Airport & Aviation Security

Slides:



Advertisements
Similar presentations
Critical Infrastructure Protection and Continuity of Operations A Look at Asset Protection in the Airport Environment May 1, 2013.
Advertisements

Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
New and Emerging Threats to Civil Aviation and the Way Ahead Date: 27th of September, 2010 Aws Al Khanjari Director Aviation Security & Infrastructure.
Overview of Joe B. Taylor CS 591 Fall Introduction  Thriving defense manufacturing firm  System administrator angered  His role diminished with.
Lecture 1: Overview modified from slides of Lawrie Brown.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Lecture 11 Reliability and Security in IT infrastructure.
Randy Marchany VA Tech Computing Center
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
CYBER CRIME AND SECURITY TRENDS
Author: Andy Reedftp://topsurf.co.uk/reed FdSc IT/Computer Networking & IT(e-commerce) Communications Network Management An Introduction to Security.
General Awareness Training
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
Mike Woodall Head: Aviation Security Regulation (Projects) Aviation Security Division Aviation Directorate UK Department For Transport Mike Woodall Head:
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Information Security EDU IT Security Terms EDU
Information Security What is Information Security?
Security (Keep your site secure at extension level) Sergey Gorstka Fastw3b.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Instruments concerning new and emerging threats to civil aviation Julie Atwell 4 June 2010 Achieving a just and secure society Achieving a just and secure.
Presented to Managers. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an organization.
MCGILL CONFERENCE ON INTERNATIONAL AVIATION LIABILITY & INSURANCE Liability for Acts of Terrorism: The New Unlawful Interference Convention General The.
In-flight & Airport supplies ( )
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
CONTROLLING INFORMATION SYSTEMS
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Security in Air Transportation
Tonya Ayow Asst. Director, Support Services CARICOM IMPACS 19 November 2015 SECURING CARICOM THROUGH REGIONAL AND INTERNATIONAL COOPERATION INITIATIVES.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Internal Audit Agency Integrity + Professionalism INTERNAL AUDIT AGENCY ISACA Presentation 15 July, 2013 Alisa Hotel, ACCRA.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Storage, Labeling, Controlled Medications Guidance Training CFR § (b)(2)(3)(d)(e) F431.
SEC 470 Entire Course (UOP) For more course tutorials visit  SEC 470 Week 1 US Patriot Act Paper  SEC 470 Week 2 Federal Agencies.
The Local Mitigation Strategy: Your Guide To A Safer Community Mitigation: Actions we can take before a disaster or when we rebuild after a disaster, that.
Overview of Joe B. Taylor CS 591 Fall Introduction  Thriving defense manufacturing firm  System administrator angered  His role diminished with.
Disaster and Emergency Management
Risk management.
Issues and Protections
Cybersecurity - What’s Next? June 2017
Business Risk Marketing Co-op.
4th SG13 Regional Workshop for Africa on “Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data” (Accra, Ghana, March.
Critical Infrastructure in Varna
Providing Access to Your Data: Handling sensitive data
Errors, Fraud, Risk Management, and Internal Controls
9/11: Through Publication
General information Organisation logo Targeted topics
ESSENTIALS OF A PHYSICAL SECURITY SYSTEMS RISK ASSESSMENT
Securing Information Systems
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Safety plan.
Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING
Chapter 9 E-Commerce Security and Fraud Protection
Cybersecurity compliance for attorneys
INFORMATION SYSTEMS SECURITY and CONTROL
AVI AFRIQUE October 2018 Tshepo Peege
How to Mitigate the Consequences What are the Countermeasures?
Cybersecurity ATD technical
Cybersecurity Threat Assessment
Deborah Housen-Couriel, ADV.
Seminar Passengers with reduced mobility when travelling by air
Chapter 1 Key Security Terms.
Fy ‘08 NETWORK PLANNING TASK FORCE
Presentation transcript:

Airport & Aviation Security Dr. Ulrich Scholten | Prof. Eric Moskwa

Defining Airport/Aviation Security Airport security refers to the techniques and methods used in an attempt to protect passengers, staff and planes which use the airports from accidental/malicious harm, crime and other threats. Aviation security is a combination of human and material resources to safeguard civil aviation against unlawful interference. Unlawful interference could be acts of terrorism, sabotage, threat to life and property, communication of false threat, bombing etc.

The Goals of Aviation Security "The goal of aviation security is to prevent harm to aircraft, passengers, and crew, as well as support national security and counter-terrorism policy." U.S. Federal Aviation Administration

National (Public) Security Prevention and Protection of the general public from significant danger, injury, or property damage, such as crimes or disasters (natural or human-made).

The Relation of Safety and Security Also called social safety or public safety, security addresses the risk of harm due to intentional criminal acts. All actions addressing security shall include highest level of physical safety of the involved humans.

Reference Model of (Information) Security within the Cargo Process Cherdantseva, Y.; Hilton, J., "A Reference Model of Information Assurance & Security," Availability, Reliability and Security (ARES), 2013 Eighth International Conference on , pp.546-555, 2-6 Sept. 2013 doi: 10.1109/ARES.2013.72 The Aviation Security Lab shall help understand options and requirements to established a highest level of security in CARGO and its trade-offs against Effectiveness, Efficiency and Profitability

Security Versus Effectiveness

Important Definitions Assurance - the level of guarantee that a security system will behave as expected Countermeasure - a way to stop a threat from triggering a risk event Defense in depth - the combination of several security measures Risk - a possible event which could cause a loss Threat - a method of triggering a risk event that is dangerous Vulnerability - a weakness in a target that can potentially be exploited by a security threat Exploit - a vulnerability that has been triggered by a threat - a risk of 100% No system is invulnerable - but the level of vulnerability should be close to zero

Cybersecurity and IATA Referring to Regulations by ICAO (closed protected networks NextGen / NewPEN) USA (1986 Computer Fraud & Abuse, 2013 Executive Order Improving Critical Infrastructure) EU (GDPR, e-privacy, AML, eIDAS, …) IATA’s regulatory system Management System with dedicated bodies Regulatory & Procedural Compliance Project Review & Approval IATA’s main categorization of Threats Network Intrusion Malware Placement Multivector Threat

Contribution of the Aviation Security Lab The Aviation Security Lab shall help understand options and requirements to established a highest level of security in CARGO and its trade-offs against Effectiveness, Efficiency and Profitability