{"id":12120,"date":"2023-09-30T17:10:50","date_gmt":"2023-09-30T17:10:50","guid":{"rendered":"https:\/\/businessyield.com\/tech\/?p=12120"},"modified":"2023-09-30T17:10:51","modified_gmt":"2023-09-30T17:10:51","slug":"air-gapped-computer-what-is-it-how-do-you-secure-one","status":"publish","type":"post","link":"https:\/\/businessyield.com\/tech\/technology\/air-gapped-computer-what-is-it-how-do-you-secure-one\/","title":{"rendered":"Air Gapped Computer: What Is It & How Do You Secure One?","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"\n

If you are a cyber security enthusiast, you are bound to come across the term \u201cair gapped computer.\u201d As it relates to computer networking, air gapping is a security measure to ensure that a computer network is physically isolated from unsecured networks like the internet and local area networks.<\/p>\n\n\n\n

Nowadays, cyber security is at high stake. Organizations constantly transmit sensitive data across networks and hence, cyberattacks are on the rise. Ransomware, for example, is one of the most common\u00a0cyber threats\u00a0these days. Cybersecurity Ventures predicts the global cost of ransomware attacks to increase to $265bn by 2031.<\/p>\n\n\n\n

The rising number of cyber attacks is the main reason why tight security is paramount. In general, a secure infrastructure includes multiple layers of protection dispersed throughout computers, programs, and networks. The\u00a0air gap<\/strong>\u00a0concept is also believed to be a highly effective way to protect valuable information. But is it really secure enough?\u00a0<\/p>\n\n\n\n

What is an Air Gap?<\/strong><\/span><\/h2>\n\n\n\n

An\u00a0air gap<\/em>\u00a0is a network security measure that implies a physical separation between a secure network and any other computer or network. <\/p>\n\n\n\n

An air-gapped computer is isolated from unsecured networks, meaning that it is not directly connected to the internet, nor is it connected to any other system that is connected to the internet. A true air gapped computer is also physically isolated. This means the only way to pass data to it is physically (via USB, removable media, or a firewire with another machine).<\/p>\n\n\n\n

The term “air gapping” refers to the idea that there is a gap of air between the computer and other networks. It isn’t connected to them and it can’t be attacked over the network. An attacker would have to “cross the air gap” and physically sit down in front of the computer to compromise it, as there’s no way to access it electronically over a network.<\/p>\n\n\n\n

Air gapping also plays an\u00a0important role in backup and recovery. For example with 3-2-1 backups, each backup has three copies. While two of the copies can be stored on the same network, the third copy has to be air-gapped and stored in a completely different physical location. This way, even if the network is attacked and the first two copies become compromised, storage administrators can use the air-gapped copy to restore data quickly.<\/p>\n\n\n\n

Some companies will market that a network or computer is air gapped despite the fact that the systems are only separated with a software firewall. Be cautious of this, as firewalls can be breached as a result of both security failures and misconfiguration.<\/p>\n\n\n\n

How to Air Gap a Computer<\/strong><\/span><\/h2>\n\n\n\n

Air gapping a computer is actually pretty simple: Just disconnect it from the network. <\/p>\n\n\n\n

Don’t connect it to the internet, and don’t connect it to a local network. Disconnect any physical Ethernet cables and disable the computer’s Wi-Fi and Bluetooth hardware. For maximum security, consider reinstalling the computer’s operating system from trusted installation media and using it entirely offline after that.<\/p>\n\n\n\n

Don’t re-connect the computer to a network, even when you need to transfer files. If you need to download some software, for example, use a computer connected to the internet, transfer the software to something like a USB drive, and use that storage device to move the files back and forth. <\/p>\n\n\n\n

This ensures that your air-gapped system can’t be compromised by an attacker over the network. It also ensures that, even if there is malware like a keylogger on your air-gapped computer, it can’t communicate any data over the network.<\/p>\n\n\n\n

For better security, disable any wireless networking hardware on the air-gapped PC. For example, if you have a desktop PC with a Wi-Fi card, open the PC and remove the Wi-Fi hardware. If you can’t do that, you could at least go to the system’s\u00a0BIOS or UEFI firmware\u00a0and disable the Wi-Fi hardware.<\/p>\n\n\n\n

Types of air gaps<\/strong><\/h2>\n\n\n\n

There are three main types of the air gap concepts:<\/p>\n\n\n\n