SlideShare a Scribd company logo
1 of 12
Download to read offline
Mark Laustra
Vice President
Analogic Corporation
mlaustra@analogic.com
Open Architecture
For Aviation Security
Internet
Hub
Printer
Hub
Hub
Hub
AVSEC network architecture: “early 1990’s” PC
• Proprietary software and hardware
• Limited, built-in interoperability
• Networking requires custom integration
• 21st century IT tools unimplemented
• Shared industry protocols or standards
• Application Program Interfaces (APIs)
• Software development kits
• No certification for third-party solutions
• No standard approach for cyber security
2
Why is this a problem?
3
Full
Picture
Scanners
Govt
Databas
es
Behavior
TSOs
• Hinders basic security mission
• Hard to create “full picture” or correlate
information
• Raises cost of security
• Custom software, integration and
networking is expensive
• Proprietary systems = higher training and
service costs
• Hard to do remote system monitoring, or
other network enabled functions
• Slows innovation
• Hard to encourage 3rd party HW and
software developers to create innovative
solutions
Government Goals for AVSEC Open Architecture
• Address threats faster by improving data sharing
• Improve system performance and reduce costs
• Ensure protection from cyber threats
4
Disconnected
Security Elements
Full
Picture
Scanners &
Threat
Detection
SW
Govt
Databases
Passenger
Behavior
TSOs
=
AVSEC Open Architecture components
“Open Architecture”
for aviation security
Access Control, Data
Protection, Cyber Security
• Comparable to other mission critical networks (e.g. DOD, other DHS
agencies)
Accessible Standards • IT hardware, software and networking system architecture
• Designers’ specifications accessible by third parties
• Officially approved standards
• Privately designed architectures
Certification / authorization • 3rd parties need SSI access
• Must demonstrate 3rd party solutions will
• Improve security
• Maintain or improve operational performance
Industry-wide Support • Need broad support => rapid adoption
”free for all” or
“open source”
Accessible
requirements
=
Examples from other Industries
Intel/Microsoft vs. Apple Social Media, Healthcare, Uber US Navy
• Fast tracked product
• Extensive market penetration
• Huge industry developed in response to OA
BUT
• HUGE interoperability problems and challenges
• Success was driven by audiences served:
“engineers” vs. “regular” people to get jobs done
• Price dominates and cheapest always wins
• Successfully use OA information
• Data from wide variety of sources
• Rapid data integration and processing
• Minimal delay incorporating new information
BUT
• Susceptible to cyber threats, data loss
• Vendor-independent upgrades extend life
• Organized via carefully defined
requirements
• Collaboration and trust, reuse of proven
designs
6
5 Core
Principles
Modular
Design
Loose coupling - high
cohesion
Standards driven
Independent acquisition
Collaboration/
Trust
Reuse proven designs
Maximum return
Minimum investment
Extend Life
Software intensive
Software upgrades
Reduce risk
Design transparency
Disclosure
Peer Review
Strategic
data rights
Level competition
Alternative solutions
Alternative sources
Manufacturer Challenges for OA
• Adds costs, esp. in short term
• No apparent business incentives
• Giving up “core competency” control
• 3rd Party SSI/ Classification
7
• Possible competitive edge: interoperability
• Faster access to 3rd-party knowhow, innovation
• Expand system features
Burden Opportunity
Open Architecture Questions/ Issues
• Who leads the effort?
• What standards do/ don’t make sense
• What is the ongoing forum for future improvements/ new threats
• How to control access to standards?
• How to ensure cybersecurity and data protection
8
Possible Solution: 1) Get Industry Engaged
• Business model
• Companies sell API’s/ Developer Kits to 3rd party developers
• 3rd party developers fund their own Certification
• Companies get royalties on adoption
• Avoid extreme business cycles
• Minimize approval process
• Rapid new company vetting
• “Software” Certification
• Reduce/ speed up SSI Clearance
9
Interested
Vendors
Apply
Gov’t
Approval
Approved
Vendors
No Performance Certification
Required
Performance Certification
Required
Implementing Open Architecture: Multi-Phase Process
• Common GUI/ training/ controls
• Intersystem image and data sharing
10
• 3rd party algorithm development
• 3rd party hardware, software Integration
Requirements
• I/O, Image Standards (STIP, DICOS)
• Data standards
• GUI specifications
• Cyber security standards
Requirements
• Improved SSI access
• Streamlined certification process
• Investment by government, industry
• Clear financial incentives for industry
Phase 1 Phase 2
Conclusions
• Moving to open architecture has important benefits
• There are models AVSEC can learn from (e.g. US Navy)
• Getting there will require significant changes to status quo
• Certification and standards-setting infrastructure, governance
• Simplified SSI approval processes
• Clear business case for vendors, developers
• Recommend multi-phase implementation approach
• Involve all stakeholders up-front
• Start “easy” (non-Certified / classified)
• Work on “difficult” (e.g. 3rd party algorithms) later
11
12
Thank You!
Mark Laustra
Vice President
Analogic Corporation
mlaustra@analogic.com

