Preview

Boeing 787 Dreamliner Network Security

Powerful Essays
Open Document
Open Document
1124 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Boeing 787 Dreamliner Network Security
Boeing 787 Dreamliner Network Security

Stephen Connolly

Embry-Riddle Aeronautical University

Boeing 787 Dreamliner Network Security

In 2008 Boeing had made all sorts of headlines in the media, due to some new technological developments in their newly designed 787 Dreamliner. These headlines that splashed across websites were initially brought about due to a FAA “special conditions” report. This topic of this report first appeared in Flight International, and then a few days later it gathered momentum in a critical follow up from Wired Magazine. According to Wired (2008), the FAA states “Boeing’s new 787 may be vulnerable to hacker attack”. All of this has come about due to the new design features of the 787. Whilst designing what they believed to be an aircraft for the future, they had pre-empted the future need for in-flight entertainment and access to the Internet. Something that is all too common in todays airline travel. The 787 would have three separate networks: one for flight safety and navigation, one for administrative functions and one for entertainment and Internet access. The problem the FAA faced was that all of these three networks would be connected together. This was a cost saving initiative by Boeing, and also a way of trying to reduce weight of the aircraft by dramatically reducing the amount of cabling running through the airframe. What the FAA faced was a new development, which they themselves admitted that their own scope of this type of design was not far enough ahead. Therefore they came up with the special report, requiring Boeing to demonstrate the safety features of the network that would prove no unauthorized access from the passenger side of the aircraft to the flight controls or navigation features. As well as other unauthorized access from outside the aircraft, i.e. over the Internet, or accidental changes to data by any staff members. Boeing had already foreseen the issue and apparently had even met the new



References: Arthur, C. (2012, May 29). Cyber-Attack Concerns Raised Over Boeing 787 Chip’s Back Door. Retrieved from Charette, R. (2008, January 7). FAA To Boeing: Please Show That 787 Dreamliner Can’t Be Hacked. InfoSecurity. (2008, January 10). FAA Plays Down Boeing 787 Security concerns.

You May Also Find These Documents Helpful

  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their hardware assets and defining security policy regarding the timeliness of firewall configuration and updates.…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    This report is prepared to assist the aircraft solutions (AS), a well-known company for equipment and component fabrication in Southern California, in identifying the most important security vulnerabilities. This report also discusses possible threats, the likelihood of the threats occurring and the threat if exposed in two remarkable areas. Aircraft Solutions maintains a large capacity plant, trained workforce, large variety of equipment, design modules and solution database provided to multiple industries. These companies include aerospace, electronics and defense sectors. In this report I will focus on the vulnerabilities present in the existing system of Aircraft Solutions and its operations.…

    • 2041 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Better Essays

    ISSC361 FinalProject

    • 1124 Words
    • 4 Pages

    Computers are a part of everyone’s daily lives and are even a part of everyday use items. Automobiles today are primarily made up of computer systems. Each mechanical device that is in a vehicle today is controlled by a computer system, whether it is entirely controlled or just monitored by a computer system, but it relies on a computer to correctly function. This now causes an issue with the security of today’s vehicles.…

    • 1124 Words
    • 4 Pages
    Better Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    References: Horton, T. (2014, May 1). The Right Technology Fix Can Help Prevent Breaches. Retrieved April 29, 2015, from ProQuest: http://search.proquest.com/docview/1548709638?accountid=458…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    References: Horton, T. (2014, May 1). The Right Technology Fix Can Help Prevent Breaches. Retrieved December 19, 2014, from ProQuest: http://search.proquest.com/docview/1548709638?accountid=458…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A large effect from 9/11 was an increase in the security aspects when it relates to aviation, when at the time America was fairly lackluster. There were many things you were able to do and get away with, that are completely unheard of nowadays. Then after this incident was a kick in the face for us here in America especially for us to make leaps in bounds when it comes to security. ”America’s involvement in the War on Terror — prompted…

    • 659 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The purpose of this paper is to evaluate the computer security for Aircraft Solutions. When discussing computer security, the three main areas aspects of any computer-related system are confidentiality, integrity, and availability. Confidentiality determines the security or privacy of the system. Integrity refers to only the authorized users making changes to parts of the computer system. Availability means if someone has a requirement to get onto the computer they are not impeded in that facet. The main challenge in constructing any secure system is determining…

    • 870 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    With a goal to restore its leadership role in the airline industry, Boeing launched the all-new 787 aircraft project. However, the likelihood of Boeing’s success is uncertain due to numerous threats from the market.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    United Airlines Security

    • 367 Words
    • 2 Pages

    One of the Unites State’s biggest airlines, United Airlines, has rewarded two hackers who spotted major security hols in its website. The airline has given the two hackers one million free flight miles each.…

    • 367 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Hacking for Newbie

    • 3946 Words
    • 16 Pages

    Introduction - OK, this file is intended solely for people who know very little about hacking, and when I say very little I mean very little. Now, for those of you jumping happily around and screaming "Finally, I am gonna be a hacker!” stop jumping around and just sit down, take a few deep breaths, and just relax.…

    • 3946 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Hybrid Network Security

    • 10587 Words
    • 43 Pages

    satellite links. Security is an important concern in such networks, since the satellite segment is susceptible to a host of attacks, including eavesdropping, session hijacking and data corruption.…

    • 10587 Words
    • 43 Pages
    Powerful Essays
  • Good Essays

    Finally, the Boeing 787 fiasco highlights the problems with extreme outsourcing of complex systems. As Boeing has moved to insource and control the 787, so too other US and European…

    • 937 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    network cryptography

    • 4974 Words
    • 20 Pages

    supports most of these features, including the authentication scheme described in this paper. Additional information can be found at the NTP home page http://…

    • 4974 Words
    • 20 Pages
    Powerful Essays