SlideShare a Scribd company logo
1 of 3
Download to read offline
 
Business & GA (/category/business-ga), Commercial (/category/commercial), Connectivity (/category/connectivity), Embedded Avionics
(/category/embedded-avionics), IIOT (/category/iiot), IIOT Aerospace (/category/iiot-aerospace), Military (/category/military), Regulation
(/category/regulation), Unmanned (/category/unmanned)
Will Today’s Cybersecurity Guidelines and Standards Become Mandates
for Connected Aircraft Systems?
By Frank Wolfe (/author/fwolfe) | April 9, 2020
Send Feedback (/contact-us/)
connected aircraft (/?s=&facets[taxonomy_post_tag][]=connected+aircraft), connectivity (/?s=&facets[taxonomy_post_tag][]=connectivity), Cybersecurity (/?
s=&facets[taxonomy_post_tag][]=cybersecurity), standards (/?s=&facets[taxonomy_post_tag][]=standards)
     
Wind River says the singular architecture of its Helix Virtualization Platform for running embedded systems is more secure from cyber attack than the alternative of running each embedded system independently. EASA and FAA
cybersecurity mandates are likely to ramp up in the next two years. Photo: Wind River
Aviation cybersecurity mandates by the European Union Aviation Safety Agency (EASA) and the Federal Aviation Administration (FAA) are coming in the next two
years, according to participants in an Avionics International Apr. 7 webinar, Clearing the Skies of Cybersecurity Vulnerabilities from the Ground Up, .
(https://event.webcasts.com/viewer/event.jsp?ei=1285183&tp_key=f0641b3b03)
This year, EASA may adopt AMC 20-42 (NPA 2019-1) (https://www.easa.europa.eu/sites/default/ les/dfu/NPA%202019-01.pdf) that will link information
security guidelines to the high-level cyber standards of RTCA DO-326A or the EUROCAE ED-202 series.
Asked during the webinar how the avionics industry has thus far embraced airworthiness cybersecurity standards in RTCA DO-326A, 355 and 356, Alex Wilson,
the director of aerospace and defense at Wind River, said that cybersecurity standards "have been adopted slowly, but I think we’ll see a more rapid adoption
throughout this year and the coming year.”
"Currently, the standards are more voluntary or applied on a case by case basis on aircraft systems as they go into certi cation," he said. "These standards have
been around in embryonic form since the [Boeing] 787 [Dreamliner] rst went through its airworthiness process [a decade ago]."
Wilson predicted that "once we see those standards being mandated through rules and regulations, we’ll start to see a massive adoption and a requirement of all
new avionics systems to go through [these] standards."
Such mandates may spark, or re-ignite, the operational red teaming of aircraft cyber systems.
It has been unclear what the path forward is for cyber vulnerability testing of airliners in the United States after last month's decision by the Department of
Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) to end the testing of a Boeing 757-200 (https://www.aviationtoday.com/wp-
admin/post.php?post=88111&action=edit) at the Federal Aviation Administration (FAA) William J. Hughes Technical Center in Atlantic City.
Cyber vulnerabilities are not the exclusive domain of commercial airliners, but also are faced by military and business aircraft and future urban air mobility
platforms and by diverse systems, such as onboard radar altimeters, Global Positioning System receivers, and military Identi cation Friend or Foe (IFF) systems.
Paul Hart, the chief technology of cer at Curtiss-Wright Defense Solutions, said that combat search and rescue helicopters can have up to 60 computers
onboard to run ight control processes, such as take-off and landing, and complex synthetic vision systems, while UAVs normally have less than 10 processors for
ight control and detect and avoid systems, and airliners "typically have more than 100 computing platforms."
While e-Enabled aircraft provide ight and cost advantages for operators, they also come with cybersecurity vulnerabilities.
“The obvious question is, 'Isn’t it just safer to separate from the Internet?'" Wilson asked at the start of his webinar presentation. "Why should we e-Enable and
connect our aircraft? There’s a whole list of reasons why we might want to do that. In this modern age, everyone is going through a process of digital
transformation, moving to more intelligent platforms, and that gives us huge bene ts in terms of operational ef ciency, the ability to implement new advanced
technologies, such as predictive maintenance so that we can reduce operational costs of our aircraft systems and allow us to update more ef ciently the aircraft
systems themselves, such as weather data on the aircraft and other data sources."
"That also allows us to increase the amount of revenue we’re getting from our passenger systems and provide a better passenger experience while we y," Wilson
said. "There are huge challenges when we look at aviation systems that are very different to those we see in the IT world. Within the IT world we tend to see
applications moving to the Cloud-based systems and moving very quickly with new updates daily and new features and functionality. The security standards
