Cyber Security At Schiphol Airport Is Ineffective

A cyber security audit  carried out by Dutch Border Police at Amsterdam Schiphol Airport says that the border controls in operation there are neither adequate nor future-proof.

In particular, the IT systems are subjected to very few security tests and the software for two of these IT systems is currently being used despite not having passed the requisite approval procedures. 

Handling almost 80 million passengers every year, Amsterdam Schiphol Airport is not merely the country’s main airport, it is also a vital gateway to Europe and the European Union (EU), and Europe’s second biggest transport hub. 

The systems are not linked to the detection capacity of the Dutch Ministry of Defence and passengers are only checked at the passport desk and via electronic self-service gates, although travellers from outside the Schengen area are also screened with pre-assessment before arrival.

The importance of IT in border control is huge, and growing and digitisation makes it faster and more thorough, but at the same time, it creates dependence and new risks.

The passport counter, electronic self-service gates and the pre-assessment stage each have their own separate IT systems and the audit suggests that the cyber security of border controls operated by Dutch border guards at Amsterdam Schiphol Airport is not as effective in practice as it could be. For the purpose of safeguarding the cyber security of border controls, the Minister of Justice and Security makes use of the expertise and IT infrastructure of the Ministry of Defence and Schiphol NV. 

Although the Dutch Ministry of Defence possesses the expertise needed to guarantee a high level of cyber security, it seems that itdoes not always make use of this expertise in practice in accordance with the arrangements madein its own guidelines. 

In the light of all the impending technological developments, it is believed that the current level of cyber security in relation to the border controls is neither adequate nor future-proof. Due to the importance of Amsterdam Schiphol Airport and the huge volume of personal data involved, the border controls could well form an attractive target for hackers.

RekenKamer:         Computer Weekly:         Airbus:    

You Might Also Read:

Air Travel Needs Stronger Cyber Security:

 

 

« Coronavirus Track & Trace Apps On A Deadline
Cyber Attacks Knock 7.2% Off The Average Company Share Price »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Linklaters LLP

Linklaters LLP

Linklaters is an international law firm. Practice areas include Information Management and Data Protection.

Centre for the Protection of National Infrastructure (CPNI) - UK

Centre for the Protection of National Infrastructure (CPNI) - UK

CPNI works with the National Cyber Security Centre (NCSC), Cabinet Office and lead Government departments and agencies to drive forward the UK's cyber security programme to counter cyber threats.

Arsenal Recon

Arsenal Recon

Arsenal Recon are digital forensics experts, providing consultancy services and powerful software tools to improve the analysis of electronic evidence.

AnChain.AI

AnChain.AI

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions.

Strategic Cyber Ventures (SCV)

Strategic Cyber Ventures (SCV)

SCV grow cybersecurity companies that disrupt advanced cyber adversaries and revolutionize the cyber product marketplace.

CybrHawk

CybrHawk

CybrHawk is a leading provider of information security-driven risk intelligence solutions focused solely on protecting clients from cyber-attacks.

SoloKeys

SoloKeys

SoloKeys provides the first open-source FIDO2 security key: Protect your online accounts against unauthorized access by using the most secure login method.

Pivot Technology School

Pivot Technology School

Pivot Tech offers Data Analytics, Software Development and Cyber Security training in boot camp style cohorts.

Dataprise

Dataprise

Dataprise is a leading IT managed services provider offering IT Management and Help Desk Support Services, Cloud Services, Information Security Solution, IT Strategy and Consulting.

Alibaba Cloud

Alibaba Cloud

Alibaba Cloud is committed to safeguarding the cloud security for every business by leveraging a comprehensive suite of enterprise security services and products on the platform.

Accops Systems

Accops Systems

Accops enables secure and instant remote access to business applications from any device and network, ensuring compliant enterprise mobility.

Strac

Strac

Eliminate Personal Data Risks from your business. Our Dataless SaaS removes the need to manage sensitive data across web, mobile apps, servers and communication channels.

Oxeye

Oxeye

Oxeye fills the gap between cloud and code to show exploitable vulnerabilities, and their path from API to code. More visibility. Less noise. More time to build.

Abissi

Abissi

Abissi offer cyber intelligence, IoT security, automotive security, red teaming, application security and artificial intelligence security services, with a focus on security by design.

STACK Cybersecurity

STACK Cybersecurity

STACK Cybersecurity serves as a strategic partner, guiding you through the intricate and dynamic cybersecurity landscape.

Leapfrog Services

Leapfrog Services

Leapfrog offers outsourced managed IT + cybersecurity services that are scalable, aligned, and fit easily into your business model.