Verified Document

How The Chicago Airports Were Hacked Essay

Aircraft Flight Disturbance Internal Memo:

Lessons Learned From September 26th O'Hare International Airport Incident

Senior Management

Recommendations to Avert Widespread Flight Disturbances

On September 26th, 2014, both O'Hare and Midway airports experienced a day-long disruption of operations that led to over 2,000 flights being cancelled and the entire nation affected by the disruption of operations. An employee with psychological problems intent on killing himself started a fire in the basement telecommunications room of the Aurora, Illinois control center, then attempted to slit his throat. After posting his suicide note on Facebook, relatives called 911 and both his life and the control center were saved. The fire damaged the most critical areas of the IT infrastructure for air traffic control for both the O'Hare and Midway airports, forcing air traffic control locations in adjacent states to take on one of the busiest areas of the country for air travel. The lack of IT controls in place made this situation particularly treacherous and very dangerous for the thousands of inbound and outbou7nd flights, and left tens of thousands stranded overnight not only in the Chicago area, but in adjacent airports as well. With a more effective IT systems analysis plan the entire situation could have been averted.

Information Systems Analysis and Recommendations

The incidents on September 26th, 2014 underscore one of...

For a single employee to gain access to the most critical systems for the air traffic centers serving O'Hare and Midway airports, it's clear there was no role-based access definitions, in addition to any constraints on key IT asset access as well. These two elements of role-based access definitions and constraints on key IT asset access are foundational to effective enterprise security management initiatives (Lynch, 2006). Best practices for ensuring mission critical information systems aren't impacted by acts like these need to increasingly include advanced safeguards including biometrics to both audit and restrict access to such critical IT assets (Deane, Barrelle, Henderson, Mahar, 1995). To ensure that these systems that are essential for routing traffic through O'Hare and Midway aren't impacted by an internal attack it is imperative that the Chicago Airport Authority restrict access to only those areas of the buildings in Aurora and other locations that need maintenance (Lynch, 2006). Taking away the potential for an arsonist event or any other type of sabotage needs to also begin with a focused series of strategies to limit just how much access any one person has to the systems operating the airport. By enforcing more of a role-based, maintenance-only…

Sources used in this document:
References

Cavusoglu, H., Mishra, B., & Raghunathan, S. (2005). The value of intrusion detection systems in information technology security architecture. Information Systems Research, 16(1), 28-46.

Crockett, B. (1988). People, not systems, key to network security. Network World, 5(12), 17.

Deane, F., Barrelle, K., Henderson, R., & Mahar, D. (1995). Perceived acceptability of biometric security systems. Computers & Security, 14(3), 225.

Lynch, D.M. (2006). Securing Against Insider Attacks. EDPACS, 34(1), 10-20.
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Security Briefly Support Your
Words: 2728 Length: 8 Document Type: Term Paper

The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010). C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it

Cyber Warfare
Words: 2636 Length: 10 Document Type: Term Paper

Cyber warfare continues to grow larger than imagination as the public becomes more aware of and involved in technology. This work in writing will identify a case study that presents a 'cell', 'klan', or 'state', which conducted or has the capacity to conduct cyber warfare. This work will describe the elements of: who, what, where, and why and means of conducting such cyber warfare and the organizational ideology behind the

Predominantly Latino Gangs, Mara Salvatrucha
Words: 17380 Length: 40 Document Type: Thesis

Government Since gang-related crimes fall within the jurisdiction of state, this research will give an insight on the need to find solutions that increasingly include all levels of government. Congress needs to pass legislation that will change immigration enforcement laws and make more aliens deportable. In addition, the federal government should take a more active participation in helping local and state jurisdictions develop anti-gang responses. The local, state and federal governments

Counterterror and Organized Crime As Competing Goals for Law Enforcement...
Words: 4867 Length: 15 Document Type: Essay

Organized Crime / Counterterrorism AL CAPONE OR AL QAEDA?: ORGANIZED CRIME AND COUNTERTERRORISM AS LAW ENFORCEMENT PRIORITIES IN 2014 Should law enforcement in America prioritize fighting counter-terrorism or fighting organized crime? A full examination of the history and issues involved with both will, I would argue, make the answer clear: with the proper definitions involved of both terror and organized crime, it is the latter which genuinely deserves the attention of law enforcement, and

Technology -- Blessing or Curse
Words: 474 Length: 1 Document Type: Term Paper

Response Yes, technology generates problems, and it is shrewd and apt to point out that for every net gain to certain members of society via technology there is a net loss. The hand weavers of the 18th century were put out of business by 19th century factories that could manufacture clothing cheaply, computers have probably collectively caused the art of calligraphy to die, and made even professional writers overly reliant on

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now