Security

 Security

1. in your opinion, Which of the two aircraft breaches is more dangerous: the breach described here or the breach created by the hacker (described earlier in the chapter) who took control of a plane ’ s throttle briefly through the entertainment system and then tweeted about it? Why?

2. what questions would you pose to the information security executive responsible for the flight plan system to ensure that this hack was no longer possible? what other plan would you put in place to build a defence in depth?

3. If password control is used to solve the ACARS weakness, what might hackers do next? and given your answer, what might managers do to gaurd against that?

Answer Preview

APA Format, 1371 words
Open chat
Hello
Contact us here via WhatsApp