INFORMATION PROTECTION AND SECURITY Flashcards
a person who breaks in to a security system only with a malicious intent. A person who breaks in to a computer system for the purpose of earning profit, finding security loopholes of the system, showing protest or just for the sake of challenge is called a hacker. In recent times the differentiation between the definitions of the two terms has become vague due to the misuse of them by the mass media and the existence of the people belonging to both
categories.
Cracker(BREAK)
_______ build, while crackers break.
Hackers(BUILD)
FRAUD TYPES
Skimming
Phishing
Pharming
where the card is cloned
Skimming
technique used to obtain your card and personal details
through a fake email
Phishing
a similar technique using fake websites, such as imitating a
bank’s website
Pharming
Attack through which a person can render a system unusable or significantly slow down the system for legitimate users by overloading the system so that no one else can use it.
Denial of Service (DOS) Attack
ACTS OF UNLAWFUL INTERFERENCE (7)
Unlawful seizure of aircraft,
Destruction of an aircraft in service,
Hostage-taking on board aircraft or on aerodromes,
Forcible intrusion on board an aircraft, at an airport or on the premises of an aeronautical facility,
Introduction on board an aircraft or at an airport of a weapon or hazardous device or material
intended for criminal purposes,
Use of an aircraft in service for the purpose of causing death, serious bodily injury, or serious
damage to property or the environment,
Communication of false information such as to jeopardize the safety of an aircraft in
flight or on the ground, of passengers, crew, ground personnel on the general public,
at an airport or on the premises of a civil aviation facility.
has dual requirements of protection of the ATM system against threats and vulnerabilities and the provision of ATM security services in support of organizations and authorities engaged in aviation security, national security, defense, and law enforcement.
ATM security
ATM SYSTEM INFRASTUCTURE PROTECTION
Facility physical security and access control
(ATM facility design considerations, NAVAIDs, etc.)
Personnel security program
(position risk categorization, personnel screening and vetting, third-party personnel security, etc.)
Information and Communication Technology (ICT)
system security (unauthorized access, tampering with the systems, attacks on the systems)
Contingency planning for ATM security
(planning, system degradation to a safe/secure situation, service continuity, recovery, maintenance of plans)
ATM SECURITY OPERATIONS
ATM contribution to safeguarding against unlawful
interference
ATM support for law enforcement
(e.g. laser threats, man portable air defence system threats)
Disasters and public health emergencies
(e.g. disaster response and recovery, communicable disease and other public health risks on board aircraft)
Airspace management for ATM security
(monitoring and reporting over security identification zones, emergency security control of air traffic, creation and monitoring of temporary airspace/flight restrictions)
ICAO HEADQUARTES AND BRANCHES
MONTREAL, CANADA (HEADQUARTERS)
MEXICO CITY (NORTHAMERICA AND CARIBBEAN)
LIMA (SOUTH AMERICA)
PARIS (EUROPEAN AND NORTHATLANTIC)
DAKAR (WESTERN AFRICA)
CAIRO (MIDDLE EAST)
NAIROBI (EASTERN AFRICA)
BEIJING (ASIA-PACIFIC SUB OFFICE)
BANGKOK (ASIA-PACIFIC)
The Aviation Cybersecurity Strategy (7)
International Cooperation
Governance
Effective Legislation & Regulations
Cybersecurity Policy
Information Sharing
Incident Management & Emergency Planning
Capacity Building, Training, & Cybersecurity Culture
Cyber Threats are ______, _______ and ________
BORDERLESS, COMPLEX, and AGILE
Digitalization is _____ to Civil Aviation ________ and Future Development Across _______
KEY, INTEROPERABILITY , ALL DOMAINS
a set of principles and practices designed to safeguard your computing assets and online information against THREATS
CYBERSECURITY
refers to criminal activities that specifically target a computer or network for damage orinfiltration.
CYBERCRIME
is a deliberate exploitation of computer systems, technology dependent enterprises, and networks.
it uses malicious code to alter computer code, logic, or data, resulting in disruptive consequences that can compromise data and lead to cyber-crimes, such as information and identity theft.
CYBERATTACK