Monday, September 23, 2019

Word of the Day: air gapping

 
Word of the Day WhatIs.com
Daily updates on the latest technology terms | September 23, 2019
air gapping

Air gapping is a security measure that involves physically isolating a computer or network to prevent it from connecting directly or wirelessly to other systems that can connect to the Internet. Air gapping is used to protect many types of critical systems, including those that support the stock market, the military, the government and industrial power industries.

To prevent unauthorized data extrusion through electromagnetic or electronic exploits, there must be a specified amount of space between the air-gapped system and outside walls and between its wires and the wires for other technical equipment. In the United States, the U.S. National Security Agency TEMPEST project provides best practices for using air gaps as a security measure.

 

For a system with extremely sensitive data, a Faraday cage can be used to prevent electromagnetic radiation (EMR) escaping from the air-gapped equipment. Although such measures may seem extreme, van Eck phreaking can be used to intercept data such as key strokes or screen images from demodulated EMR waves, using special equipment from some distance away. Other proof-of-concept (POC) attacks for air- gapped systems have shown that electromagnetic emanations from infected sound cards on isolated computers can be exploited and continuous wave irradiation can be used to reflect and gather information from isolated screens, keyboards and other computer components.

 

As of this writing, the Defense Advanced Research Projects Agency (DARPA) is awarding grants for prototype hardware and software designs that will keep sensitive data physically isolated. The grants are made possible under the Guaranteed Architecture for Physical Security (GAPS) program.

 

Enhancing air-gapped security measures

 

The problem with physical separation as a security technique is that, as complexity increases in some system or network to be isolated, so does the likelihood that some unknown or unauthorized external connection will arise.

 

Perhaps the most important way to protect a computing device or network from an air gap attack is through end user security awareness training. The infamous Stuxnet worm, which was designed to attack air-gapped industrial control systems, is thought to have been introduced by infected thumb drives found by employees or obtained as free giveaways.

The software-defined perimeter (SDP) framework is another tool network engineers can use to create a type of "virtual air gapping" through policy enforcement. SDP requires external endpoints that want to access internal infrastructure to comply with authentication policies and ensures that only authenticated systems can see internal IP addresses.

Quote of the Day

 
"The single most important measure you can take in protecting backups against ransomware is to implement an air gap." - Brien Posey

Learning Center

 

How air gap attacks challenge the notion of secure networks
The use of air gap attacks is challenging the notion that air-gapped networks are safe from hackers. Discover how these attacks work and how to defend against them.

DHS details electrical grid attacks by Russian agents
DHS claims Russian agents have performed hundreds of electrical grid attacks, including on utilities that were air-gapped and isolated, with the potential for serious damage.

Create a manageable, secure IT/OT convergence strategy in 3 steps
In any IT/OT convergence strategy, the organization needs to include 3 steps: Hire or identify their IoT evangelist, decide on an IoT infrastructure reference architecture and address how they'll handle the challenges of updating architecture and dividing the operations between IT and OT.

Best practices for implementing an enterprise network air gap system
Brad Casey discusses how to implement the network air gap system security concept in order to improve protection against advanced attacks in the enterprise.

Can a thermal sensor pull data from an air-gapped computer?
Learn how heat emissions and thermal sensors can be used to exfiltrate sensitive data from an air-gapped computer, as well as how to defend against the threat.

Quiz Yourself

 
Exploit kits allow non-technical threat actors to do ____ of damage.
A. a lot
B. alot

Answer

Stay in Touch

 
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

Visit the Word of the Day Archives and catch up on what you've missed!

FOLLOW US

TwitterRSS
About This E-Newsletter
The Word of the Day is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: