How The Chicago Airports Were Hacked Essay

Length: 3 pages Sources: 3 Subject: Transportation Type: Essay Paper: #31614371 Related Topics: Aircraft Maintenance, Biometric Technology, Biometrics, Airport Security
Excerpt from Essay :

Aircraft Flight Disturbance

Internal Memo:

Lessons Learned From September 26th O'Hare International Airport Incident

Senior Management

Recommendations to Avert Widespread Flight Disturbances

On September 26th, 2014, both O'Hare and Midway airports experienced a day-long disruption of operations that led to over 2,000 flights being cancelled and the entire nation affected by the disruption of operations. An employee with psychological problems intent on killing himself started a fire in the basement telecommunications room of the Aurora, Illinois control center, then attempted to slit his throat. After posting his suicide note on Facebook, relatives called 911 and both his life and the control center were saved. The fire damaged the most critical areas of the IT infrastructure for air traffic control for both the O'Hare and Midway airports, forcing air traffic control locations in adjacent states to take on one of the busiest areas of the country for air travel. The lack of IT controls in place made this situation particularly treacherous and very dangerous for the thousands of inbound and outbou7nd flights, and left tens of thousands stranded overnight not only in the Chicago area, but in adjacent airports as well. With a more effective IT systems analysis plan the entire situation could have been averted.



For a single employee to gain access to the most critical systems for the air traffic centers serving O'Hare and Midway airports, it's clear there was no role-based access definitions, in addition to any constraints on key IT asset access as well. These two elements of role-based access definitions and constraints on key IT asset access are foundational to effective enterprise security management initiatives (Lynch, 2006). Best practices for ensuring mission critical information systems aren't impacted by acts like these need to increasingly include advanced safeguards including biometrics to both audit and restrict access to such critical IT assets (Deane, Barrelle, Henderson, Mahar, 1995). To ensure that these systems that are essential for routing traffic through O'Hare and Midway aren't impacted by an internal attack it is imperative that the Chicago Airport Authority restrict access to only those areas of the buildings in Aurora and other locations that need maintenance (Lynch, 2006). Taking away the potential for an arsonist event or any other type of sabotage needs to also begin with a focused series of strategies to limit just how much access any one person has to the systems operating the airport.…

Sources Used in Documents:


Cavusoglu, H., Mishra, B., & Raghunathan, S. (2005). The value of intrusion detection systems in information technology security architecture. Information Systems Research, 16(1), 28-46.

Crockett, B. (1988). People, not systems, key to network security. Network World, 5(12), 17.

Deane, F., Barrelle, K., Henderson, R., & Mahar, D. (1995). Perceived acceptability of biometric security systems. Computers & Security, 14(3), 225.

Lynch, D.M. (2006). Securing Against Insider Attacks. EDPACS, 34(1), 10-20.

Cite this Document:

"How The Chicago Airports Were Hacked" (2014, October 05) Retrieved February 2, 2023, from

"How The Chicago Airports Were Hacked" 05 October 2014. Web.2 February. 2023. <>

"How The Chicago Airports Were Hacked", 05 October 2014, Accessed.2 February. 2023,

Related Documents
Computer Security Briefly Support Your
Words: 2728 Length: 8 Pages Topic: Education - Computers Paper #: 36332437

The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010). C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it

Cyber Warfare
Words: 2636 Length: 10 Pages Topic: Terrorism Paper #: 39907237

Cyber warfare continues to grow larger than imagination as the public becomes more aware of and involved in technology. This work in writing will identify a case study that presents a 'cell', 'klan', or 'state', which conducted or has the capacity to conduct cyber warfare. This work will describe the elements of: who, what, where, and why and means of conducting such cyber warfare and the organizational ideology behind the

Predominantly Latino Gangs, Mara Salvatrucha
Words: 17380 Length: 40 Pages Topic: Criminal Justice Paper #: 44825476

Government Since gang-related crimes fall within the jurisdiction of state, this research will give an insight on the need to find solutions that increasingly include all levels of government. Congress needs to pass legislation that will change immigration enforcement laws and make more aliens deportable. In addition, the federal government should take a more active participation in helping local and state jurisdictions develop anti-gang responses. The local, state and federal governments

Counterterror and Organized Crime As Competing Goals for Law Enforcement...
Words: 4867 Length: 15 Pages Topic: Criminal Justice Paper #: 77407745

Organized Crime / Counterterrorism AL CAPONE OR AL QAEDA?: ORGANIZED CRIME AND COUNTERTERRORISM AS LAW ENFORCEMENT PRIORITIES IN 2014 Should law enforcement in America prioritize fighting counter-terrorism or fighting organized crime? A full examination of the history and issues involved with both will, I would argue, make the answer clear: with the proper definitions involved of both terror and organized crime, it is the latter which genuinely deserves the attention of law enforcement, and

Technology -- Blessing or Curse
Words: 474 Length: 1 Pages Topic: Recreation Paper #: 35198703

Response Yes, technology generates problems, and it is shrewd and apt to point out that for every net gain to certain members of society via technology there is a net loss. The hand weavers of the 18th century were put out of business by 19th century factories that could manufacture clothing cheaply, computers have probably collectively caused the art of calligraphy to die, and made even professional writers overly reliant on