新书报道
当前位置: 首页 >> 航空航天 >> 正文
Aviation security engineering : a holistic approach
发布日期:2014-06-06  浏览

[内容简介]

Filling a critical gap in aviation engineering literature, this unique and timely resource provides a thorough introduction to aviation systems security. This book enables professionals to understand the challenges the industry faces and how they are being addressed. This book is an excellent source of information for researchers, students, and security professionals, helping them to understand the structure and limitations of modern aviation security. This authoritative book offers readers:

A broad analysis of current aviation security legislation/regulation and standards, including ICAO Annex 17, ARINC 811, the ED-200 series, and the draft SC-216;

An appreciation for the diverse collection of security stakeholders within the aviation industry;

Detailed coverage of new methods used to design security controls that not only meet the individual interests of a stakeholder, but also work towards the holistic securing of the entire industry;

Discussions on new areas of aviation security research and more effective approaches;

Techniques for solving today's most challenging problems, such as security attack identification and response.


[目录]

Preface xv

Forewords xix

I Security and Aviation 1

Chapter 1 Aviation Security Engineering 3

1.1 Introduction 3

1.2 What is Security? 4

1.2.1 Security as a State 5

1.2.2 Security as a Process 5

1.2.3 Security as a Trade-Off 6

1.2.4 Security Risk Based Approach and Utility Theory 7

1.2.5 Summary 9

1.3 Aviation-Aviation Security 9

1.3.1 Aviation-A Complex Supply Chain 9

1.3.2 Aviation Security 11

1.4 An Emerging Discipline 13

1.4.1 Aviation Security Engineering-An Emerging Discipline 13

1.4.2 Paradigm Changes 13

1.4.3 Overt Approach 14

1.4.4 "Fighting-The-Last-War" Phenomenon 16

1.5 Conclusions 17

Questions 19

References 20

Chapter 2 Security: An Introduction and Tutorial 21

2.1 Introduction 21

2.1.1 An Example 22

2.2 What is Security? 23

2.3 Terminology 24

2.3.1 Asset-Centric Versus Attacker-Centric 25

2.3.2 Fundamental Concepts and Definitions 26

2.4 Security Risk Management 28

2.4.1 Risk Management Cycle 29

2.4.2 Residual Risk and Risk Appetite 31

2.4.3 Undertaking Security Risk Management 31

2.5 Controls and Control Philosophies 33

2.5.1 Incident Response Cycle 35

2.6 Security Meets Reality-Trust 36

2.7 Aviation Security 37

2.7.1 Annex 17 37

2.7.2 The Evolving Nature of Aviation Security 38

2.7.3 Aviation Information Assets 39

2.7.4 Who Is In Charge of Aviation Security? 40

2.8 Holistic Security Approach 43

2.9 Relevant Standards 44

2.9.1 ICAO Annex 17 45

2.9.2 ARINC Report 811 45

2.9.3 ED-200 46

2.9.4 SC-216 46

2.9.5 NIST SP-800 and ISO 27000 Series 47

2.10 Conclusions 47

Questions 49

References 50

Chapter 3 Aviation as a System: Air Transportation System 51

3.1 Introduction 51

3.2 Aviation Terminology 52

3.3 High-Level View on Air Transportation 54

3.3.1 Transportation Systems 54

3.3.2 Air Transportation-Multiple Stakeholders and Multiple Objectives 56

3.3.3 Growth and Challenges 56

3.4 Air Transportation System Model 59

3.4.1 System and Systems Theory 59

3.4.2 System Terminology 60

3.4.3 System Model 63

3.5 System-of-Systems-Air Transportation Subsystems 64

3.5.1 Airport Subsystem 68

3.5.2 Aircraft Subsystem-Airspace User Operations 68

3.5.3 Air Traffic Management/Communication, Navigation, and Surveillance Subsystem 75

3.5.4 Airspace/Network Subsystem 78

3.6 Performance Framework-Security Performance 81

3.7 Conclusions 84

Questions 85

References 86

II Where We Stand Today 87

Chapter 4 Traditional Approach to Aviation Security 91

4.1 Introduction 91

4.2 Understanding Today-By Looking Back 92

4.2.1 Historic Overview of Aviation Security 92

4.2.2 Attack Methods and Threat Conditions 93

4.3 Where Are We Today-Responses to Defining Moments 98

4.3.1 Incremental Change 98

4.3.2 International Coordination 99

4.3.3 Reactive Nature 103

4.4 Today's Paradigm-Layered Approach-Focus on Prevention 104

4.4.1 Layered Security 104

4.4.2 Example Approach 106

4.4.3 Today's Approach and Focus 108

4.4.4 A Growing Concern-Air Cargo 110

4.4.5 Summary 111

4.5 Lessons Learned From 9/11-Paradigm Shift-Prevention Can Fail 112

4.6 Emerging Concerns 113

