Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

This original post was NOT answered correctly. Would appreciate someone's response before 9AM Central Time (October 23, 2017) On June 22, 2015, LOT, the state-owned

This original post was NOT answered correctly. Would appreciate someone's response before 9AM Central Time (October 23, 2017)

On June 22, 2015, LOT, the state-owned Polish airline had to ground at least 10 national and international flights because hackers breached the network at Warsaw's Chopin airport and intercepted the flight plans that pilots need before taking off. The grounding affected about 1,400 passengers and lasted over five hours before the problem was solved. A month earlier, United Airlines was reported to have experienced the same problem in the United States, and pilots reported bogus flight plans repeatedly popping up on the system. A consultant explained that the radio network that carried flight plans did not need authentication and was designed to trust the communications. A committee was then set up to develop a proposed standard for flight plan security. Fortunately, the flight plan did not control the plane, and a pilot had to accept and enter the plan. A strange result, such as heading to a distant city in the wrong direction, would not be entered or accepted. Even if the bogus plan were entered and accepted by the pilot, there was no danger of collision or crash because of the fraudulent plans. Any changes received to the plan while in flight had to be confirmed with air traffic controller, who analyzed the new plan for safety. Alarms would also indicate a possible collision.

PLEASE answer the following discussion questions in order:

1. Which of the two aircraft breaches is nore serious: the breach descrived here or the breach created by the hacker (In a recent alarming situation, a security researcher claimed on Twitter to have tapped into the avionics system through the entertainment system on an airplane, causing the plane to go into a brief, unscheduled climb. While on the plane, the pereson bent over and wiggled and squeezed the under-seat electronic box's cover to pry it off. The person then attached a modified Ethernet cable to open port in the entertainment equipment below two passenger seats. Although pilots were able to quickly take over in this situation, the FBI took his Tweet seriously. Agents seized the plane's equipment to investigate his claims and found evidence that boxes under his seat and under the seat in front of him on one of his flights had indeed been tampered with.) who took control of a plane's throttle through entertainment system and then tweeted about it? Why?

2. Which of the access controls and storage/transmission controls would be helpful for ACARS problems? The entertainment system problem? Why?

3. If password control is used to solved the ACARS weakness, what might hackers do next? Your response ASAP will be greatly appreciated. Thanks.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

Explain walter's model of dividend policy.

Answered: 1 week ago