What's new

Lockheed Martin: "The F-35 stealth fighter is well protected against cyber attacks"

DavidSling

SENIOR MEMBER
Joined
Oct 25, 2013
Messages
4,826
Reaction score
0
Country
Israel
Location
Israel
Two days for CyberTech 2016: The future fighter aircraft of the IAF is equipped with the most advanced protection against cyber-attacks, says Lockheed Martin

The F-35 stealth aircraft, which will arrive at the Israeli Air Force towards the end of the year (nicknamed "Adir" in the IAF) is equipped with the a highly advanced defense system against cyber-attacks, in order to prevent network attacks against aircraft in the air, on land and at sea.

Cyber protection of military and civilian systems is among the topics that will be discussed at the large CyberTech 2016 conference, organized by Israel Defense, and held at the Tel Aviv Convention Center on Tuesday and Wednesday this week 26-27/1/16).

A document published by the F-35 manufacturer Lockheed Martin reports that the plane's network system allows the pilot to share data with ground-based command centers and with other aircraft, and this entire system is being protected from cyber-attacks.

Mike Panczenko, director of cyberengineering at Lockheed Martin said: “We protect the F-35 data with the same vigor we apply to all of our customer products we develop. The platforms we build are under threat from a variety of adversaries. We regularly take actions to increase the security of our systems.”

Panczenko said that during the assembly of the aircraft, the whole ecosystem of the platform was examined, from the supply chain to techniques and knowledge of certain threats, and that “we ensure all components come from trusted sources and are not made from inferior materials. There is a strict security review throughout the design process."

To improve security on the F-35 and other products, Lockheed Martin deploys its Cyber Kill Chain—the company’s overarching framework for defeating systematic threats or intrusions. This intelligence-driven defense process is designed to proactively remediate and mitigate advanced threats against highly sensitive economic, proprietary or national security information. Computer specialists act like hackers and “red team” systems, or mount attacks and expose weaknesses.

Dr. Harvey Kushner, director of the Homeland Security and Terrorism Institute at Long Island University, said that in the F-35 project, durable technology and skilled human operators are crucial to winning the cybersecurity war. He said the companies should take lessons from military and government systems “where there is a greater emphasis on cybersecurity and an appropriate balance of functionality and security.”
 
Nothing is foolproof. Everything and anything can be hacked.
 
Back
Top Bottom