4.6.1 Attacks Against Airports 113

4.6.2 Attacks Against CNS Infrastructures 114

4.6.3 The Next Challenge-Cyber Security 115

4.7 Conclusions 116

Questions 118

References 119

Chapter 5 Aviation Regulations and Standards 121

5.1 Introduction 121

5.2 Aviation and Regulation 123

5.2.1 Total Aviation System 123

5.2.2 Principles of Administrative Law-Laws and Regulation 125

5.2.3 Summary of Principles of Aviation Regulation 126

5.3 International Air Law and National Regulation 126

5.3.1 Chicago Convention-Source of International Air Law 126

5.3.2 Principles of Air Law 128

5.3.3 National Regulation 130

5.3.4 Summary 130

5.4 Interface Between Regulation and Industry Standards 131

5.4.1 Hard Law and Soft Law 131

5.4.2 Industry Standards 133

5.4.3 System Engineering Approach to Certification and Operation 136

5.5 Notable Rules and Actors 138

5.5.1 International Level-ICAO-SARPs 139

5.5.2 Regional Level-European Union 141

5.5.3 Regional/National Level-United States of America 145

5.5.4 Standards Level-Use Case 146

5.6 New Challenges-Industry Standards 149

5.6.1 Aviation Undergoing a Transformation 149

5.6.2 Industry Responses to Emerging Security Needs 151

5.7 Conclusions 155

Questions 157

References 158

Chapter 6 Implementing Security Controls 159

6.1 Introduction 159

6.2 Implementing Security Versus Safety 161

6.3 Security Certification 163

6.4 A Lifecycle Approach to Security 166

6.5 Effective Incident Response 169

6.6 Groundworthiness 172

6.7 Formalized Trust Models 173

6.8 Security Automation 175

6.9 Conclusions 177

Questions 179

References 180

III Moving Forward 181

Chapter 7 Reaction to Threats: Time-Critical Decision-Making and Natural Decision-Making 185

7.1 Introduction 185

7.2 Decision-Making-TCDM Versus DM 186

7.3 NDM and RPD-Solving Known Problems 190

7.4 Issues and Limitations 193

7.5 Operational Issues 196

7.6 Solution in an Aeronautical Environment 201

7.7 Summary and Conclusions 205

Questions 207

References 208

Chapter 8 Aircraft Security 209

8.1 Introduction 209

8.2 The Problem of Aircraft Security 210

8.3 Ground Attacks 212

8.4 The Use of Imagery 213

8.5 Preventing Attacks by Crew 218

8.6 Preventing Passenger Attacks 225

8.7 Conclusions 230

Questions 232

References 233

Chapter 9 Airport Security 235

9.1 Introduction 235

9.2 Current Concerns 237

9.3 Current Approaches 240

9.4 Solutions 241

9.4.1 Overview 241

9.4.2 Landside-Terminal Security 243

9.4.3 Behavior Assessment 245

9.4.4 Profiles 247

9.4.5 Screening 250

9.5 Airside-Supply Chain Considerations 252

9.6 Airside Operations Considerations 253

9.7 Conclusions 255

Questions 257

References 258

Chapter 10 Communication, Navigation, and Surveillance System 259

10.1 Introduction 259

10.2 Communication, Navigation, and Surveillance Subsystems 262

10.2.1 Navigation 262

10.2.2 Surveillance 263

10.2.3 Communication 265

10.2.4 Aeronautical Telecommunication Network 267

10.3 Future of CNS 268

10.3.1 SESAR/NextGen-SWIM System-Wide Information Management 271

10.3.2 Summary 273

10.4 Attack Spaces 274

10.4.1 Physical Attacks 275

10.4.2 Electromagnetic Attacks 279

10.4.3 Data-Level Attacks 279

10.5 The CNS System in Response to an Attack 287

10.5.1 SWIM Integration 289

10.5.2 Transponder Utilization 290

10.5.3 Research Projects 291

10.6 Conclusions 292

Questions 294

References 295

Chapter 11 Airspace Security 297

11.1 Introduction 297

11.2 State Authority-Homeland Security and National Defense 298

11.2.1 Sovereignty-Aviation Security 298

11.2.2 Homeland Security and National Defense 299

11.2.3 Summary 300

11.3 Problem-Securing the Airspace 300

11.4 Interception 301

11.5 Ground Interventions 303

11.6 Recent Research 305

11.7 Conclusions 306

Questions 307

References 308

Chapter 12 Conclusions: Holistic Approach to Aviation Security 309

12.1 Introduction 309

12.2 Stepping Stones 310

12.2.1 Part I-Security and Aviation 310

12.2.2 Part II-Where We Stand Today 311

12.2.3 Part III-Moving Forward 312

12.3 Aviation Security Engineering 313

12.3.1 Paradigm Shift-Holistic Approach 314

12.3.2 Engineering Practical Solutions 315

12.4 Final Words-Are We Going in the Right Direction? 318

About the Authors 321

Index 323

关闭


版权所有:西安交通大学图书馆      设计与制作:西安交通大学数据与信息中心  
地址:陕西省西安市碑林区咸宁西路28号     邮编710049

推荐使用IE9以上浏览器、谷歌、搜狗、360浏览器;推荐分辨率1360*768以上