Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Protection Detection Reaction / Neutralization Recovery / Reconstitution<br />
- ongo<strong>in</strong>g risk assessments<br />
- technology controls<br />
- security processes<br />
- system log monitor<strong>in</strong>g<br />
- network and host-based<br />
<strong>in</strong>trusion detection<br />
- warn<strong>in</strong>g, escalation to<br />
<strong>in</strong>cident response team<br />
Ongo<strong>in</strong>g Damage<br />
- system recovery beg<strong>in</strong>s<br />
(e.g. hardware replaced,<br />
applications and<br />
<strong>in</strong>formation restored)<br />
System Assessment<br />
- Is the system recoverable?<br />
- Does the system require<br />
reconstitution?<br />
Successful attacks<br />
Neutralized, Repelled<br />
Detected attacks<br />
Undetected attacks<br />
Figure 16. Control Life Cycle<br />
5.2 DEPARTMENT OF DEFENSE NETWORKING.<br />
The U.S. DoD is currently creat<strong>in</strong>g their next-generation network that has similar issues as the<br />
aircraft and NAS <strong>in</strong>tegration targets be<strong>in</strong>g addressed <strong>in</strong> this report. Section 6.3 will compare the<br />
DoD confidentiality classifications with the DO-178B software level safety classifications.<br />
Section 7 will propose extend<strong>in</strong>g the DO-178B and ARP 4754 safety concepts <strong>in</strong>to networked<br />
environments by us<strong>in</strong>g the Biba Integrity Model [51 and 52]. The Biba Integrity Model is a<br />
direct analog of the Bell-LaPadula Confidentiality Model, which is used by the DoD to extend<br />
their confidentiality classifications <strong>in</strong>to large system deployments such as networks. These<br />
proposed changes result <strong>in</strong> the safety extension approach that is recommended by this study for<br />
civilian aircraft, directly resembl<strong>in</strong>g the DoD global <strong>in</strong>formation grid (GIG) <strong>in</strong>frastructure, which<br />
is targeted for military aircraft. Because of this, this section provides a terse overview of how<br />
the DoD is design<strong>in</strong>g their GIG.<br />
The GIG seeks to empower the DoD’s network centric operations and network centric warfare<br />
vision. The GIG comprises the DoD’s <strong>in</strong>ternal network of networks, which is similar <strong>in</strong> concept<br />
to the worldwide civilian Internet <strong>in</strong>frastructure.<br />
The architecture of the GIG is strongly <strong>in</strong>fluenced by DoD communications security (COMSEC)<br />
policies. The Bell-LaPadula Confidentiality Model forms the framework for confidentiality<br />
with<strong>in</strong> U.S. DoD <strong>in</strong>formation process<strong>in</strong>g, <strong>in</strong>clud<strong>in</strong>g the DoD’s COMSEC policy. This model<br />
creates a multilevel security system by means of mandatory access controls, label<strong>in</strong>g data at a<br />
specific classification level, and provid<strong>in</strong>g users’ clearances to a specific classification level.<br />
The controls ensure that users cannot read <strong>in</strong>formation classified at a security level higher than<br />
their own classification level, nor write <strong>in</strong>formation to a lower classification level, except via the<br />
controlled <strong>in</strong>tervention by a trusted subject (e.g., a high-assurance guard (HAG)).<br />
55