Explore chapters and articles related to this topic
Pilotless Aircraft
Published in Robert Bor, Carina Eriksen, Todd P. Hubbard, Ray King, Pilot Selection, 2019
No discussion of pilotless aircraft should omit references to security and advanced automation. The current commercial aviation security regime is constantly evolving to mitigate against new threats and to take opportunities offered by new technology. There are many elements within such a security regime including: personnel security; physical security; communications security; electronic security (including software); and specific measures against threats (e.g., bombs, hi-jacks). As automation increases and the balance of routine decision-making shifts from the human to the machine, the security regime must develop to afford at least as good security protection, if not better; in many respects in aviation, security and safety are intimately linked. In order to achieve this, a system of systems approach must be taken, which, as technology advances, is likely to become ever more complex. Luckily, while the challenge of achieving technical security will become ever more complex, the existing arrangements for personnel security in the commercial aviation industry appear to be acceptable and are less likely to need major changes in the future. The verification of both human and machine identity will become much more important with new interfaces and the evolving decision-making balance between human and technical systems.
What Is Cybersecurity?
Published in Wayne Patterson, Cynthia E. Winston-Proctor, Behavioral Cybersecurity, 2019
Wayne Patterson, Cynthia E. Winston-Proctor
There are many different types of countermeasures or methods of protecting information. The fact that in earlier times, our working environment might consist of a single computer—an environment that virtually no longer exists—is the reason that we have retired the term computer security and replaced it with cybersecurity, which now consists of at least the following needs for countermeasures. Let's survey these methods: Computer securityCommunications securityPhysical security
Network Security
Published in Mário Marques da Silva, Cable and Wireless Networks, 2018
In a broad sense, the information systems security (INFOSEC) can be viewed as a set of technical measures and procedures adopted to prevent unauthorized observation, modification, or denial of the illegitimate use of knowledge, facts, information, skills, or resources. The information that is intended to be preserved can be stored,* being processed† or in transit‡ [Maiwald 2003; McClure and Scambray 2005]. The INFOSEC is decomposed into the following subareas: Computers security (COMPUSEC)Communications security (COMSEC)Network security (NETSEC)Emanations security (EMSEC)Physical security
Decision support for selecting information security controls
Published in Journal of Decision Systems, 2018
The tool is composed of several spreadsheets containing: (1) information about vulnerabilities according to the standards; (2) information about commercial and in-house developed security appliances, such as price, maintenance, vulnerabilities mitigated, percentage of mitigation coverage assured and other features; (3) a main spreadsheet implementing the model. For prototyping purposes, only three sections of the standards were considered: the 9th, the 12th and the 13th, which are ‘Access Control’, ‘Operations Security’, ‘Communications Security’, respectively. These sections were chosen for our prototype because they are convenient for recognising specific related controls such as software commercial products.