Airport information systems security

被引:0
|
作者
Wilson, DL [1 ]
机构
[1] US Fed Aviat Adm, Transportat Secur Res & Dev Lab, FAA William J Hughes Tech Ctr, Atlantic City, NJ 08405 USA
关键词
Airport information systems - National airspace systems;
D O I
10.1109/MAES.2003.1194086
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
The Information Technology Management Reform Act of 1995 (ITMRA), also known as the Clinger-Cohen Act, requires the Chief Information Officers (CIO) of the executive agencies of government to develop, maintain, and facilitate the implementation of a sound and integrated information technology architecture. The CIOs are responsible to ensure that information security policies, procedures, and practices are adequate to effectively protect information systems. The National Airspace System (NAS) is made up of hundreds of facilities across the country that provide the services required to operate and maintain the air transportation system (Figure 1). Airports are unique in this network as no two airports are designed the same and, while each is a single facility, each is occupied by many different tenants who provide many different services. Each service may include one or more information systems, both automated and manual, running independently from all others. Because of high visibility events such as the bombing of Pan American Flight 103 in 1988, the explosion of TWA Flight 900 in 1996, and the most recent catastrophic events of September 11, 2001, increased security measures have been put in place to protect the flying public from terrorists. The need to share and exchange information effectively and in a timely manner between airport services and systems, with other airport facilities, outside organizations and government agencies, becomes greater each day. The increased requirements defined by previous policy, threat, vulnerability, and risk assessments can be used to derive security services for NAS Air Traffic Control (ATC) operations, as well as Airport Facility (AF) operations. However, conventional solutions may not be suited to the unique needs of an airport environment and may be operationally unacceptable in some cases. This discusses some of the ways that information systems security can help ensure that key security services, including access control and authentication, are available and implementable in all systems as needed in these unique airport environments.
引用
收藏
页码:25 / 27
页数:3
相关论文
共 50 条
  • [1] Information systems security in an airport environment
    Wilson, DL
    [J]. 36TH ANNUAL 2002 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2002, : 154 - 157
  • [2] SECURITY TECHNOLOGIES AND TECHNIQUES - AIRPORT SECURITY SYSTEMS
    BOUISSET, JF
    [J]. JOURNAL OF TESTING AND EVALUATION, 1994, 22 (03) : 247 - 250
  • [3] SECURITY SYSTEMS AT THE AIRPORT WITH ACCENT ON DATA LAYER SECURITY
    Jasari, Amila
    [J]. INTERNATIONAL CONFERENCE ON ECONOMIC AND SOCIAL STUDIES (ICESOS'16): REGIONAL ECONOMIC DEVELOPMENT: ENTREPNEURSHIP AND INNOVATION, 2016, : 243 - 248
  • [4] Accessibility vs Security: The Challenge to Airport Security Systems
    Manoj S Patankar
    Louis Holscher
    [J]. Security Journal, 2000, 13 (2) : 7 - 19
  • [5] AIRPORT SECURITY SYSTEMS AND FOURTH AMENDMENT
    MANG, HJ
    [J]. LOUISIANA LAW REVIEW, 1974, 34 (04): : 860 - 867
  • [6] A systems approach to John Wayne airport security
    Donovan, S
    Mahoney, T
    Pelletier, N
    Schmidt, M
    Kwinn, M
    [J]. 2003 IEEE SYSTEMS & INFORMATION ENGINEERING DESIGN SYMPOSIUM, 2003, : 221 - 224
  • [7] Information systems security in the information systems curriculum
    Eastman, C
    Farkas, C
    [J]. INFORMATION TECHNOLOGY AND ORGANIZATIONS: TRENDS, ISSUES, CHALLENGES AND SOLUTIONS, VOLS 1 AND 2, 2003, : 117 - 118
  • [8] Security of information in IT systems
    Kaliczynska, M
    [J]. Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments III, 2005, 5775 : 571 - 576
  • [9] Airport security
    Rupprecht, Reinhard
    [J]. Technische Sicherheit, 2024, 14 (1-2): : 10 - 13
  • [10] Information systems resources and information security
    Chang, Kuo-chung
    Wang, Chih-ping
    [J]. INFORMATION SYSTEMS FRONTIERS, 2011, 13 (04) : 579 - 593