SDI Logo
Services
Industries
About SDI
Resources
IT Managed Services
Government
About Us
Blogs
Advisory & Consulting
Utilities
Locations
News
ServiceNow
Aviation
Leadership
Videos
Enterprise Data & AI
Transportation
History
White Papers
Enterprise Asset Management
Public Safety
Careers
Case Studies
Public Safety
Commercial Real Estate
Culture
Banking, Financial Services & Insurance
Diverse Partnerships
ArchiveLink
Xchange
Manufacturing
End-User Services & Support
Infrastructure Services

Search request

Search
Contact Us
Back to blog
Home
•
Blogs
•
Airports in the Storm

Airports in the Storm

On this page:
Heading

Airport security isn’t just ID checks and baggage scans anymore.

Fourteen U.S. airports experienced Distributed-Denial-of-Service (DDoS) attacks last week, resulting in brief website access glitches. Luckily, TSA’s aviation security program now requires designated cybersecurity coordinators to report cybersecurity incidents, conduct cybersecurity assessments, and develop remediation and incident response plans, so legitimate customers were only briefly inconvenienced.

Nevertheless, TSA announced that additional performance-based cybersecurity requirements for critical aviation systems will be rolled out soon in response. To explain why, let’s break down what DDoS attacks are and why hackers use them.

Beware of the Zombie Botnets

A DDoS attack is a malicious attempt to disrupt normal traffic to a network, server, or service. Usually, these attacks are SYN floods or UDP attacks, in which networks of “zombie” machines, aka botnets, all execute the same call to a specified target at the same time, interfering with legitimate user traffic.

DDoS attacks are among the simplest cyberattacks. Once the hacker identifies a target, they can punch information into a simple tool and hit the ground running. Like a remote control, the tool can issue commands from a distance. Cybercriminals typically install a DDoS tool on hundreds, if not thousands, of machines and mobilize them as a botnet group to launch coordinated attacks on a single target.

The amount of downtime a DDoS attack can cause is a function of the target’s security countermeasures. These attacks are not usually isolated incidents; they often happen repeatedly until the cybercriminal feels that they accomplished their goal. Well protected targets may only go down for a minute while less mature organizations may stay down for as long as a month.

In this case, the cybercriminals appear to have used the SYN flood technique to target the airport websites. SYN-flood is a protocol attack in which numerous connection requests never complete, overwhelming website resources and delaying connection for legitimate visitors. Most ISPs do not protect against protocol-based attacks, so it is important to avoid complacency. You cannot rely on your ISP for DDoS protection.

Learn How to Fight Back

To limit vulnerability to these attacks, organizations must protect themselves. The ideal solution helps end the attack quickly by using intelligent systems and services rather than human intervention.

The keys to protecting yourself again SYN floods are:

  • A properly configured firewall, using IDS and IPS, basic IP tables protection techniques, and modified rules.
  • Protection using switches
  • Server redundancy
  • Continuous monitoring
  • Network segmentation into subnets with unique security controls and protocol limitations
  • Commercial tools and services to prevent spoofing by validating sources and blocking abnormal traffic
  • Configuring network devices like routers, load balances, and DNS to manage traffic spikes and build in remediation time if preventative measures fail

Was This a Test?

Certified ethical hackers like me are taught to think like cybercriminals. Looking at this attack from that perspective, I believe this was just a test. Hackers are smart people, and they learn the same way other cybersecurity experts do. I believe that hackers will gather data from the aftermath of the recent airport attacks by reading or watching media coverage.

If these attacks were a test, then there is probably something bigger in the works. In the aftermath of a DDoS attack, is important to evaluate all incident response plans, resolve existing vulnerabilities, and address any significant outages immediately. Temporary solutions are better than nothing, but it is important to plan for the long term.

It is important to really understand the potential impact of attacking airport websites. If a DDoS prevention solution had not stopped the attack, what might have happened next? How could we prevent it? What would that process look like?

I always like to compare cybersecurity to securing a house: You need to protect the structure, not just the belongings inside it. Similarly, in business, you must protect people, processes, and the technology, including data and access.

In the aftermath of these attacks, I highly recommend reevaluating your security tools, practices, policies, procedures, both physical and operational. I also recommend additional testing and preparation for the possibility that your service provider and/or your DDoS tools fail to contain an attack.

If you are attacked, remain on alert for anything suspicious and report it promptly.

Looking to improve your organization’s cybersecurity posture? CONTACT SDI to drive vigilance and resilience across your enterprise.

‍

Read more
Category:
Public Safety
Aviation

Latest Insights from SDI

Discover more insights

Stay connected with SDI Presence.

Receive our latest resources, press releases, and stay up-to-date on the latest news.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Blogs
•
April 29, 2026
Why Data & CMDB Readiness Is Critical for AI
Blogs
•
April 28, 2026
From Data Chaos to Clarity: Solving the Public Sector Data Problem for AI Success
Blogs
•
April 14, 2026
Top Takeaways from ACI's Airports@Work 2026: Navigating Complexity in Mission-Critical Operations
Blogs
•
April 1, 2026
The Future of Maintenance: Integrating Preventive and Predictive EAM in 2026 
News
•
March 31, 2026
SDI Presence Appoints LaDarius Jackson as Vice President of ServiceNow Delivery
Blogs
•
March 24, 2026
From Data Lake to Data Swamp: Why Bad Data Poisons Every Decision 
News
•
March 18, 2026
SDI Presence Joins Western Regional Innovation & Technology Alliance (WRITA)
Blogs
•
March 3, 2026
Running ServiceNow Where Failure Isn’t an Option
News
•
February 3, 2026
SDI Presence names George J. Sperekas II Account Executive for Illinois SLED market 
Blogs
•
February 3, 2026
Escaping the IT Upside Down: How to Stop Tech Chaos Before It Takes Over
Blogs
•
February 3, 2026
ServiceNow SKO 2026 Takeaways: Delivering Ambition at AI Speed 
Blogs
•
February 3, 2026
From AI Pilots to Production: The Critical Role of Governance-as-a-Service
Blogs
•
December 18, 2025
2025 in Review: A Year of Presence, Progress, and Purpose
Blogs
•
December 18, 2025
Why AI Projects Fail and How Governance-as-a-Service Fixes It 
Blogs
•
December 18, 2025
Don’t Let IT Be the Grinch: How Managed Services Keep Business Running Through the Holidays
Discover more insights

Ready to transform your IT operations?

Contact to learn how our IT Managed Services can benefit your organization
Work With Us
Footer Background Image
Stay Connected with SDI.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

We'd love to hear from you! Please fill out the form and we'll get back to you as soon as possible.


[Placeholder text - Hubspot will create the error message]
[Placeholder text - HubSpot will replace this with form submitting text]
Thanks for submitting the form.
Services
IT Managed Services
Advisory & Consulting
ServiceNow
Enterprise Data & AI
Enterprise Asset Management
Public Safety
Xchange
Industries
Government
Utilities
Aviation
Transportation
Public Safety
Commercial Real Estate
Banking, Financial Services 

& Insurance
Manufacturing
About SDI
About Us
Locations
Leadership
History
Careers
Diverse Partnerships
Resources
Blogs
News
Videos
White Papers
Case Studies
X - TWITTER
INSTAGRAM
LINKEDIN
FACEBOOK
© 2026 SDI All rights reserved
Terms of Service
Privacy Policy
Website by Foursets with love