HOME

TheInfoList



OR:

An air gap, air wall, air gapping or disconnected network is a
network security Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves th ...
measure employed on one or more computers to ensure that a secure
computer network A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are ...
is physically isolated from unsecured networks, such as the public
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
or an unsecured
local area network A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building. By contrast, a wide area network (WAN) not only covers a larger ...
. It means a computer or network has no
network interface controller A network interface controller (NIC, also known as a network interface card, network adapter, LAN adapter or physical network interface, and by similar terms) is a computer hardware component that connects a computer to a computer network. Ear ...
s connected to other networks, with a physical or conceptual air gap, analogous to the air gap used in plumbing to maintain water quality.


Use in classified settings

An ''air-gapped'' computer or network is one that has no network interfaces, either wired or wireless, connected to outside networks. Many computers, even when they are not plugged into a wired network, have a
wireless network interface controller A wireless network interface controller (WNIC) is a network interface controller which connects to a wireless network, such as Wi-Fi or Bluetooth, rather than a wired network, such as a Token Ring or Ethernet. A WNIC, just like other NICs, wor ...
(
WiFi Wi-Fi () is a family of wireless network protocols, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio wa ...
) and are connected to nearby wireless networks to access the Internet and update software. This represents a security vulnerability, so air-gapped computers either have their wireless interface controller permanently disabled or physically removed. To move data between the outside world and the air-gapped system, it is necessary to write data to a physical medium such as a thumbdrive, and physically
move it "Move It" is a song written by Ian Samwell and recorded by Cliff Richard and the Drifters (the English band that would later become "The Shadows"). Originally intended as the B-side to "Schoolboy Crush", it was released as Richard's debut sing ...
between computers. Physical access has to be controlled (man identity and storage media itself). It is easier to control than a direct full network interface, which can be attacked from the exterior insecure system and, if malware infects the secure system, can be used to export secure data. That's why some new hardware technologies are also available like unidirectional data diodes or bidirectional diodes (also called electronic airgaps), that physically separate the network and transportation layers and copy and filter the application data. In environments where networks or devices are rated to handle different levels of
classified information Classified information is material that a government body deems to be sensitive information that must be protected. Access is restricted by law or regulation to particular groups of people with the necessary security clearance and need to kn ...
, the two disconnected devices or networks are referred to as ''low side'' and ''high side'', ''low'' being unclassified and ''high'' referring to classified, or classified at a higher level. This is also occasionally referred to as ''red'' (classified) and ''black'' (unclassified). Access policies are often based on the Bell–LaPadula confidentiality model, where data can be moved low-to-high with minimal security measures, while high-to-low requires much more stringent procedures to ensure protection of the data at a higher level of classification. In some cases (for instance industrial critical systems), the policy is different: data can be moved from high-to-low with minimal security measures, but low-to-high requires a high level of procedures to ensure integrity of the industrial safety system. The concept represents nearly the maximum protection one network can have from another (save turning the device off). One way to transfer data between the outside world and the air-gapped system is to copy data on a removable storage medium such as a removable disk or
USB flash drive Universal Serial Bus (USB) is an industry standard that establishes specifications for cables, connectors and protocols for connection, communication and power supply ( interfacing) between computers, peripherals and other computers. A bro ...
and physically carry the storage to the other system. This access still has to be carefully controlled since USB drive may have vulnerabilities (see below). The upside to this is that such a network can generally be regarded as a closed system (in terms of information, signals, and emissions security), unable to be accessed from the outside world. The downside is that transferring information (from the outside world) to be analyzed by computers on the secure network is extraordinarily labor-intensive, often involving human security analysis of prospective programs or data to be entered onto air-gapped networks and possibly even human manual re-entry of the data following security analysis. That's why another way to transfer data, used in appropriate situations like critical industries, is to use data diodes and electronic airgaps, that assure a physical cut of the network by a specific hardware. Sophisticated computer viruses for use in cyberwarfare, such as
Stuxnet Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing subs ...
and agent.btz have been designed to infect air-gapped systems by exploiting
security hole Vulnerabilities are flaws in a computer system that weaken the overall security of the device/system. Vulnerabilities can be weaknesses in either the hardware itself, or the software that runs on the hardware. Vulnerabilities can be exploited by ...
s related to the handling of
removable media Expandable storage is a form of computer storage that is designed to be inserted and removed from a system. Some forms of removable media, such as optical discs, require a reader to be installed in the computer, while others, such as USB flash dr ...
. The possibility of using acoustic communication has also been demonstrated by researchers. Researchers have also demonstrated the feasibility of data exfiltration using FM frequency signals.