within the IT world are certainly not well suited to the aviation world so we need to think about how we manage that. Also, within the IT world we tend to see
systems being updated very rapidly compared to the update cycle that we see within our aircraft. So there are lots of challenges as we start to connect and
provide that Internet connectivity.”
(https://www.aviationtoday.com/wp-content/uploads/2020/04/screen-shot-2020-04-09-at-9-29-46-am.png)
These are the guidelines for cybersecurity associated with connected aircraft systems, which as of today, are not mandated by civil aviation authorities. Photo: Wind River
Indeed, while relatively isolated ACARS and VHF video data links and, more recently ADS-B (In) and ADS-B (Out) were the major features of aircraft electronics,
aircraft wireless connectivity has opened up a range of vulnerabilities, Hart said. Instead of leather ight bags with paper charts, aircrews now can carry aboard
Electronic Flight Bag (EFB) tablets and iPads that are able, through aircraft Wi-Fi, to obtain ight parameters to calculate take-off performance, for example.
Maintenance engineers can also connect wirelessly to avionics systems of ight line aircraft through laptop Portable Maintenance Aids (PMA) for troubleshooting
aircraft systems.
To update its cybersecurity policy as new threats emerge, Wind River uses the CIA Triad technique, which maps requirements against the three pillars of
cybersecurity: Con dentiality, sustaining data the privacy of data being transmitted and stored, such as map data; Integrity--the accuracy of data during and
after software updates, for example; and Availability for the uninterrupted ow of data, even in the face of common denial of service cyber attacks.
Want to hear more on aircraft connectivity applications? Check out the Global Connected Aircraft Podcast
(https://www.gcasummit.com/podcasts/), where Avionics editor-in-chief Woodrow Bellamy III interviews airlines and industry in uencers on
how they're applying connectivity solutions.
Michael Mehlberg, vice president of marketing at Star Lab, a Wind River subsidiary, said that Wind River has adopted a cybersecurity rst holistic approach
through an examination of how cyber components interact with one another and a "defense in depth" with layers of cyber protection. Linux-based embedded
systems, for example, while exible, also have vulnerabilities, which Wind River mitigates through such means as operating system-level hardening, Linux LSM
(Security-Enhanced Linux stacking), immutable deployment con gurations, and multiple le systems, such as the authentication and/or encryption of
applications, libraries, and data.
In addition, a secure boot process is a "massively important part of the cybersecurity process" to ensure no cyber intrusion happens while computer systems are
at rest.
"The security policy and con guration really has to be a combination of products, product features, advanced security features, professional services to provide
and mitigate a security assessment and add additional security where required and a combination of partnerships, for instance the Curtiss-Wright hardware with
the Wind River software, in order to implement a secure system," Wilson said.
The upcoming EASA and FAA mandates may have implications for military systems as well.
Cybersecurity for military aircraft and legacy platforms is "one of the classic challenges we face in not just aircraft systems, but all systems," Wilson said.
"A lot of these systems have really not been designed to be connected in the way we imagine, and so we are exposing them to more and more threats, as we start
to connect them to the Internet or even to any communications system," he said. "Adding a communications interface to an aircraft system or any system is really
starting to open that out to vulnerabilities that weren't planned into the system when it was originally designed. For any legacy platforms or military aircraft, you
have to think about what are the consequences of adding that connectivity."
"In some cases, they already have communication links," Wilson said. "We need to make sure that the communication links we are using have been secured in the
right way for deployment in the eld. We already know from experience that some very early unmanned aircraft systems that were deployed straight from the lab
in effect into operational scenarios were exposed to security issues that hadn't been taken into account."
"As we start to think about security more and more and start to implement security across all embedded systems, in fact all computer systems, and we become
more aware about how security operates, we need to gure out how we protect all of these types of systems," he said. "If you are going to connect a legacy
platform to the network, instantly that opens that vulnerability up and you should go through a security assessment to see what vulnerabilities you would need to
protect against through that data link. Are you using an encrypted data link, for example, to that system? Are you using secure boot on the data link to make sure
nothing can in ltrate it and get in? All those kinds of techniques, we would have to gure out how we implement that, and of course that is going to have a cost
effect on our systems."
 
