Air Gap

In networks, air gap is a type of security where the network is secured by keeping it separate from other local networks and the Internet. While this provides security, it also limits access to the network by clients.

Portions of this definition originally appeared on CIO Insight and are excerpted here with permission.

How do air-gapped networks work?

In a typical network, users are able to connect to and transfer data in a network using external connections, such as public network access and emails. However, these connections make it easier for hackers to gain access to a private network.

In comparison, air-gapped networks require external, non-network means of transfer for data movement to happen. These methods may include removable hardware or media like a USB drive and transient devices like laptops. Both require a human with physical access to both machines along with the proper authentication credentials.

As few are willing to take the time and risk once the attack vector has been complicated through isolation, adding a gap of air between private and public networks deters most attackers.

How secure are air-gapped networks?

Air-gapped networks offer a high form of network security, as the isolation of the network makes it difficult for information to accidentally or purposefully be moved to and from the network.

Moreover, air gapping deters attackers since they need in-person access to a network device rather than being able to hop over from another network or to get login credentials through phishing.

Despite these deterrents, there are still several valid concerns regarding the physical security of air-gapped networks. The transient devices allowed to connect to the network can get lost or stolen, and authorized users may accidentally or purposefully use transient devices to carry information or malware to and from the network.

The Stuxnet worm case from 2010 is a strong example of how network hardware can cause damage, as that particular strain of malware spread to Iranian industrial and nuclear plants via USB drives.

Go deeper on the security of air-gapped networks | CIO Insight

Why are air-gapped networks important?

While there are concerns about the current and future effectiveness of air-gapped networks, especially since the growth of AI and IoT devices requires always-on communication between public and private networks, there are still many security and workflow advantages, such as:

  • Air-gapped networks increase isolation and secrecy, which increases security in high-risk scenarios and industries such as the government and military.
  • Companies can easily protect and separate highly-secure programs that don’t need constant network access.
  • Remote hacking is nearly impossible; hacking is made difficult by requiring attackers to be onsite.
  • Payment and controls systems can be kept separate from the rest of a business’s public or private networks.

As security breaches and their costs are on the rise, an air-gapped network can be a great way to ensure the protection of data and users from a growing number of cyber threats.

Shelby Hiter
Shelby Hiter
Shelby Hiter is a writer with more than five years of experience in writing and editing, focusing on healthcare, technology, data, enterprise IT, and technology marketing. She currently writes for four different digital publications in the technology industry: Datamation, Enterprise Networking Planet, CIO Insight, and Webopedia. When she’s not writing, Shelby loves finding group trivia events with friends, cross stitching decorations for her home, reading too many novels, and turning her puppy into a social media influencer.

Top Articles

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

What are the Five Generations of Computers? (1st to 5th)

Reviewed by Web Webster Each generation of computer has brought significant advances in speed and power to computing tasks. Learn about each of the...

Hotmail [Outlook] Email Accounts

Launched in 1996, Hotmail was one of the first public webmail services that could be accessed from any web browser. At its peak in...

DarkSide Ransomware

DarkSide ransomware, first discovered in August 2020, is used to perform sensitive data...

Contact Center CRM

Contact center CRM tools, or call center CRM tools, help businesses with call...

LogMeIn Rescue

LogMeIn Rescue is a software-as-a-service (SaaS) solution that offers remote desktop software and...