More Related Content

What's hot

3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FONandita Nityanandam
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIvanti
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentAlexey Pyshkin
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsDan Michaluk
 
Leone ct#4 presentation
Leone ct#4 presentationLeone ct#4 presentation
Leone ct#4 presentationvincentleone
 
Panel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better TogetherPanel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better TogetherIvanti
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesIvanti
 
Assessing Business Operations Risk With Unified Vulnerability Management in T...
Assessing Business Operations Risk With Unified Vulnerability Management in T...Assessing Business Operations Risk With Unified Vulnerability Management in T...
Assessing Business Operations Risk With Unified Vulnerability Management in T...Denim Group
 
EtQ Reliance: Solution for Enterprise Compliance Management
EtQ Reliance: Solution for Enterprise Compliance ManagementEtQ Reliance: Solution for Enterprise Compliance Management
EtQ Reliance: Solution for Enterprise Compliance ManagementEtQ, Inc.
 
NetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetwrix Corporation
 
OIES Best Practices to Deploy M2M applications (short overview)
OIES Best Practices to Deploy M2M applications (short overview)OIES Best Practices to Deploy M2M applications (short overview)
OIES Best Practices to Deploy M2M applications (short overview)Francisco Maroto
 
Top 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructureTop 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructureNetwrix Corporation
 
Top 5 identity management challenges and solutions
Top 5 identity management challenges and solutionsTop 5 identity management challenges and solutions
Top 5 identity management challenges and solutionsNetwrix Corporation
 
Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020Precisely
 
Top 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directoryTop 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directoryNetwrix Corporation
 
SteveNuccioResume2
SteveNuccioResume2SteveNuccioResume2
SteveNuccioResume2Steve Nuccio
 
Is workforce mobility presenting new technology challenges?
Is workforce mobility presenting new technology challenges?Is workforce mobility presenting new technology challenges?
Is workforce mobility presenting new technology challenges?Parallels Inc
 
Touring Tomorrow's Digital Factory
Touring Tomorrow's Digital FactoryTouring Tomorrow's Digital Factory
Touring Tomorrow's Digital FactoryInductive Automation
 

What's hot (20)

3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better Together
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Leone ct#4 presentation
Leone ct#4 presentationLeone ct#4 presentation
Leone ct#4 presentation
 
Panel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better TogetherPanel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better Together
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center Licenses
 
Assessing Business Operations Risk With Unified Vulnerability Management in T...
Assessing Business Operations Risk With Unified Vulnerability Management in T...Assessing Business Operations Risk With Unified Vulnerability Management in T...
Assessing Business Operations Risk With Unified Vulnerability Management in T...
 
EtQ Reliance: Solution for Enterprise Compliance Management
EtQ Reliance: Solution for Enterprise Compliance ManagementEtQ Reliance: Solution for Enterprise Compliance Management
EtQ Reliance: Solution for Enterprise Compliance Management
 
NetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don Jones
 
OIES Best Practices to Deploy M2M applications (short overview)
OIES Best Practices to Deploy M2M applications (short overview)OIES Best Practices to Deploy M2M applications (short overview)
OIES Best Practices to Deploy M2M applications (short overview)
 
Top 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructureTop 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructure
 
Top 5 identity management challenges and solutions
Top 5 identity management challenges and solutionsTop 5 identity management challenges and solutions
Top 5 identity management challenges and solutions
 
Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020
 
MAS-presentation-v22sep
MAS-presentation-v22sepMAS-presentation-v22sep
MAS-presentation-v22sep
 
Top 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directoryTop 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directory
 
SteveNuccioResume2
SteveNuccioResume2SteveNuccioResume2
SteveNuccioResume2
 
Shillum "Building for the Future: Interoperability"
Shillum "Building for the Future: Interoperability"Shillum "Building for the Future: Interoperability"
Shillum "Building for the Future: Interoperability"
 
Is workforce mobility presenting new technology challenges?
Is workforce mobility presenting new technology challenges?Is workforce mobility presenting new technology challenges?
Is workforce mobility presenting new technology challenges?
 
