Reference Hub5
Cyber Threats in Civil Aviation

Cyber Threats in Civil Aviation

Calvin Nobles
ISBN13: 9781522561958|ISBN10: 1522561951|EISBN13: 9781522561965
DOI: 10.4018/978-1-5225-6195-8.ch007
Cite Chapter Cite Chapter

MLA

Nobles, Calvin. "Cyber Threats in Civil Aviation." Emergency and Disaster Management: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2019, pp. 119-141. https://doi.org/10.4018/978-1-5225-6195-8.ch007

APA

Nobles, C. (2019). Cyber Threats in Civil Aviation. In I. Management Association (Ed.), Emergency and Disaster Management: Concepts, Methodologies, Tools, and Applications (pp. 119-141). IGI Global. https://doi.org/10.4018/978-1-5225-6195-8.ch007

Chicago

Nobles, Calvin. "Cyber Threats in Civil Aviation." In Emergency and Disaster Management: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 119-141. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-6195-8.ch007

Export Reference

Mendeley
Favorite

Abstract

Civil aviation faces increased cybersecurity threats due to hyperconnectivity and the lack of standardized frameworks and cybersecurity defenses. Educating the civil aviation workforce is one method to enhance cyber defense against cyber-attacks. Educating the workforce will lead to initiatives and strategies to combat cyber-attacks. Private and public entities need to remain aggressive in developing cyber defense strategies to keep pace with the increasing vulnerabilities of hyperconnectivity. Areas that require immediate attention to safeguard against cybersecurity threats in civil aviation are: 1) Eliminating supply risks, 2) Upgrading legacy systems, 3) Mitigating technological aftereffects, 4) Increasing cybersecurity awareness, 5) Developing cybersecurity workforce, 6) Managing hyperconnectivity, and 7) Leveraging international entities. To safeguard civil aviation infrastructure from cybersecurity threats require assertive, coordinated, and effective strategies and capabilities to defend the network.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.