Examples

Examples of the types of networks or systems that may be air gapped include: * Military/governmental computer networks/systems; * Financial computer systems, such as stock exchanges; * Industrial control systems, such as SCADA in Oil & Gas fields; * National and state lottery game
machines A machine is a physical system using power to apply forces and control movement to perform an action. The term is commonly applied to artificial devices, such as those employing engines or motors, but also to natural biological macromolecul ...
or
random number generators Random number generation is a process by which, often by means of a random number generator (RNG), a sequence of numbers or symbols that cannot be reasonably predicted better than by random chance is generated. This means that the particular ou ...
, which are required to be completely isolated from networks to prevent
lottery fraud Lottery fraud is any act committed to defraud a lottery game. A perpetrator attempts to win a jackpot prize through fraudulent means. The aim is to defraud the organisation running the lottery of money, or in the case of a stolen lottery ticket, t ...
*
Life-critical system A safety-critical system (SCS) or life-critical system is a system whose failure or malfunction may result in one (or more) of the following outcomes: * death or serious injury to people * loss or severe damage to equipment/property * environme ...
s, such as: ** Controls of nuclear power plants; ** Computers used in
aviation Aviation includes the activities surrounding mechanical flight and the aircraft industry. ''Aircraft'' includes fixed-wing and rotary-wing types, morphable wings, wing-less lifting bodies, as well as lighter-than-air craft such as hot a ...
, such as FADECs,
air traffic control Air traffic control (ATC) is a service provided by ground-based air traffic controllers who direct aircraft on the ground and through a given section of controlled airspace, and can provide advisory services to aircraft in non-controlled airs ...
systems, and
avionics Avionics (a blend of ''aviation'' and ''electronics'') are the electronic systems used on aircraft. Avionic systems include communications, navigation, the display and management of multiple systems, and the hundreds of systems that are fit ...
; ** Computerized medical equipment; * Very simple systems, where there is no need to compromise security in the first place, such as: ** The engine control unit and other devices on the
CAN bus A Controller Area Network (CAN bus) is a robust vehicle bus standard designed to allow microcontrollers and devices to communicate with each other's applications without a host computer. It is a message-based protocol, designed originally for mu ...
in an
automobile A car or automobile is a motor vehicle with wheels. Most definitions of ''cars'' say that they run primarily on roads, seat one to eight people, have four wheels, and mainly transport people instead of goods. The year 1886 is regarde ...
; ** A digital thermostat for temperature and compressor regulation in home HVAC and refrigeration systems; ** Electronic sprinkler controls for watering of lawns. Many of these systems have since added features that connect them during limited periods of time to the organisation's internet (for the need of surveillance or updates) or the public internet, and are no longer effectively and permanently air gapped, including thermostats with internet connections and automobiles with
Bluetooth Bluetooth is a short-range wireless technology standard that is used for exchanging data between fixed and mobile devices over short distances and building personal area networks (PANs). In the most widely used mode, transmission power is limi ...
, Wi-Fi and cellular phone connectivity.


