Preview

Boeing 787 Dreamliner Network Security

Powerful Essays
Open Document
Open Document
1124 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Boeing 787 Dreamliner Network Security
Boeing 787 Dreamliner Network Security

Stephen Connolly

Embry-Riddle Aeronautical University

Boeing 787 Dreamliner Network Security

In 2008 Boeing had made all sorts of headlines in the media, due to some new technological developments in their newly designed 787 Dreamliner. These headlines that splashed across websites were initially brought about due to a FAA “special conditions” report. This topic of this report first appeared in Flight International, and then a few days later it gathered momentum in a critical follow up from Wired Magazine. According to Wired (2008), the FAA states “Boeing’s new 787 may be vulnerable to hacker attack”. All of this has come about due to the new design features of the 787. Whilst designing what they believed to be an aircraft for the future, they had pre-empted the future need for in-flight entertainment and access to the Internet. Something that is all too common in todays airline travel. The 787 would have three separate networks: one for flight safety and navigation, one for administrative functions and one for entertainment and Internet access. The problem the FAA faced was that all of these three networks would be connected together. This was a cost saving initiative by Boeing, and also a way of trying to reduce weight of the aircraft by dramatically reducing the amount of cabling running through the airframe. What the FAA faced was a new development, which they themselves admitted that their own scope of this type of design was not far enough ahead. Therefore they came up with the special report, requiring Boeing to demonstrate the safety features of the network that would prove no unauthorized access from the passenger side of the aircraft to the flight controls or navigation features. As well as other unauthorized access from outside the aircraft, i.e. over the Internet, or accidental changes to data by any staff members. Boeing had already foreseen the issue and apparently had even met the new



References: Arthur, C. (2012, May 29). Cyber-Attack Concerns Raised Over Boeing 787 Chip’s Back Door. Retrieved from Charette, R. (2008, January 7). FAA To Boeing: Please Show That 787 Dreamliner Can’t Be Hacked. InfoSecurity. (2008, January 10). FAA Plays Down Boeing 787 Security concerns.

You May Also Find These Documents Helpful

  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    Impact on Business Processes 11 Budget 11 Summary 11 References 13 Executive Summary The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their hardware assets and defining security policy regarding the timeliness of firewall configuration and updates.…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Better Essays

    At Aircraft Solutions, there are several samples of concerns that could lead to a breach of information or compromised branch of their system. Due to the design of their geographical layout, secure connections that encrypt the transferred data must be implemented. The internal IT team should consider installing IPSec tunnels, which enable a connection between two hosts or end points to be secured by IP payload and encapsulated encryption. Enabling these protocols provides a secure connection, essentially limiting the potential hijack of service or confidential data. Hackers often place themselves in between the two servers or a VPN to intercept the data and in turn use that data, which could have user information, to crack in to the internal network without any retort.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    10 5. Summary 10 6. References 11 Introduction This report is prepared to assist the aircraft solutions (AS), a well-known company for equipment and component fabrication in Southern California, in identifying the most important security vulnerabilities. This report also discusses possible threats, the likelihood of the threats occurring and the threat if exposed in two remarkable areas. Aircraft Solutions maintains a large capacity plant, trained workforce, large variety of equipment, design modules and solution database provided to multiple industries. These companies include aerospace, electronics and defense sectors. In this report I will focus on the vulnerabilities present in the existing system of Aircraft Solutions and its operations.…

    • 2041 Words
    • 9 Pages
    Powerful Essays
  • Best Essays

    Mark Sundermeir Written Assignment #2 3 / 13 / 12 Abstract The purpose of this paper is to track the evolution of the system of airline security in the United States. A major turning point in Americas system of airline security was the terrorist attack on September 11, 2001. It is important to understand the history of airline security before 9/11 to then see how terrorists exploited the system’s weaknesses. It is then necessary to analyze how the U.S. federal government responded to 9/11 and how airline security procedures have evolved since then. This paper thoroughly outlines how airport and aircraft security protocol has adapted over the years to provide a background and understanding of Americas current system of airline security. It is also important to review the numerous controversies resulting from new security measures. Finally, this paper examines past trends to try and foresee future developments for airline security in the U.S.…

