13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4. NETWORK RISKS.<br />

This section specifically discusses network security issues that are directly relevant to airborne<br />

safety and security with<strong>in</strong> networked environments. Two papers authored by Daniel Mehan [18<br />

and 19], the former <strong>FAA</strong> Chief Information Officer (CIO), provide an important context for the<br />

material discussed <strong>in</strong> this section. These papers describe the cumulative processes needed to<br />

create a secure and safe NAS environment. These processes are partially summarized <strong>in</strong> figure<br />

6. The majority of the topics covered <strong>in</strong> this section directly focus on network system aspects of<br />

“Cyber Harden<strong>in</strong>g of System and Network Elements,” shown <strong>in</strong> figure 6, of a total protection<br />

system. Many other aspects of NAS safety and security are not addressed with<strong>in</strong> this section and<br />

are only briefly addressed by this study.<br />

Architecture and Eng<strong>in</strong>eer<strong>in</strong>g<br />

Personnel<br />

Security<br />

Physical<br />

Security<br />

Cyber Harden<strong>in</strong>g of<br />

System and Network Elements<br />

Compartmentalization<br />

Redundancy<br />

Awareness and Execution<br />

Figure 6. The <strong>FAA</strong> Five Layers of System Protection [18]<br />

Reference 20 also provides very helpful concepts and background <strong>in</strong>formation for the aircraft<br />

network safety and security topics presented <strong>in</strong> this section and appendix A.<br />

It is important to recognize that network threats are always evolv<strong>in</strong>g. An <strong>in</strong>determ<strong>in</strong>ate number<br />

of network threats exist. These network threats can mutate quite rapidly. For example, the<br />

follow<strong>in</strong>g is an example of a current network threat that did not exist the year before this study<br />

was written.<br />

“File encrypt<strong>in</strong>g Trojans are becom<strong>in</strong>g so complex that security companies could<br />

soon be powerless to reverse their effects, a new report from Kaspersky Lab said.<br />

19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!