An air gap is a security measure that involves isolating a computer or network and preventing it from establishing an external connection. An air-gapped computer is physically segregated and incapable of connecting wirelessly or physically with other computers or network devices.
Air gaps protect critical computer systems or data from potential attacks ranging frommalware and ransomware tokeyloggers or other attacks from malicious actors.
To transfer data between a computer or network and an air-gapped system, data is copied to a removable media device such as a USB drive and is physically carried by the user to the other system. In systems where security is paramount, the air-gapped system should have restricted access so only a few trusted users can access the system and deliver the data. Theprinciple of least privilege limits users' access rights, which can also help decrease the chances of acyber attack.
Air-gapped systems are still susceptible to electromagnetic leakage, which are waveforms emitted from the computing devices or wires that a hacker can analyze and use to attack the system. To prevent electromagnetic exploits, there's usually a specified amount of space between the air-gapped system and the outside walls, as well as space between its wires and the wires of other technical equipment. For a system with extremely sensitive data, an organization can use a Faraday cage to prevent electromagnetic radiation from escaping from the air-gapped equipment.
Although these measures may seem extreme, athreat actor could still intercept keystrokes or screen images from demodulated electromagnetic radiation waves from some distance away using special equipment.
Another way to protect a computing device or network from an air-gap attack is through end-usersecurity awareness training. The infamous Stuxnet worm, which was designed to attack air-gapped industrial control systems, is thought to have been introduced by infected thumb drives found by employees or obtained as free giveaways.
Air-gapped networks are used to protect many types of critical systems from hackers or other malicious threat actors. For example, air-gapped networks are used to support the stock market, the military, government agencies and industrial power industries.
Air gaps are also used for backup and recovery. When data backups are air gapped, the security measure can aid in recovery efforts. For example, if an organization uses air gapping as part of its backup strategy and its network ishit by a ransomware attack, the air-gapped copy of data can be used for recovery.
There are generally three types of air gaps: total physical air gaps, air-gapped systems isolated within one environment and logical air gaps.
Some organizations may also have to handle two levels of information, which are separated into high and low sides. The high side is information or systems that require a highly secured environment -- such as critical infrastructure -- while the low side is data or systems that can be left connected to a network.
Although some organizations believe that air gapping is a viable security measure, air gaps are disappearing due to the following challenges:
In 2018, the U.S. accused Russia of infecting air-gapped systems for electrical grid operations. Another instance where an attack jumped the air gap is when the Kudankulam Nuclear Power Plant in Tamil Nadu, India, washit by a cyber attack, even though it had air-gapped systems. Any data at rest inside an air-gapped system should be encrypted to help createstronger cybersecurity practices and reduce vulnerabilities.
Learn more aboutair gap backups and how they add alayer of protection to data.
Succession planning is the strategic process of identifying and developing internal candidates to fill key organizational roles to ensure business continuity and the availability of effective leadership in the face of role transitions, departures or unforeseen events. See More.
Multi-access edge computing (MEC) is a network architecture concept that brings cloud computing capabilities and IT services ...
Fifth-generation wireless or 5G is a global standard and technology for wireless and telecommunications networks.
A small cell is a type of low-power cellular radio access point or base station that provides wireless service within a limited ...
No longer just a good idea, IAM is a crucial piece of the cybersecurity puzzle. It's how an organization regulates access to ...
Data masking is a security technique that modifies sensitive data in a data set so it can be used safely in a non-production ...
Antivirus software (antivirus program) is a security program designed to prevent, detect, search and remove viruses and other ...
A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...
User-generated content (UGC) is published information that an unpaid contributor provides to a website.
Business process outsourcing (BPO) is a business practice in which an organization contracts with an external service provider to...
Succession planning is the strategic process of identifying and developing internal candidates to fill key organizational roles ...
Compensation management is the discipline and process for determining employees' appropriate pay, incentives, rewards, bonuses ...
HR technology (human resources tech) refers to the hardware and software that support an organization's human resource management...
A virtual agent is an AI-powered software application or service that interacts with humans or other digital systems in a ...
Customer acquisition cost (CAC) is the cost associated with convincing a consumer to buy your product or service, including ...
Direct marketing is a type of advertising campaign that seeks to elicit an action (such as an order, a visit to a store or ...
