13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Protection Detection Reaction / Neutralization Recovery / Reconstitution<br />

- ongo<strong>in</strong>g risk assessments<br />

- technology controls<br />

- security processes<br />

- system log monitor<strong>in</strong>g<br />

- network and host-based<br />

<strong>in</strong>trusion detection<br />

- warn<strong>in</strong>g, escalation to<br />

<strong>in</strong>cident response team<br />

Ongo<strong>in</strong>g Damage<br />

- system recovery beg<strong>in</strong>s<br />

(e.g. hardware replaced,<br />

applications and<br />

<strong>in</strong>formation restored)<br />

System Assessment<br />

- Is the system recoverable?<br />

- Does the system require<br />

reconstitution?<br />

Successful attacks<br />

Neutralized, Repelled<br />

Detected attacks<br />

Undetected attacks<br />

Figure 16. Control Life Cycle<br />

5.2 DEPARTMENT OF DEFENSE NETWORKING.<br />

The U.S. DoD is currently creat<strong>in</strong>g their next-generation network that has similar issues as the<br />

aircraft and NAS <strong>in</strong>tegration targets be<strong>in</strong>g addressed <strong>in</strong> this report. Section 6.3 will compare the<br />

DoD confidentiality classifications with the DO-178B software level safety classifications.<br />

Section 7 will propose extend<strong>in</strong>g the DO-178B and ARP 4754 safety concepts <strong>in</strong>to networked<br />

environments by us<strong>in</strong>g the Biba Integrity Model [51 and 52]. The Biba Integrity Model is a<br />

direct analog of the Bell-LaPadula Confidentiality Model, which is used by the DoD to extend<br />

their confidentiality classifications <strong>in</strong>to large system deployments such as networks. These<br />

proposed changes result <strong>in</strong> the safety extension approach that is recommended by this study for<br />

civilian aircraft, directly resembl<strong>in</strong>g the DoD global <strong>in</strong>formation grid (GIG) <strong>in</strong>frastructure, which<br />

is targeted for military aircraft. Because of this, this section provides a terse overview of how<br />

the DoD is design<strong>in</strong>g their GIG.<br />

The GIG seeks to empower the DoD’s network centric operations and network centric warfare<br />

vision. The GIG comprises the DoD’s <strong>in</strong>ternal network of networks, which is similar <strong>in</strong> concept<br />

to the worldwide civilian Internet <strong>in</strong>frastructure.<br />

The architecture of the GIG is strongly <strong>in</strong>fluenced by DoD communications security (COMSEC)<br />

policies. The Bell-LaPadula Confidentiality Model forms the framework for confidentiality<br />

with<strong>in</strong> U.S. DoD <strong>in</strong>formation process<strong>in</strong>g, <strong>in</strong>clud<strong>in</strong>g the DoD’s COMSEC policy. This model<br />

creates a multilevel security system by means of mandatory access controls, label<strong>in</strong>g data at a<br />

specific classification level, and provid<strong>in</strong>g users’ clearances to a specific classification level.<br />

The controls ensure that users cannot read <strong>in</strong>formation classified at a security level higher than<br />

their own classification level, nor write <strong>in</strong>formation to a lower classification level, except via the<br />

controlled <strong>in</strong>tervention by a trusted subject (e.g., a high-assurance guard (HAG)).<br />

55

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!