Air gapped computer network
There have been instances where data exfiltration has happened through other methods also, such as unknown backdoors introduced into software/hardware, FM frequency signals, thermal hacking, or through Near-Field Communication (NFC). Ultimately, as technology advances, there is no guarantee that mere isolation from an outside network will keep an air-gapped system safe. Employees with access to specific air-gapped networks might find their removable storage media infected with malware which when inserted into an air-gapped system, could go on to infect the system and the network. Insider threats like rogue employees can still be used to access the air-gapped network.
Social engineering remains a key threat factor and, in this type of situation, the risks are magnified. Secondly, even though air-gapped networks are separated from the outside world, they aren’t separated from another key cybersecurity threat: human beings themselves. The worm was introduced to the environment through infected USB drives, hence providing a stark reminder that air-gapped networks can be compromised with great effect. Discovered in 2010, it caused substantial damage to Iran’s nuclear program, causing centrifuges to tear apart. The biggest example of this kind of malicious activity was the Stuxnet worm. They can be used for a range of malicious activities such as data exfiltration, installation of malware & keylogging devices, etc. As we have observed, USB devices are commonly used to propagate various types of malware. Are they truly secure?įirstly, air-gapped networks can still be accessed through physical storage devices. Unfortunately, that kind of perspective may often lead to security problems. Hence, do not need to be examined or assessed from a security standpoint. There is an inherent assumption that, since air-gapped networks do not have any access point, they are completely secure and. Yet, air-gapped networks may also provide a false sense of security. That’s why security administrators prefer to contain such information in air-gapped networks that have no connection with the overall corporate network.
These assets are integral to the organization and could cause irrevocable damage if lost. The only way for data to enter or exit this kind of network is through using physical mediums like USB Drives or CD-ROMs.Īir-gapped networks are generally used to isolate critical infrastructure from the corporate network so that such crucial information is not compromised. Their wireless controllers are disabled which renders the entire network a “closed system”. Since air-gapped networks have no network interfaces, they theoretically have no wired or wireless connections to the outside world. The key motivation behind installing air-gapped networks is the sense of security it provides to the enterprise. The term “ air-gapped” is derived from plumbing and refers to the air gap used to maintain water quality.Ĭoming back to computer networks, air-gapped networks are primarily seen in high-security environments like military and government networks, intelligence systems, nuclear power plants, or avionics. This essentially means that the system or the network is physically not connected to any outside network, whether it is the internet or a local area network. An air-gapped network (or system) is isolated from all other networks.