Introduction/purpose: The paper provides a review of recent research in the field of GPS and ADS-B spoofing. Systems that rely on satellite positioning technology can be targeted by spoofing in order to generate incorrect positioning/timing, which is accomplished by inserting false signals into the "victim's" receiver. Attackers try to insert false positioning information into systems that, for example, provide navigation of airplanes or drones for the purpose of hijacking or distracting security/safety in airspace surveillance. New concepts of navigation and ATC will thus be necessary. Methods: Using a scientific approach, the paper gives an evaluation of GPS and ADS-B spoofing/antispoofing and how spoofing affects the cyber security of aviation systems. Results: Based on the methodological analysis used, the importance of studying spoofing/anti-spoofing in aviation is shown. Conclusion: Although spoofing in aviation is only a potential threat, its technical feasibility is realistic and its potential is considerable; it becomes more flexible and cheaper due to very rapid advancement of SDR technologies. The real risk, in the time to come, are potential spoofing attacks that could occur from the air, using drones. However, aircraft systems are not exposed to spoofing without any defense; receivers can detect it by applying various anti-spufing techniques. Also, pilots are able to detect and solve problems at every stage of the flight. However, due to a possibility of more sophisticated spoofing attacks, international organizations such as ICAO are proactively working to increase GPS and ADS-B systems robustness on spoofing.
SAJBER BEZBEDNOST U AVIJACIJI U eri informacionih i komunikacionih tehnologija, funkcionisanje društva i privrede, pa tako i avio industrije, bazira se na međusobnom povezivanjuračunarskih sistema, koji se koriste za upravljanje raznim operacijama u vazduhoplovstvu. Ovo povezivanje, s jedne strane, omogućava brojne operativne benefite, dok s druge, infrastrukturni sistemi postaju "ranjivi" na različite sajber napade, koji se mogu ostvariti preko različitih sistema, platformi i tehnologija. Ustanovljeno je da su sajber pretnje u porastu, da su dinamične i nepredvidive, a koriste ih tzv. sajber teroristi s ciljem ostvarivanja različitih oštećenja u vazduhoplovnom sistemu, i to svih njegovihdelova, od sistema kontrole letenja, preko aviona i aviokompanija, do aerodroma i pasoške/carinske kontrole. Iako je prema proceni International Civil Aviation Organisation, rizik od uspešnog terorističkog sajber napada sa gubitkom ljudskih života, u odnosu na druge oblike terorizma, relativno nizak, činjenica je da sajber pretnje mogu imati veliki uticaj na bezbednost, operativni i finansijski integritet, kao i ugled avio sektora u celini. Najskorije, uočeni su brojni slučajevi narušavanja operativnosti velikih aviokompanija izazvanih sajberincidentima, koji, naizgled malog obima, a s obzirom na njihovu ulogu u avio procesima i tendenciju porasta, mogu imati daleko šire i ozbiljnije posledice. U tom kontekstu, u ovom radu bavimo se nekim od glavnih pitanja sajber bezbednosti u avijaciji, kao što su razumevanje i definisanje bezbednosnih sajber pretnji, s naročitim osvrtom na poznate primere sa kojima se danas suočava avijacija, ilustrujući tako rasprostranjenost sajber incidenata i uticaj koji imaju na avijaciju, kao i relevatnost ovog rada.
Države nastoje da spreče skrivanje prihoda i poresku evaziju, kako bi prikupile sredstva za javne potrebe i suzbile dominaciju nekontrolisanih ličnih interesa kao posledicu nelegalnih tokova novca. Informacione tehnologije (IT) unapređuju metode poreske evazije, korupcije i ilegalnih novčanih tokova, a ujedno i nove oblasti primene IT u suzbijanju i borbi protiv legalizacije nezakonitih prihoda i njihove upotrebe za društveno neprihvatljive svrhe. Pranje novca, korupcija i utaja poreza takođe su globalni problem. Međunarodni monetarni fond (MMF) je 2005. godine procenio da se opere oko 1,6 % od vrednosti kojom ukupno operišu banke i finansijski sektor. Kolika bi to suma mogla biti ukazuje podatak da je ukupni opticaj vrednosti 2013. godine iznosio oko 225 biliona dolara. Otuda su nastojanja da se politike borbe protiv pranja novca (AML) definišu na međunarodnom nivou i vodeća uloga međunarodnih tela, Finansijske akcione taktičke grupe (FATF) i Kancelarije UN za droge i kriminal (UNODC). Globalna finansijska vrednost u opticaju, više od tri puta premašuje vrednost globalnog bruto društvenog proizvoda (BDP). U tom svetlu, važno je uspostaviti metod praćenja tokova novca, u uslovima kada oni nisu odraz tržišta roba i usluga. U globalnom finansijskom okruženju, Srbija se suočava sa posledičnim problemima.
In this paper, the authors examine the adequacy of the counter-terrorism concept, which does not envisage institutional responsibility for collecting, processing, and fixing traces of cyber-related terrorist activities. The starting point is the fact that today numerous human activities and communication take place in the cyberspace. Firstly, the focus is on the aspects of terrorism that present a generator of challenges to social stability and, in this context, the elements of the approach adopted by the current National Security Strategy of the Republic of Serbia. In this analysis, adequacy is evaluated from the point of view of functionality. In this sense, it is an attempt to present elements that influence the effectiveness of counter-terrorism in the information age. Related to this is the specification of the role that digital forensics can play in this area. The conclusion is that an effective counter-terrorism strategy must necessarily encompass the institutional incorporation of digital forensics since it alone can contribute to the timely detection or assertion of responsibility for terrorism in a networked computing environment.
Abstract:The current phase of the information age is characterized by more intense and more comprehensive interconnection in cyberspace. This feature of technology promotes changes at the societal level, including consequently the value model. These changes require adaptation of national communities and, thus, represent a challenge for the national security. This paper starts from the observation of parameters of interconnectedness of things, people and processes in cyberspace, and their impact on social organization within the technologically advanced states. That impact is analyzed in regard to the stability of the common value concept of nation-states. The interconnectedness in cyberspace manifests the trend of multiplication in scope. In the leading technological countries, centralized development centers are emerging. This results in attracting financial flows towards the most developed countries, and the rise of the technological elite as an actor in the social power structure. Adapting to the interconnectedness (and the speed) in cyberspace requires improving the individual capacity of perception, which can be achieved through value-oriented education. Re-composition of social power within the community requires implementing democratic mechanisms in cyberspace, and the precondition for this is a strategic national approach to protection and normative regulation of critical information infrastructure.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.