|
|
Books > Computing & IT > Social & legal aspects of computing > Computer viruses
While the Federal Aviation Administration (FAA) has taken steps to
protect its air traffic control systems from cyber-based and other
threats, significant security control weaknesses remain,
threatening the agency's ability to ensure the safe and
uninterrupted operation of the national airspace system (NAS).
These include weaknesses in controls intended to prevent, limit,
and detect unauthorised access to computer resources, such as
controls for protecting system boundaries, identifying and
authenticating users, authorising users to access systems,
encrypting sensitive data, and auditing and monitoring activity on
FAA's systems. Additionally, shortcomings in boundary protection
controls between less-secure systems and the operational NAS
environment increase the risk from these weaknesses. The objective
of this book is to evaluate the extent to which FAA has effectively
implemented information security controls to protect its air
traffic control systems. This book also identifies the
cybersecurity challenges facing FAA as it shifts to the NextGen ATC
system and how FAA has begun addressing those challenges; and
assesses the extent to which FAA and its contractors, in the
acquisition of NextGen programs, have followed federal guidelines
for incorporating cybersecurity controls.
Conversations in Cyberspace is a collection of insights on the
current state of security and privacy in the Internet world. The
book contains a brief introduction to some of the most used
open-source intelligence (OSINT) tools and a selection of
interviews with some of the key figures in industrial control
systems (ICS), advanced persistent threat (APT) and online/deep web
members organizations. It aims to be an introduction to the
relationships between security, OSINT and the vast and complex
world hiding in the deep web. The information provided will be
beneficial to security professionals and system administrators
interested in exploring today's concerns in database design,
privacy and security-by-design, and deep web members organizations,
including Cicada 3301, the Unknowns, Anonymous, and more.
|
|