What Is Air Gap?
Air Gap is a security measure taken where any computer, network, or device is disconnected from any internet or LAN connectivity. It guarantees complete electromagnetic, electrical, and, most significantly, the physical isolation of a given system from other networks, particularly those that are not secure.
The phrase “air gap” is only a metaphor for the intellectual gap created by the physical separation of the devices. When the highest safety or the stored data on it is required, air-gapped internet protocols are utilized. Viruses, keyloggers, ransomware, and other unauthorized access are all prevented by air gaps.
Aside from storing data on hardware storage devices, cloud platforms are recently available for utilization, such as google drive and dropbox. They are the safest form online where users can keep files.
Unless a hacker is physically near the computer, it’s virtually hard to corrupt an air-gapped computer or gadget. While there are more sophisticated ways to break into an air-gapped computer, most require standing a few feet away and utilizing specific equipment to broadcast signals to unprotected USB ports.
Vital systems are routinely air-gapped all over the world. Military/government computer networks, stock market systems, life-critical systems (for example, nuclear power plant controllers), and journalists dealing with sensitive material are all examples.
Despite the high degree of security provided by an air gap, numerous sophisticated strategies have been proposed to find a means to infiltrate air-gapped systems. However, some of these remain theoretical rather than practical. Hackers can attack hackable cell phones to pick up higher frequencies via cutting-edge acoustic channels that use ultrasonic, inaudible sound waves. Even when Bluetooth is turned off, data may be snatched via radio transmissions. As a result, smartphones are not permitted within range of much vital equipment in high-security locations.
Air Gap Example
For a fintech company to safeguard their internet server from hackers who may enter it despite their high-level firewall, they employ a hard disc to store the data of their top-rated clients and backups of their files.« Back to Glossary Index