Touring Tomorrow's Digital Factory
Touring Tomorrow's Digital FactoryTouring Tomorrow's Digital Factory
Touring Tomorrow's Digital Factory
 

Similar to Open Architecture: The Key to Aviation Security

Application Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the CloudApplication Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the CloudSkytap Cloud
 
Comparing Legacy and Modern e-commerce solutions
Comparing Legacy and Modern e-commerce solutionsComparing Legacy and Modern e-commerce solutions
Comparing Legacy and Modern e-commerce solutionsMike Ensor
 
Driving a Digital Thread Program in Manufacturing with Apache Kafka | Anu Mis...
Driving a Digital Thread Program in Manufacturing with Apache Kafka | Anu Mis...Driving a Digital Thread Program in Manufacturing with Apache Kafka | Anu Mis...
Driving a Digital Thread Program in Manufacturing with Apache Kafka | Anu Mis...HostedbyConfluent
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetindradipg
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
DataOps , cbuswaw April '23
DataOps , cbuswaw April '23DataOps , cbuswaw April '23
DataOps , cbuswaw April '23Jason Packer
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 
Company Overview - Services Provided
Company Overview - Services ProvidedCompany Overview - Services Provided
Company Overview - Services ProvidedGarrett Kelley
 
Agile enterprise integration
Agile enterprise integrationAgile enterprise integration
Agile enterprise integrationSimon Greig
 
Design Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise ArchitecturesDesign Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise ArchitecturesInductive Automation
 
Application Crisis avoidance six things you can do
Application Crisis avoidance  six things you can doApplication Crisis avoidance  six things you can do
Application Crisis avoidance six things you can doApalytics
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches Jim Kaplan CIA CFE
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Denim Group
 
Final Presentation
Final PresentationFinal Presentation
Final Presentationchris odle
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Zeeve
 
Bridging the Gap: from Data Science to Production
Bridging the Gap: from Data Science to ProductionBridging the Gap: from Data Science to Production
Bridging the Gap: from Data Science to ProductionFlorian Wilhelm
 
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld
 

Similar to Open Architecture: The Key to Aviation Security (20)

Application Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the CloudApplication Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
 
Comparing Legacy and Modern e-commerce solutions
Comparing Legacy and Modern e-commerce solutionsComparing Legacy and Modern e-commerce solutions
Comparing Legacy and Modern e-commerce solutions
 
Driving a Digital Thread Program in Manufacturing with Apache Kafka | Anu Mis...
Driving a Digital Thread Program in Manufacturing with Apache Kafka | Anu Mis...Driving a Digital Thread Program in Manufacturing with Apache Kafka | Anu Mis...
Driving a Digital Thread Program in Manufacturing with Apache Kafka | Anu Mis...
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internet
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
Quality 4.0 and reimagining quality
Quality 4.0 and reimagining qualityQuality 4.0 and reimagining quality
Quality 4.0 and reimagining quality
 
DataOps , cbuswaw April '23
DataOps , cbuswaw April '23DataOps , cbuswaw April '23
DataOps , cbuswaw April '23
 
2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
Company Overview - Services Provided
Company Overview - Services ProvidedCompany Overview - Services Provided
Company Overview - Services Provided
 
Agile enterprise integration
Agile enterprise integrationAgile enterprise integration
Agile enterprise integration
 
Design Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise ArchitecturesDesign Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise Architectures
 
Application Crisis avoidance six things you can do
Application Crisis avoidance  six things you can doApplication Crisis avoidance  six things you can do
Application Crisis avoidance six things you can do
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
 
Digital transformation and AI @Edge
Digital transformation and AI @EdgeDigital transformation and AI @Edge
Digital transformation and AI @Edge
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
 
Bridging the Gap: from Data Science to Production
Bridging the Gap: from Data Science to ProductionBridging the Gap: from Data Science to Production
Bridging the Gap: from Data Science to Production
 
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Open Architecture: The Key to Aviation Security