 
 
 
Receive the latest avionics news right to your inbox
SIGN UP (/s
More On This Topic

More Related Content

What's hot

ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceAustin Eppstein
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)ChristopherAntonius
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckSecurity Innovation
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIAGILLY
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
[RakutenTechConf2013] [A-0] Security Meets Analytics
[RakutenTechConf2013] [A-0] Security Meets Analytics[RakutenTechConf2013] [A-0] Security Meets Analytics
[RakutenTechConf2013] [A-0] Security Meets AnalyticsRakuten Group, Inc.
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsMubashir Ali
 
Trends Affecting the Future of Cybersecurity
Trends Affecting the Future of CybersecurityTrends Affecting the Future of Cybersecurity
Trends Affecting the Future of CybersecurityMason Bird
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorIBMGovernmentCA
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0mobileironmarketing
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareGFI Software
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...GFI Software
 

What's hot (19)

Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Securing the Fog
Securing the FogSecuring the Fog
Securing the Fog
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality Check
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
[RakutenTechConf2013] [A-0] Security Meets Analytics
[RakutenTechConf2013] [A-0] Security Meets Analytics[RakutenTechConf2013] [A-0] Security Meets Analytics
[RakutenTechConf2013] [A-0] Security Meets Analytics
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
 
Trends Affecting the Future of Cybersecurity
Trends Affecting the Future of CybersecurityTrends Affecting the Future of Cybersecurity
Trends Affecting the Future of Cybersecurity
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0
 
The Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent ThemThe Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent Them
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 

Similar to Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Connected Aircraft Systems?

cyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIcyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIfEngel
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresIJRES Journal
 
Cyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_videoCyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_videoOWASP Delhi
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGijitcs
 
ConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPGreg Harms
 
Cost of dependency on TCPIP based Aircrafts
Cost of dependency on TCPIP based AircraftsCost of dependency on TCPIP based Aircrafts
Cost of dependency on TCPIP based AircraftsAmbreen Zafar
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd Iaetsd
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docxRAHUL126667
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSSECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSMarco Lisi
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingYolanda Ivey
 
AbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxAbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxSALU18
 

Similar to Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Connected Aircraft Systems? (20)

cyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIcyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNI
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
 
Cyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_videoCyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_video
 
AirViewWhitePaper
AirViewWhitePaperAirViewWhitePaper
AirViewWhitePaper
 
municipal_drones_FINAL
municipal_drones_FINALmunicipal_drones_FINAL
municipal_drones_FINAL
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
 
ConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WP
 
Cyber Security in Civil Aviation
Cyber Security in Civil AviationCyber Security in Civil Aviation
Cyber Security in Civil Aviation
 
Cost of dependency on TCPIP based Aircrafts
Cost of dependency on TCPIP based AircraftsCost of dependency on TCPIP based Aircrafts
Cost of dependency on TCPIP based Aircrafts
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
 
Nextgen
NextgenNextgen
Nextgen
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
 
A Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and ConsequencesA Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and Consequences
 
Scs.pptx repaired
Scs.pptx repairedScs.pptx repaired
Scs.pptx repaired
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSSECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
 
AbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxAbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docx
 

More from TJR Global

Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...
Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...
Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...TJR Global
 
The main ICT and cloud trend will be edge computing
The main ICT and cloud trend will be edge computingThe main ICT and cloud trend will be edge computing
The main ICT and cloud trend will be edge computingTJR Global
 
Over 80% of IT leaders will adopt or expand cloud-based IAM and face challenges
Over 80% of IT leaders will adopt or expand cloud-based IAM and face challengesOver 80% of IT leaders will adopt or expand cloud-based IAM and face challenges
Over 80% of IT leaders will adopt or expand cloud-based IAM and face challengesTJR Global
 
