An Air-gapped computer is usually completely isolated and disconnected from the Internet and other computers. It does not form part of any other network that may or may not be connected to a WAN or Internet for security purposes. This post discusses the air-gapped computer and its use. We’ll also examine the probability of an air-gapped computer getting hacked.
What is an Air-gapped computer?
An air-gapped computer safeguards critical data and protects it from hackers and malware. It is a computer system that is not connected to any other computer. It is never online, as it has no Internet connection to prevent it from ever getting hacked or infected.
In air-gapped computers, the objective is to keep custom apps (programs) and data safe. Since malware can propagate through Flash drives, they are also used sparingly. Any type of connection to all types of removable drives is avoided as far as possible.
Air-gapped computers store data critical to business houses, the military, and similar entities. You might have seen in movies that such air-gapped computers (or maybe museum artifacts) are protected by military-grade laser sensors so that an alarm is sounded when any unauthorized person gets closer to the computer. Normally, air-gapped computers are stored in separate rooms, equipped with high security. It is called air-gapped because the only thing between the computer and other items around it is air.
What is the purpose of an air-gapped computer?
The purpose of an air-gapped computer is to enhance security by physically isolating it from any other network, including the internet. This isolation prevents unauthorized access and protects sensitive data from cyber threats and external breaches.
How to create an air-gapped computer?
Creating an air-gapped computer is easy. Just disconnect the LAN (Ethernet) cable and disable the Wi-Fi card and Bluetooth on the computer. Perform a clean format on the computer. Install only the required program/app and data on this computer. In the future, if the need arises to transfer data to this computer or from this computer, use clean flash drives. Always keep the antimalware software updated on this computer. Use a Flash drive to update virus definitions instead of connecting the air-gapped computers to the Internet for the purpose. Connecting such computers to a WAN or Internet for even a few minutes may defeat the purpose of air-gapping of those computers.
Is an air-gapped computer unhackable?
Well, almost. Air-gapped computers aim to create an environment where data or programs cannot be stolen or infected by malware. But methods exist to break into such computers:
- Social Engineering
- Data over Sound after injecting malware into the system
Social Engineering is where a person with authority over the air-gapped computer is submitted to give the secrets. Or, to infect the computer by injecting some type of malware.
Data on a computer can be copied by modulating it over sound from a short distance. In this case, too, it would be a deliberate attempt to harm the organization whose system is being targeted. Once malware to that effect is injected into the system, the speaker and mic would take commands and process them in an inaudible range of sound. Inaudible commands received by the mic are processed inaudibly by the speakers of the computers. Data can be stolen using such sound waves.
In both cases, the physical presence of the hacker or a person planted/compromised by him should have access to the air-gapped computer. This physical presence requirement removes the possibility of a remote attack (except data over sound). Thus, though breakable, air-gapped computers are extremely secure.
Are air-gapped computers no longer secure?
Air-gapped computers are not entirely secure as they can still be vulnerable to attacks, such as air gap malware utilizing acoustic signaling. Despite the physical isolation, researchers have demonstrated successful breaches, highlighting that air-gapped systems require additional security measures beyond their physical separation.
The above explains the meaning of air-gapped computers’ meaning and whether they can be broken into.