  • 1. Mark Laustra Vice President Analogic Corporation mlaustra@analogic.com Open Architecture For Aviation Security Internet Hub Printer Hub Hub Hub
  • 2. AVSEC network architecture: “early 1990’s” PC • Proprietary software and hardware • Limited, built-in interoperability • Networking requires custom integration • 21st century IT tools unimplemented • Shared industry protocols or standards • Application Program Interfaces (APIs) • Software development kits • No certification for third-party solutions • No standard approach for cyber security 2
  • 3. Why is this a problem? 3 Full Picture Scanners Govt Databas es Behavior TSOs • Hinders basic security mission • Hard to create “full picture” or correlate information • Raises cost of security • Custom software, integration and networking is expensive • Proprietary systems = higher training and service costs • Hard to do remote system monitoring, or other network enabled functions • Slows innovation • Hard to encourage 3rd party HW and software developers to create innovative solutions
  • 4. Government Goals for AVSEC Open Architecture • Address threats faster by improving data sharing • Improve system performance and reduce costs • Ensure protection from cyber threats 4 Disconnected Security Elements Full Picture Scanners & Threat Detection SW Govt Databases Passenger Behavior TSOs
  • 5. = AVSEC Open Architecture components “Open Architecture” for aviation security Access Control, Data Protection, Cyber Security • Comparable to other mission critical networks (e.g. DOD, other DHS agencies) Accessible Standards • IT hardware, software and networking system architecture • Designers’ specifications accessible by third parties • Officially approved standards • Privately designed architectures Certification / authorization • 3rd parties need SSI access • Must demonstrate 3rd party solutions will • Improve security • Maintain or improve operational performance Industry-wide Support • Need broad support => rapid adoption ”free for all” or “open source” Accessible requirements =
  • 6. Examples from other Industries Intel/Microsoft vs. Apple Social Media, Healthcare, Uber US Navy • Fast tracked product • Extensive market penetration • Huge industry developed in response to OA BUT • HUGE interoperability problems and challenges • Success was driven by audiences served: “engineers” vs. “regular” people to get jobs done • Price dominates and cheapest always wins • Successfully use OA information • Data from wide variety of sources • Rapid data integration and processing • Minimal delay incorporating new information BUT • Susceptible to cyber threats, data loss • Vendor-independent upgrades extend life • Organized via carefully defined requirements • Collaboration and trust, reuse of proven designs 6 5 Core Principles Modular Design Loose coupling - high cohesion Standards driven Independent acquisition Collaboration/ Trust Reuse proven designs Maximum return Minimum investment Extend Life Software intensive Software upgrades Reduce risk Design transparency Disclosure Peer Review Strategic data rights Level competition Alternative solutions Alternative sources
  • 7. Manufacturer Challenges for OA • Adds costs, esp. in short term • No apparent business incentives • Giving up “core competency” control • 3rd Party SSI/ Classification 7 • Possible competitive edge: interoperability • Faster access to 3rd-party knowhow, innovation • Expand system features Burden Opportunity
  • 8. Open Architecture Questions/ Issues • Who leads the effort? • What standards do/ don’t make sense • What is the ongoing forum for future improvements/ new threats • How to control access to standards? • How to ensure cybersecurity and data protection 8
  • 9. Possible Solution: 1) Get Industry Engaged • Business model • Companies sell API’s/ Developer Kits to 3rd party developers • 3rd party developers fund their own Certification • Companies get royalties on adoption • Avoid extreme business cycles • Minimize approval process • Rapid new company vetting • “Software” Certification • Reduce/ speed up SSI Clearance 9 Interested Vendors Apply Gov’t Approval Approved Vendors
  • 10. No Performance Certification Required Performance Certification Required Implementing Open Architecture: Multi-Phase Process • Common GUI/ training/ controls • Intersystem image and data sharing 10 • 3rd party algorithm development • 3rd party hardware, software Integration Requirements • I/O, Image Standards (STIP, DICOS) • Data standards • GUI specifications • Cyber security standards Requirements • Improved SSI access • Streamlined certification process • Investment by government, industry • Clear financial incentives for industry Phase 1 Phase 2
  • 11. Conclusions • Moving to open architecture has important benefits • There are models AVSEC can learn from (e.g. US Navy) • Getting there will require significant changes to status quo • Certification and standards-setting infrastructure, governance • Simplified SSI approval processes • Clear business case for vendors, developers • Recommend multi-phase implementation approach • Involve all stakeholders up-front • Start “easy” (non-Certified / classified) • Work on “difficult” (e.g. 3rd party algorithms) later 11
  • 12. 12 Thank You! Mark Laustra Vice President Analogic Corporation mlaustra@analogic.com