When Quantum Computing Meets Cloud Computing
When Quantum Computing Meets Cloud ComputingWhen Quantum Computing Meets Cloud Computing
When Quantum Computing Meets Cloud ComputingTJR Global
 
Cloud Security Challenges 2021
Cloud Security Challenges 2021Cloud Security Challenges 2021
Cloud Security Challenges 2021TJR Global
 
Prioritizing The Cloud's Top Four Security Risks
Prioritizing The Cloud's Top Four Security RisksPrioritizing The Cloud's Top Four Security Risks
Prioritizing The Cloud's Top Four Security RisksTJR Global
 
When it Comes to Cybersecurity and Compliance, there is no Room for Error
When it Comes to Cybersecurity and Compliance, there is no Room for ErrorWhen it Comes to Cybersecurity and Compliance, there is no Room for Error
When it Comes to Cybersecurity and Compliance, there is no Room for ErrorTJR Global
 
Will AI replace cybersecurity teams completely?
Will AI replace cybersecurity teams completely?Will AI replace cybersecurity teams completely?
Will AI replace cybersecurity teams completely?TJR Global
 
Why 2021 willl be the year of Adaptive Cybersecurity?
Why 2021 willl be the year of Adaptive Cybersecurity?Why 2021 willl be the year of Adaptive Cybersecurity?
Why 2021 willl be the year of Adaptive Cybersecurity?TJR Global
 
Five tips for observability success amid cloud complexity
Five tips for observability success amid cloud complexityFive tips for observability success amid cloud complexity
Five tips for observability success amid cloud complexityTJR Global
 
Is Serverless Computing Reafy to Go Mainstream?
Is Serverless Computing Reafy to Go Mainstream?Is Serverless Computing Reafy to Go Mainstream?
Is Serverless Computing Reafy to Go Mainstream?TJR Global
 
The technologies driving business transformation in 2021
The technologies driving business transformation in 2021The technologies driving business transformation in 2021
The technologies driving business transformation in 2021TJR Global
 
From Cloud Computing to Cooking: 4 Ways IT Mirrors Fine Cuisine
From Cloud Computing to Cooking: 4 Ways IT Mirrors Fine CuisineFrom Cloud Computing to Cooking: 4 Ways IT Mirrors Fine Cuisine
From Cloud Computing to Cooking: 4 Ways IT Mirrors Fine CuisineTJR Global
 
The Keys To Effective Cybersecurity, Accordiing To The Charter Of Trust
The Keys To Effective Cybersecurity, Accordiing To The Charter Of TrustThe Keys To Effective Cybersecurity, Accordiing To The Charter Of Trust
The Keys To Effective Cybersecurity, Accordiing To The Charter Of TrustTJR Global
 
Eight Cybersecurity Lessons Learned From Life
Eight Cybersecurity Lessons Learned From LifeEight Cybersecurity Lessons Learned From Life
Eight Cybersecurity Lessons Learned From LifeTJR Global
 
Getting started with cloud computing: as review
Getting started with cloud computing: as reviewGetting started with cloud computing: as review
Getting started with cloud computing: as reviewTJR Global
 
Every little thing you meed to lnow about cloud computing
Every little thing you meed to lnow about cloud computingEvery little thing you meed to lnow about cloud computing
Every little thing you meed to lnow about cloud computingTJR Global
 
Top 10 cloud storage stories of 2020
Top 10 cloud storage stories of 2020Top 10 cloud storage stories of 2020
Top 10 cloud storage stories of 2020TJR Global
 
Tech trends in 2021: Fast planes and home working
Tech trends in 2021: Fast planes and home workingTech trends in 2021: Fast planes and home working
Tech trends in 2021: Fast planes and home workingTJR Global
 
The US wants startups to get a piece of the $16 billion spent on space tech
The US wants startups to get a piece of the $16 billion spent on space techThe US wants startups to get a piece of the $16 billion spent on space tech
The US wants startups to get a piece of the $16 billion spent on space techTJR Global
 

More from TJR Global (20)

Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...
Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...
Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...
 
