platforms since the early 2000s. Ulrich holds a PhD in information technology. He is author / editor of articles on cybersecurity with more than 30.000 monthly readers. His research is regularly published in highly rated journals and conference papers.