CFP last date
01 August 2024
Reseach Article

An Analysis of Airports Cyber-Security

by Khalid A. Fakeeh
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 7
Year of Publication: 2016
Authors: Khalid A. Fakeeh

Khalid A. Fakeeh . An Analysis of Airports Cyber-Security. Communications on Applied Electronics. 4, 7 ( March 2016), 11-15. DOI=10.5120/cae2016652129

@article{ 10.5120/cae2016652129,
author = { Khalid A. Fakeeh },
title = { An Analysis of Airports Cyber-Security },
journal = { Communications on Applied Electronics },
issue_date = { March 2016 },
volume = { 4 },
number = { 7 },
month = { March },
year = { 2016 },
issn = { 2394-4714 },
pages = { 11-15 },
numpages = {9},
url = { },
doi = { 10.5120/cae2016652129 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2023-09-04T19:54:15.000354+05:30
%A Khalid A. Fakeeh
%T An Analysis of Airports Cyber-Security
%J Communications on Applied Electronics
%@ 2394-4714
%V 4
%N 7
%P 11-15
%D 2016
%I Foundation of Computer Science (FCS), NY, USA

Airports form part of the most important transport infrastructure of every nation state in the globe. The absolute number of inhabitants and data passing through airports each day and the apparent prospects to embezzle data, shake down money or set off anarchy makes them an unavoidable target for cyber attack. Cyber-security events are considerably growing year-on-year across the full spectrum of worldwide trade. Due to their visibility, interruption of the indispensable operations of airlines and airports could plausibly be the subject of a cyber-attack by cyber terrorists. Unluckily, not all airports have put into practice cyber-security systems that would defend and manage those operations and all connected aspects. It cleanly means that even though various may have security measures in place, cyber criminals, ‘hacktivists’, or cyber terrorists may possibly mull over this as a ideal opening to molest the airports in loads of diverse ways. We outline here the need, establishment, advancing progressions and research endeavors with respect to the establishment of cyber security standards and best practices with uncommon highlight on cyber security awareness.

  1. ”Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment. Technical report, Sandia National Laboratories, 2007 by ”Parks, R.C.”,.
  2. ”Hahn, et al”. ”Development of the PowerCyber SCADA security testbed. 2010”. In Proceedings of the CSIIRW ’10.
  3. ”Securing Airline Information on the Ground and in the Air. The Boeing Company, Aero Quarterly, QTR_03. 25-28 by ”Rencher, et al..”..
  4. ”http://trbcybersecurity.”.
  5. ” AirTight-BYOD-Survey-April-2012.pdf”.
  6. ”Penetration Testing of Industrial Control Systems. Technical report, Sandia National Laboratories by ”Duggan et al..”.
  7. ” new.items/d09399.pdf”.
  8. http://www.”.
  9. ” papers/2011/10_4169/10_4169.pdf”
  10. ” pdf/TransportationRoadmap083112.pdf”.
  11. ”Computer Security Literacy: Staying Safe in a Digital World. Chapman & Hall/CRC Press, First Edition, Boca Raton by ”Jacobson, et al”, USA.
  12. National SCADA Test Bed: Fact Sheet. Idaho National Laboratory (INL), Idaho, INL. 2007..
  14. Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program. Technical report, Idaho National Laboratory (INL), INL. 2008..
  15. ” article/10522704/cyber-security-for-airports”.
  16. ” cheong-cybersecurity-bit.pdf”.
  17. ”Cyber Assessment Methods for SCADA Security. Technical report, The Instrumentation, Systems and Automation Society (ISA) by ”Permann, et al...”.
  18. ” bit_committee_participation_2012.pdf”.
Index Terms

Computer Science
Information Sciences


SCADA Critical Infrastructures Cyber Security