Page 245 - DCAP104_EXPOSURE_TO_COMPUTER_DISCPLINES
P. 245

Exposure to Computer Disciplines



                   Notes                        Computer security is critical in almost any technology-driven industry which
                                                operates on computer systems. Computer security can also be referred to as
                                                computer safety. The issues of computer based systems and addressing their
                                                countless vulnerabilities are an integral part of maintaining an operational
                                                industry.

                                 13.1.5.1 Cloud Computing Security

                                 Security in the cloud is challenging, due to varied degree of security features and management
                                 schemes within the cloud entitites. In this connection one logical protocol base need to evolve so
                                 that the entire gamet of components operates synchronously and securely.

                                 13.1.5.2 In Aviation

                                 The aviation industry is especially important when analyzing computer security because the
                                 involved risks include human life, expensive equipment, cargo, and transportation infrastructure.
                                 Security can be compromised by hardware and software malpractice, human error, and faulty
                                 operating environments. Threats that exploit computer vulnerabilities can stem from sabotage,
                                 espionage, industrial competition, terrorist attack, mechanical malfunction, and human error.

                                 The consequences of a successful deliberate or inadvertent misuse of a computer system in the
                                 aviation industry range from loss of confidentiality to loss of system integrity, which may lead
                                 to more serious concerns such as data theft or loss, network and air traffic control outages, which
                                 in turn can lead to airport closures, loss of aircraft, loss of passenger life. Military systems that
                                 control munitions can pose an even greater risk.

                                 A proper attack does not need to be very high tech or well funded; for a power outage at an airport
                                 alone can cause repercussions worldwide. One of the easiest and, arguably, the most difficult to
                                 trace security vulnerabilities is achievable by transmitting unauthorized communications over
                                 specific radio frequencies. These transmissions may spoof air traffic controllers or simply disrupt
                                 communications altogether. These incidents are very common, having altered flight courses of
                                 commercial aircraft and caused panic and confusion in the past. Controlling aircraft over oceans
                                 is especially dangerous because radar surveillance only extends 175 to 225 miles offshore. Beyond
                                 the radar’s sight controllers must rely on periodic radio communications with a third party.
                                 Lightning, power fluctuations, surges, brown-outs, blown fuses, and various other power outages
                                 instantly disable all computer systems, since they are dependent on an electrical source. Other
                                 accidental and intentional faults have caused significant disruption of safety critical systems
                                 throughout the last few decades and dependence on reliable communication and electrical power
                                 only jeopardizes computer safety.
                                 13.1.5.3 Notable System Accidents

                                 In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory,
                                 the US Air Force’s main command and research facility. Using trojan horse viruses, hackers
                                 were able to obtain unrestricted access to Rome’s networking systems and remove traces of their
                                 activities. The intruders were able to obtain classified files, such as air tasking order systems
                                 data and furthermore able to penetrate connected networks of National Aeronautics and Space
                                 Administration’s Goddard Space Flight Center, Wright-Patterson Air Force Base, some Defense
                                 contractors, and other private sector organizations, by posing as a trusted Rome center user.







        238                               LOVELY PROFESSIONAL UNIVERSITY
   240   241   242   243   244   245   246   247   248   249   250