13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• The security viability of current networked systems is partially a direct function of the<br />

network and system management (<strong>in</strong>clud<strong>in</strong>g configuration management) expertise of its<br />

adm<strong>in</strong>istrative personnel.<br />

• The protocols of the IP family can be secured, but their cumulative underly<strong>in</strong>g key<br />

management system is ad hoc and complex—with direct configuration and management<br />

implications.<br />

• The IP family’s network management system, <strong>in</strong>clud<strong>in</strong>g its underly<strong>in</strong>g simple network<br />

management protocol version 3 (SNMPv3) protocol, has questionable security viability<br />

when used <strong>in</strong> network environments that have large numbers of devices built by many<br />

different vendors.<br />

• Whenever different security adm<strong>in</strong>istrations or technologies are jo<strong>in</strong>ed together <strong>in</strong> a<br />

cooperative manner (e.g., aircraft and ground systems), it is important and challeng<strong>in</strong>g to<br />

def<strong>in</strong>e the <strong>in</strong>terfaces between the systems <strong>in</strong> such a way that a dim<strong>in</strong>ished security<br />

posture for the comb<strong>in</strong>ed system as a whole does not result.<br />

This report describes assurance mechanisms to mitigate these threats. However, the mitigation<br />

system has one key miss<strong>in</strong>g element (see section 7.2). Until that element has been successfully<br />

addressed, no networked system can currently be guaranteed to be as safe or as secure as the<br />

currently deployed non-networked airborne systems.<br />

2.2 WHY BOTH TARGET ALTERNATIVES HAVE SIMILAR SECURITY POSTURES.<br />

It was mentioned that the architecture <strong>in</strong> figure 3 is more secure than the architecture <strong>in</strong> figure 1.<br />

However, both alternatives have similar security postures, such that the same network solution,<br />

which is described <strong>in</strong> section 8.3, addresses the security and safety requirements for both target<br />

alternatives.<br />

Figure 4 shows that both target alternatives similarly expose onboard aircraft systems to possible<br />

attacks from the worldwide Internet <strong>in</strong>frastructure for the reasons expla<strong>in</strong>ed <strong>in</strong> section 4.1.<br />

While the air gap between passenger and avionics equipment of figure 3 (see bottom of figure 4)<br />

protects avionics systems from be<strong>in</strong>g directly attacked <strong>in</strong>tra-aircraft from the passenger network,<br />

they are still theoretically exposed to remote passenger or Internet attack via the NAS.<br />

13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!