
This is a way to physically transport data to the computer without an internet connection, and was used to spread the Stuxnet virus in Iran (see article in bibliography).
AIR GAPPED COMPUTER INSTALL
So, what if you are a hacker or a government spy and you want to install malware (malicious computer software) on an air-gapped computer? How could you do it? One method involves using social engineering to trick people into inserting removable media (like a CD or USB flash drive) into the computer. It may still be part of an air-gapped network, and connected to other computers on a private network, but not the rest of the internet.įigure 1. An air-gapped computer is physically separated with no hardwired or wireless connection to the rest of the internet. Those routers/modems are connected to servers, which are connected to other servers.indirectly connecting millions of computers all around the world. Normally, computers are connected to the internet through a router or modem via either a hardwired or wireless connection. They do not want to risk those computers being hacked, so the computers are air-gapped-they are not physically connected to the rest of the internet (Figure 1). But sometimes, companies and governments have extremely sensitive information (like classified military documents) or computers that control very important equipment (like a nuclear power plant). If you are not online, then you cannot play games with friends, watch movies, or use social media. After all, most of what you use your computer for probably involves the internet. That might seem like an extreme measure for an average internet user.

But what can you do to make sure your data is completely, 100% safe? What if you disconnect your computer from the internet entirely, by physically unplugging the ethernet cable or turning off Wi-Fi? Could that prevent anyone else from accessing your data?
AIR GAPPED COMPUTER SOFTWARE
There are some practices you can follow to keep your data safe online, like using strong passwords, avoiding clicking on suspicious links or downloading email attachments from people you do not know, and keeping the security software on your computer up to date. The hacks can range from revealing embarrassing personal details to credit card numbers or contact information, and can happen to single individuals or entire companies. If you read the news, you have probably read about data being hacked or stolen from computers or phones.