The main ICT and cloud trend will be edge computing
The main ICT and cloud trend will be edge computingThe main ICT and cloud trend will be edge computing
The main ICT and cloud trend will be edge computing
 
Over 80% of IT leaders will adopt or expand cloud-based IAM and face challenges
Over 80% of IT leaders will adopt or expand cloud-based IAM and face challengesOver 80% of IT leaders will adopt or expand cloud-based IAM and face challenges
Over 80% of IT leaders will adopt or expand cloud-based IAM and face challenges
 
When Quantum Computing Meets Cloud Computing
When Quantum Computing Meets Cloud ComputingWhen Quantum Computing Meets Cloud Computing
When Quantum Computing Meets Cloud Computing
 
Cloud Security Challenges 2021
Cloud Security Challenges 2021Cloud Security Challenges 2021
Cloud Security Challenges 2021
 
Prioritizing The Cloud's Top Four Security Risks
Prioritizing The Cloud's Top Four Security RisksPrioritizing The Cloud's Top Four Security Risks
Prioritizing The Cloud's Top Four Security Risks
 
When it Comes to Cybersecurity and Compliance, there is no Room for Error
When it Comes to Cybersecurity and Compliance, there is no Room for ErrorWhen it Comes to Cybersecurity and Compliance, there is no Room for Error
When it Comes to Cybersecurity and Compliance, there is no Room for Error
 
Will AI replace cybersecurity teams completely?
Will AI replace cybersecurity teams completely?Will AI replace cybersecurity teams completely?
Will AI replace cybersecurity teams completely?
 
Why 2021 willl be the year of Adaptive Cybersecurity?
Why 2021 willl be the year of Adaptive Cybersecurity?Why 2021 willl be the year of Adaptive Cybersecurity?
Why 2021 willl be the year of Adaptive Cybersecurity?
 
Five tips for observability success amid cloud complexity
Five tips for observability success amid cloud complexityFive tips for observability success amid cloud complexity
Five tips for observability success amid cloud complexity
 
Is Serverless Computing Reafy to Go Mainstream?
Is Serverless Computing Reafy to Go Mainstream?Is Serverless Computing Reafy to Go Mainstream?
Is Serverless Computing Reafy to Go Mainstream?
 
The technologies driving business transformation in 2021
The technologies driving business transformation in 2021The technologies driving business transformation in 2021
The technologies driving business transformation in 2021
 
From Cloud Computing to Cooking: 4 Ways IT Mirrors Fine Cuisine
From Cloud Computing to Cooking: 4 Ways IT Mirrors Fine CuisineFrom Cloud Computing to Cooking: 4 Ways IT Mirrors Fine Cuisine
From Cloud Computing to Cooking: 4 Ways IT Mirrors Fine Cuisine
 
The Keys To Effective Cybersecurity, Accordiing To The Charter Of Trust
The Keys To Effective Cybersecurity, Accordiing To The Charter Of TrustThe Keys To Effective Cybersecurity, Accordiing To The Charter Of Trust
The Keys To Effective Cybersecurity, Accordiing To The Charter Of Trust
 
Eight Cybersecurity Lessons Learned From Life
Eight Cybersecurity Lessons Learned From LifeEight Cybersecurity Lessons Learned From Life
Eight Cybersecurity Lessons Learned From Life
 
Getting started with cloud computing: as review
Getting started with cloud computing: as reviewGetting started with cloud computing: as review
Getting started with cloud computing: as review
 
Every little thing you meed to lnow about cloud computing
Every little thing you meed to lnow about cloud computingEvery little thing you meed to lnow about cloud computing
Every little thing you meed to lnow about cloud computing
 
Top 10 cloud storage stories of 2020
Top 10 cloud storage stories of 2020Top 10 cloud storage stories of 2020
Top 10 cloud storage stories of 2020
 
Tech trends in 2021: Fast planes and home working
Tech trends in 2021: Fast planes and home workingTech trends in 2021: Fast planes and home working
Tech trends in 2021: Fast planes and home working
 
The US wants startups to get a piece of the $16 billion spent on space tech
The US wants startups to get a piece of the $16 billion spent on space techThe US wants startups to get a piece of the $16 billion spent on space tech
The US wants startups to get a piece of the $16 billion spent on space tech
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Connected Aircraft Systems?