Limitations

Limitations imposed on devices used in these environments may include a ban on wireless connections to or from the secure network, or similar restrictions on EM leakage from the secure network through the use of
TEMPEST Tempest is a synonym for a storm. '' The Tempest'' is a play by William Shakespeare. Tempest or The Tempest may also refer to: Arts and entertainment Films * ''The Tempest'' (1908 film), a British silent film * ''The Tempest'' (1911 film), a ...
or a Faraday cage. Despite a lack of direct connection to other systems, air-gapped networks have been shown to be vulnerable to attack in various circumstances. Scientists in 2013 demonstrated the viability of air gap malware designed to defeat air gap isolation using acoustic signaling. Shortly after that,
network security Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves th ...
researcher Dragos Ruiu's BadBIOS received press attention. In 2014, researchers introduced ''AirHopper'', a bifurcated attack pattern showing the feasibility of data exfiltration from an isolated computer to a nearby mobile phone, using FM frequency signals. In 2015, BitWhisper, a covert signaling channel between air-gapped computers using thermal manipulations was introduced. BitWhisper supports bidirectional communication and requires no additional dedicated peripheral hardware. Later in 2015, researchers introduced GSMem, a method for exfiltrating data from air-gapped computers over cellular frequencies. The transmission - generated by a standard internal bus - renders the computer into a small cellular transmitter antenna. ''ProjectSauron'' malware discovered in 2016 demonstrates how an infected USB device can be used to remotely leak data off of an air-gapped computer. The malware remained undetected for 5 years and relied on hidden partitions on a USB drive not visible to Windows as a transport channel between the air-gapped computer and a computer connected to the internet, presumably as a way to share files between the two systems. ''NFCdrip'' was the name given to the discovery of stealthy data exfiltration through NFC (Near-field communication) radio abuse and signal detection in 2018. Although NFC enables devices to establish effective communication by bringing them within a few centimeters of each other, researchers showed that it can be abused to transmit information at a much longer range than expected - up to 100 meters. In general, malware can exploit various hardware combinations to leak sensitive information from air-gapped systems using "air-gap covert channels". These hardware combinations use a number of different media to bridge the air-gap, including: acoustic, light, seismic, magnetic, thermal, and radio-frequency.


Software updates

From a security perspective, the main drawback of an air gapped network is the inability of software to automatically self update. Users and system administrators must instead download and install updates manually. If a strict update routine is not followed, this results in out-of-date software running on the network, which may contain known security vulnerabilities. If an adversary manages to gain access to the air gapped network (for instance by contacting a disgruntled employee or using social engineering) they may be able to quickly spread within the air gapped network using such vulnerabilities with a possibly higher success rate than on the public Internet. System administrators may manage software updates in an air gapped network using dedicated solutions such as
Windows Server Update Services Windows Server Update Services (WSUS), previously known as Software Update Services (SUS), is a computer program and network service developed by Microsoft Corporation that enables administrators to manage the distribution of updates and h ...
or network logon scripts. Such mechanisms would allow all computers on the air gapped network to automatically install updates after the system administrator downloads the updates from the Internet once. The problem is not completely eliminated though, especially if users have administrative privileges on their local workstations and are therefore able to install software which is not centrally managed. The presence of IoT devices requiring firmware updates can also complicate matters, since often such updates cannot be centrally managed.


See also

* Air gap malware *
Firewall (computing) In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted ...
* Near sound data transfer * NIPRNet *
SIPRNet The Secure Internet Protocol Router Network (SIPRNet) is "a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information (up to and including information cla ...
*
Sneakernet Sneakernet, also called sneaker net, is an informal term for the transfer of electronic information by physically moving media such as magnetic tape, floppy disks, optical discs, USB flash drives or external hard drives between computers, rather ...
*
Tempest (codename) TEMPEST is a U.S. National Security Agency specification and a NATO certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations. TEMPEST covers bot ...
*
Van Eck phreaking Van Eck phreaking, also known as Van Eck radiation, is a form of eavesdropping in which special equipment is used to pick up side-band electromagnetic emissions from electronic devices that correlate to hidden signals or data to recreate these sig ...


References

{{Reflist Network architecture Data security