    • 2463 Words
    • 10 Pages
    Best Essays
  • Satisfactory Essays

    United Airlines Security

    • 367 Words
    • 2 Pages

    One of the Unites State’s biggest airlines, United Airlines, has rewarded two hackers who spotted major security hols in its website. The airline has given the two hackers one million free flight miles each.…

    • 367 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    With a goal to restore its leadership role in the airline industry, Boeing launched the all-new 787 aircraft project. However, the likelihood of Boeing’s success is uncertain due to numerous threats from the market.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Sowmya, M. (2011, September 22). Building Cstles in the Sky: Mobile Hacking and it 's Impact on CyberSecurity. Retrieved from Unisys: http://blogs.unisys.com/disruptiveittrends/2011/09/22/building-castles-in-the-sky-mobile-hacking-and-its-impact-on-cybersecurity/…

    • 1441 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    3 Closer Look at Control Issues 4 Steps to mitigate data breach 4 Conclusion 6…

    • 985 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Hybrid Network Security

    • 10587 Words
    • 43 Pages

    satellite links. Security is an important concern in such networks, since the satellite segment is susceptible to a host of attacks, including eavesdropping, session hijacking and data corruption.…

    • 10587 Words
    • 43 Pages
    Powerful Essays
  • Good Essays

    1984, Dystopia

    • 602 Words
    • 3 Pages

    The concept of controlling a plane may be a large goal for many hackers but a potentially smaller goal of controlling a single vehicle is a much…

    • 602 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Finally, the Boeing 787 fiasco highlights the problems with extreme outsourcing of complex systems. As Boeing has moved to insource and control the 787, so too other US and European…

    • 937 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    network cryptography

    • 4974 Words
    • 20 Pages

    NTP Version 4 reference implementation now under test supports most of these features, including the authentication scheme described in this paper. Additional information can be found at the NTP home page http://…

    • 4974 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Abstract The morning on September 11th was like any other morning. People went to work, and went on about their normal routines. In our airports that day people were checking in their bags, walking through metal detectors, and sending carry-ons through the x-ray machines. The day was anything but normal when members of Al-Qaeda had planned to hijack four commercial passenger jet airliners. Since then security has been a common topic of controversy. Numerous changes have taken place at all airports to prevent any attacks from happening again. In this paper, we focus on innovative technology production in airline security, the federalization of passenger screening operations, changes that are mainly visible to federal regulatory responses to the 9/11 attacks related to improving airline security, we will review airport security procedures, and explain the production in passengers and baggage screening technology, concluding on the TSA role in airport security.…

    • 2858 Words
    • 12 Pages
    Powerful Essays
  • Best Essays

    15. Zetter, K. (2008, Jan. 8). FAA: Boeing 's new 787 may be vulnerable to hacker attack. Wired. Retrieved May 2009 from http://www.wired.com/politics/security/news/2008/01/dreamli ner_security.…

    • 3176 Words
    • 10 Pages
    Best Essays
  • Better Essays

    A recent example of targeting a specific industrial control system likely in Iran by computer worm ‘Stuxnet’ is eyes opener for security of the technical systems. Stuxnet was a threat that was primarily written to target an industrial control system or set of similar systems. It was affecting more than 50,000 IP address in Iran, and forced Iranian government to replace more than 1000 centrifuges from their nuclear facilities. The interesting part of Stuxnet is that this malware did not attempt to steal or collect people credentials but it was built only for one big purpose that is to infect, spy, and disrupt the performance of certain unique machines. Researchers have been discovering new malwares and worms timely that were intensifying the threats to the technical systems, like Duqu have sought to infiltrate networks in order to steal data. This new threat appears not to cause physical damage, but to collect huge amounts of sensitive information. Kaspersky's first recorded instance of Flame was in August 2010.According to them Once a system is infected, Flame begins a complex set of operations, including sniffing the network…

    • 1289 Words
    • 6 Pages
    Better Essays