  • 1.   Business & GA (/category/business-ga), Commercial (/category/commercial), Connectivity (/category/connectivity), Embedded Avionics (/category/embedded-avionics), IIOT (/category/iiot), IIOT Aerospace (/category/iiot-aerospace), Military (/category/military), Regulation (/category/regulation), Unmanned (/category/unmanned) Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Connected Aircraft Systems? By Frank Wolfe (/author/fwolfe) | April 9, 2020 Send Feedback (/contact-us/) connected aircraft (/?s=&facets[taxonomy_post_tag][]=connected+aircraft), connectivity (/?s=&facets[taxonomy_post_tag][]=connectivity), Cybersecurity (/? s=&facets[taxonomy_post_tag][]=cybersecurity), standards (/?s=&facets[taxonomy_post_tag][]=standards)       Wind River says the singular architecture of its Helix Virtualization Platform for running embedded systems is more secure from cyber attack than the alternative of running each embedded system independently. EASA and FAA cybersecurity mandates are likely to ramp up in the next two years. Photo: Wind River Aviation cybersecurity mandates by the European Union Aviation Safety Agency (EASA) and the Federal Aviation Administration (FAA) are coming in the next two years, according to participants in an Avionics International Apr. 7 webinar, Clearing the Skies of Cybersecurity Vulnerabilities from the Ground Up, . (https://event.webcasts.com/viewer/event.jsp?ei=1285183&tp_key=f0641b3b03) This year, EASA may adopt AMC 20-42 (NPA 2019-1) (https://www.easa.europa.eu/sites/default/ les/dfu/NPA%202019-01.pdf) that will link information security guidelines to the high-level cyber standards of RTCA DO-326A or the EUROCAE ED-202 series.
  • 2. Asked during the webinar how the avionics industry has thus far embraced airworthiness cybersecurity standards in RTCA DO-326A, 355 and 356, Alex Wilson, the director of aerospace and defense at Wind River, said that cybersecurity standards "have been adopted slowly, but I think we’ll see a more rapid adoption throughout this year and the coming year.” "Currently, the standards are more voluntary or applied on a case by case basis on aircraft systems as they go into certi cation," he said. "These standards have been around in embryonic form since the [Boeing] 787 [Dreamliner] rst went through its airworthiness process [a decade ago]." Wilson predicted that "once we see those standards being mandated through rules and regulations, we’ll start to see a massive adoption and a requirement of all new avionics systems to go through [these] standards." Such mandates may spark, or re-ignite, the operational red teaming of aircraft cyber systems. It has been unclear what the path forward is for cyber vulnerability testing of airliners in the United States after last month's decision by the Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) to end the testing of a Boeing 757-200 (https://www.aviationtoday.com/wp- admin/post.php?post=88111&action=edit) at the Federal Aviation Administration (FAA) William J. Hughes Technical Center in Atlantic City. Cyber vulnerabilities are not the exclusive domain of commercial airliners, but also are faced by military and business aircraft and future urban air mobility platforms and by diverse systems, such as onboard radar altimeters, Global Positioning System receivers, and military Identi cation Friend or Foe (IFF) systems. Paul Hart, the chief technology of cer at Curtiss-Wright Defense Solutions, said that combat search and rescue helicopters can have up to 60 computers onboard to run ight control processes, such as take-off and landing, and complex synthetic vision systems, while UAVs normally have less than 10 processors for ight control and detect and avoid systems, and airliners "typically have more than 100 computing platforms." While e-Enabled aircraft provide ight and cost advantages for operators, they also come with cybersecurity vulnerabilities. “The obvious question is, 'Isn’t it just safer to separate from the Internet?'" Wilson asked at the start of his webinar presentation. "Why should we e-Enable and connect our aircraft? There’s a whole list of reasons why we might want to do that. In this modern age, everyone is going through a process of digital transformation, moving to more intelligent platforms, and that gives us huge bene ts in terms of operational ef ciency, the ability to implement new advanced technologies, such as predictive maintenance so that we can reduce operational costs of our aircraft systems and allow us to update more ef ciently the aircraft systems themselves, such as weather data on the aircraft and other data sources." "That also allows us to increase the amount of revenue we’re getting from our passenger systems and provide a better passenger experience while we y," Wilson said. "There are huge challenges when we look at aviation systems that are very different to those we see in the IT world. Within the IT world we tend to see applications moving to the Cloud-based systems and moving very quickly with new updates daily and new features and functionality. The security standards within the IT world are certainly not well suited to the aviation world so we need to think about how we manage that. Also, within the IT