Air Traffic Control
evaluate a cyber security threat to an Air Traffic Control information system or an aircraft system used to guide aircraft. Be sure to comment on the threat, risk, stakeholder roles, responsibilities, etc., with respect to the CANSO approach to mitigate attacks through the four steps indicated:
Planning
Protecting
Detecting
Responding