TRB’s Airport Cooperative Research Program (ACRP) Report 140: Guidebook on Best Practices for Airport Cybersecurity provides information designed to help reduce or mitigate inherent risks of cyberattacks on technology-based systems.
Traditional IT infrastructure such as servers, desktops, and network devices are covered along with increasingly sophisticated and interconnected industrial control systems, such as baggage handling, temperature control, and airfield lighting systems.
The guidebook also includes a CD-ROM of multimedia material that may be used to educate all staff at airports about the need, and how, to be diligent against cybersecurity threats.
The CD-ROM is also available for download from TRB’s website as an ISO image. Links to the ISO image and instructions for burning a CD-ROM from an ISO image are provided below.
(Warning: This is a large file and may take some time to download using a high-speed connection.)
CD-ROM Disclaimer - This software is offered as is, without warranty or promise of support of any kind either expressed or implied. Under no circumstance will the National Academy of Sciences or the Transportation Research Board (collectively "TRB") be liable for any loss or damage caused by the installation or operation of this product. TRB makes no representation or warranty of any kind, expressed or implied, in fact or in law, including without limitation, the warranty of merchantability or the warranty of fitness for a particular purpose, and shall not in any case be liable for any consequential or special damages.
National Academies of Sciences, Engineering, and Medicine. 2015. Guidebook on Best Practices for Airport Cybersecurity. Washington, DC: The National Academies Press. https://doi.org/10.17226/22116.
|Chapter 1 - Introduction||4-6|
|Chapter 2 - What Is Cybersecurity?||7-9|
|Chapter 3 - An Approach to Cybersecurity at Airports||10-19|
|Chapter 4 - Implementing Countermeasures||20-38|
|Chapter 5 - Developing a Cybersecurity Program||39-64|
|Chapter 6 - Detecting, Responding to, and Recovering from Attacks||65-69|
|Chapter 7 - Conclusions and Suggested Research||70-72|
|Glossary, Abbreviations, Acronyms, and Symbols||73-75|
|Appendix A - Categorized List of Cybersecurity Threats||80-88|
|Appendix B - Airport Systems||89-93|
|Appendix C - Countermeasures||94-148|
|Appendix D - Using the Multimedia Material||149-153|
The Chapter Skim search tool presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter. You may select key terms to highlight them within pages of each chapter.