Preview

Boeing 787 Dreamliner Network Security

Powerful Essays
Open Document
Open Document
1124 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Boeing 787 Dreamliner Network Security
Boeing 787 Dreamliner Network Security

Stephen Connolly

Embry-Riddle Aeronautical University

Boeing 787 Dreamliner Network Security

In 2008 Boeing had made all sorts of headlines in the media, due to some new technological developments in their newly designed 787 Dreamliner. These headlines that splashed across websites were initially brought about due to a FAA “special conditions” report. This topic of this report first appeared in Flight International, and then a few days later it gathered momentum in a critical follow up from Wired Magazine. According to Wired (2008), the FAA states “Boeing’s new 787 may be vulnerable to hacker attack”. All of this has come about due to the new design features of the 787. Whilst designing what they believed to be an aircraft for the future, they had pre-empted the future need for in-flight entertainment and access to the Internet. Something that is all too common in todays airline travel. The 787 would have three separate networks: one for flight safety and navigation, one for administrative functions and one for entertainment and Internet access. The problem the FAA faced was that all of these three networks would be connected together. This was a cost saving initiative by Boeing, and also a way of trying to reduce weight of the aircraft by dramatically reducing the amount of cabling running through the airframe. What the FAA faced was a new development, which they themselves admitted that their own scope of this type of design was not far enough ahead. Therefore they came up with the special report, requiring Boeing to demonstrate the safety features of the network that would prove no unauthorized access from the passenger side of the aircraft to the flight controls or navigation features. As well as other unauthorized access from outside the aircraft, i.e. over the Internet, or accidental changes to data by any staff members. Boeing had already foreseen the issue and apparently had even met the new



References: Arthur, C. (2012, May 29). Cyber-Attack Concerns Raised Over Boeing 787 Chip’s Back Door. Retrieved from Charette, R. (2008, January 7). FAA To Boeing: Please Show That 787 Dreamliner Can’t Be Hacked. InfoSecurity. (2008, January 10). FAA Plays Down Boeing 787 Security concerns.

You May Also Find These Documents Helpful

  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their hardware assets and defining security policy regarding the timeliness of firewall configuration and updates.…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    This report is prepared to assist the aircraft solutions (AS), a well-known company for equipment and component fabrication in Southern California, in identifying the most important security vulnerabilities. This report also discusses possible threats, the likelihood of the threats occurring and the threat if exposed in two remarkable areas. Aircraft Solutions maintains a large capacity plant, trained workforce, large variety of equipment, design modules and solution database provided to multiple industries. These companies include aerospace, electronics and defense sectors. In this report I will focus on the vulnerabilities present in the existing system of Aircraft Solutions and its operations.…

    • 2041 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Better Essays

    ISSC361 FinalProject

    • 1124 Words
    • 4 Pages

    With each device in a vehicle using a computer there are many ways for a hacker to gain access to the vital components of the vehicle. It is estimated that a modern luxury car comprises of more than seventy Electronic Control Units (ECUs) in each vehicle today. Of these seventy different ECUs they are all connected via a network within the vehicle. This network is known as the CAN or Controller Area Network. “This interconnection permits complex safety and convenience features such as pre-tensioning of seat-belts when a crash is predicted and automatically varying radio volume as a function of speed.” (Checkoway, et al, 2011)…

    • 1124 Words
    • 4 Pages
    Better Essays
  • Better Essays

    The second vulnerability is the policies that are in place to evaluate the firewalls, routers and the personnel to maintain them. There should always be checks and balances with any system. This means you have two sets of personnel maintaining the system. One set of personnel on site, such as a security officer and an assistant security officer to maintain these controls. And the second set being from an outside vendor that would continuously monitor Aircraft Solution’s Systems regularly. This would deter any internal or external malicious attacks to the…

    • 870 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Transportation Security Administration Blog. (2010) Layered Security. Retrieved from TSA Blog on 23rd february 2012…

    • 2858 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    A large effect from 9/11 was an increase in the security aspects when it relates to aviation, when at the time America was fairly lackluster. There were many things you were able to do and get away with, that are completely unheard of nowadays. Then after this incident was a kick in the face for us here in America especially for us to make leaps in bounds when it comes to security. ”America’s involvement in the War on Terror — prompted…

    • 659 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    United Airlines Security

    • 367 Words
    • 2 Pages

    One of the Unites State’s biggest airlines, United Airlines, has rewarded two hackers who spotted major security hols in its website. The airline has given the two hackers one million free flight miles each.…

    • 367 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    With a goal to restore its leadership role in the airline industry, Boeing launched the all-new 787 aircraft project. However, the likelihood of Boeing’s success is uncertain due to numerous threats from the market.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Finally, the Boeing 787 fiasco highlights the problems with extreme outsourcing of complex systems. As Boeing has moved to insource and control the 787, so too other US and European…

    • 937 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Hacking for Newbie

    • 3946 Words
    • 16 Pages

    Introduction - OK, this file is intended solely for people who know very little about hacking, and when I say very little I mean very little. Now, for those of you jumping happily around and screaming "Finally, I am gonna be a hacker!” stop jumping around and just sit down, take a few deep breaths, and just relax.…

    • 3946 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    network cryptography

    • 4974 Words
    • 20 Pages

    supports most of these features, including the authentication scheme described in this paper. Additional information can be found at the NTP home page http://…

    • 4974 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Cause Network

    • 571 Words
    • 3 Pages

    Hacking and the study of computer insecurity play an important role in the protection of assets. No computer system or network achieves perfect security; even a system switched off with its hard drive removed sunken in a lead case in the bottom of a deep pool in an underground facility lacks security, as it guarantees integrity and confidentiality but completely sacrifices availability. As a security professional, you must understand the risks a network faces; you must, in essence, know how to bring the network down, to steal the data you want, and to falsify important information. With this information, you can begin to eliminate threats, leaving only those unknown to you and those that pose little to no real risk.…

    • 571 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Even though it is fun and practical, Information Technology gives us new challenges in security, because the security threats also adapt their shape. In the past, securing vital objects means keeping their physical attributes intact, but this is not the case now. Currently, we should also be concerned about the security of its digital format or access, and Informatics certainly plays a vital role in this area. Nowadays informatics has totally changed our approach to security of technical systems. Impending Threats increased by eminence use of SCADA and rapid growth of telecommunication and computer systems connect previously isolated technical systems. SCADA have indirect threats like viruses and operational errors that can be get rid of by toil in Informatics only.…

    • 1289 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Hybrid Network Security

    • 10587 Words
    • 43 Pages

    satellite links. Security is an important concern in such networks, since the satellite segment is susceptible to a host of attacks, including eavesdropping, session hijacking and data corruption.…

    • 10587 Words
    • 43 Pages
    Powerful Essays