13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

orders, guidance, and processes, which govern the civil aviation community by us<strong>in</strong>g those<br />

terms. However, <strong>in</strong> the parlance of the security community, laws, orders, guidance, and<br />

processes are referred to as be<strong>in</strong>g policy. Consequently, ARP 4754, ARP 4761, DO-178B, DO-<br />

252, and the ACs are referred to as be<strong>in</strong>g <strong>FAA</strong> safety policies. This po<strong>in</strong>t is mentioned because<br />

the follow<strong>in</strong>g quotation is taken from the security community.<br />

“An important concept <strong>in</strong> the design and analysis of secure systems is the<br />

security model, because it <strong>in</strong>corporates the security policy that should be enforced<br />

<strong>in</strong> the system. A model is a symbolic representation of policy. It maps the<br />

desires of the policy makers <strong>in</strong>to a set of rules that are to be followed by a<br />

computer system. … A security model maps the abstract goals of the policy to<br />

<strong>in</strong>formation system terms by specify<strong>in</strong>g explicit data structures and the techniques<br />

necessary to enforce the security policy. A security model is usually represented<br />

<strong>in</strong> mathematics and analytical ideas, which is then mapped to system<br />

specifications, and then developed by programmers through programm<strong>in</strong>g code.<br />

… Formal security models, such as Bell-LaPadula are used to provide high<br />

assurance <strong>in</strong> security... A security policy outl<strong>in</strong>es goals with no idea of how they<br />

would be accomplished and a model is a framework that gives the policy form<br />

and solves security problems for particular situations.” (Quoted from reference 83<br />

pages 239-240.)<br />

It is important that the civil aviation community understand the <strong>in</strong>tended mean<strong>in</strong>g of this<br />

quotation (i.e., that differences <strong>in</strong> term<strong>in</strong>ology not cause misunderstand<strong>in</strong>g).<br />

Therefore, us<strong>in</strong>g security community term<strong>in</strong>ology, ARP 4574 and DO-178B reflect <strong>FAA</strong> policy<br />

for airborne software. Other entities (e.g., the DoD) have articulated other policy systems.<br />

Security models exist to provide a mathematical foundation by which well-def<strong>in</strong>ed policy<br />

systems (such as the DoD or the <strong>FAA</strong>) can be extended <strong>in</strong>to arbitrarily complex and vast<br />

networked environments and still reta<strong>in</strong> their orig<strong>in</strong>al policy viability <strong>in</strong> a mathematically<br />

demonstrable manner. The goal of this section is to expla<strong>in</strong> the technical foundation for this<br />

study’s recommendation for how to extend the current certification safety processes (e.g., ARP<br />

4574 and DO-178B safety policy) <strong>in</strong>to arbitrarily large networked system environments by<br />

means of the Biba Integrity Model. 27<br />

The Bell-LaPadula Confidentiality Model [84] was developed to formalize the U.S. DoD’s<br />

multilevel security policy. It forms the framework for confidentiality with<strong>in</strong> the Federal<br />

government’s <strong>in</strong>formation process<strong>in</strong>g, <strong>in</strong>clud<strong>in</strong>g the DoD’s COMSEC policy. This model<br />

creates a multilevel security policy system by means of mandatory access controls that label data<br />

at a specific classification level, and provide users clearances to a specific classification level.<br />

The controls ensure that users cannot read <strong>in</strong>formation classified at a security level higher than<br />

27<br />

This quotation consistently refers to security policy. This is because the context from which this quotation was<br />

taken was talk<strong>in</strong>g about security policy. The system (i.e., policy vis-à-vis security model) is not dependent upon<br />

whether the operative policy is a security or a safety policy. Rather, the operative concept is that it is a well<br />

def<strong>in</strong>ed policy with<strong>in</strong> the security doma<strong>in</strong>. As was previously stated, airborne safety is with<strong>in</strong> the security doma<strong>in</strong><br />

whenever it perta<strong>in</strong>s to networked environments.<br />

80

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!