world we tend to see systems being updated very rapidly compared to the update cycle that we see within our aircraft. So there are lots of challenges as we start to connect and provide that Internet connectivity.” (https://www.aviationtoday.com/wp-content/uploads/2020/04/screen-shot-2020-04-09-at-9-29-46-am.png) These are the guidelines for cybersecurity associated with connected aircraft systems, which as of today, are not mandated by civil aviation authorities. Photo: Wind River Indeed, while relatively isolated ACARS and VHF video data links and, more recently ADS-B (In) and ADS-B (Out) were the major features of aircraft electronics, aircraft wireless connectivity has opened up a range of vulnerabilities, Hart said. Instead of leather ight bags with paper charts, aircrews now can carry aboard Electronic Flight Bag (EFB) tablets and iPads that are able, through aircraft Wi-Fi, to obtain ight parameters to calculate take-off performance, for example.
  • 3. Maintenance engineers can also connect wirelessly to avionics systems of ight line aircraft through laptop Portable Maintenance Aids (PMA) for troubleshooting aircraft systems. To update its cybersecurity policy as new threats emerge, Wind River uses the CIA Triad technique, which maps requirements against the three pillars of cybersecurity: Con dentiality, sustaining data the privacy of data being transmitted and stored, such as map data; Integrity--the accuracy of data during and after software updates, for example; and Availability for the uninterrupted ow of data, even in the face of common denial of service cyber attacks. Want to hear more on aircraft connectivity applications? Check out the Global Connected Aircraft Podcast (https://www.gcasummit.com/podcasts/), where Avionics editor-in-chief Woodrow Bellamy III interviews airlines and industry in uencers on how they're applying connectivity solutions. Michael Mehlberg, vice president of marketing at Star Lab, a Wind River subsidiary, said that Wind River has adopted a cybersecurity rst holistic approach through an examination of how cyber components interact with one another and a "defense in depth" with layers of cyber protection. Linux-based embedded systems, for example, while exible, also have vulnerabilities, which Wind River mitigates through such means as operating system-level hardening, Linux LSM (Security-Enhanced Linux stacking), immutable deployment con gurations, and multiple le systems, such as the authentication and/or encryption of applications, libraries, and data. In addition, a secure boot process is a "massively important part of the cybersecurity process" to ensure no cyber intrusion happens while computer systems are at rest. "The security policy and con guration really has to be a combination of products, product features, advanced security features, professional services to provide and mitigate a security assessment and add additional security where required and a combination of partnerships, for instance the Curtiss-Wright hardware with the Wind River software, in order to implement a secure system," Wilson said. The upcoming EASA and FAA mandates may have implications for military systems as well. Cybersecurity for military aircraft and legacy platforms is "one of the classic challenges we face in not just aircraft systems, but all systems," Wilson said. "A lot of these systems have really not been designed to be connected in the way we imagine, and so we are exposing them to more and more threats, as we start to connect them to the Internet or even to any communications system," he said. "Adding a communications interface to an aircraft system or any system is really starting to open that out to vulnerabilities that weren't planned into the system when it was originally designed. For any legacy platforms or military aircraft, you have to think about what are the consequences of adding that connectivity." "In some cases, they already have communication links," Wilson said. "We need to make sure that the communication links we are using have been secured in the right way for deployment in the eld. We already know from experience that some very early unmanned aircraft systems that were deployed straight from the lab in effect into operational scenarios were exposed to security issues that hadn't been taken into account." "As we start to think about security more and more and start to implement security across all embedded systems, in fact all computer systems, and we become more aware about how security operates, we need to gure out how we protect all of these types of systems," he said. "If you are going to connect a legacy platform to the network, instantly that opens that vulnerability up and you should go through a security assessment to see what vulnerabilities you would need to protect against through that data link. Are you using an encrypted data link, for example, to that system? Are you using secure boot on the data link to make sure nothing can in ltrate it and get in? All those kinds of techniques, we would have to gure out how we implement that, and of course that is going to have a cost effect on our systems."         Receive the latest avionics news right to your inbox SIGN UP (/s More On This Topic