Muutke küpsiste eelistusi

E-raamat: Aviation Security Engineering: A Holistic Approach

  • Formaat: 356 pages
  • Ilmumisaeg: 31-Jan-2011
  • Kirjastus: Artech House Publishers
  • ISBN-13: 9781608070732
  • Formaat - PDF+DRM
  • Hind: 101,79 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 356 pages
  • Ilmumisaeg: 31-Jan-2011
  • Kirjastus: Artech House Publishers
  • ISBN-13: 9781608070732

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Filling a critical gap in aviation engineering literature, this unique and timely resource provides professionals with a thorough introduction to aviation system security. It enables practitioners to understand the challenges the industry faces and how they are being addressed. Readers get a complete analysis of the current aviation security standards ARINC 811, ED-127 and the draft SC-216. The book offers an appreciation for the diverse collection of members within the aviation industry. Moreover, it provides a detailed treatment of methods used to design security controls that not only meet individual corporate interests of a stakeholder, but also work towards the holistic securing of the entire industry. This forward-looking volume introduces exiting new areas of aviation security research and techniques for solving today's the most challenging problems, such as security attack identification and response.
Preface xv
Forewords xix
I Security and Aviation
1(86)
Chapter 1 Aviation Security Engineering
3(18)
1.1 Introduction
3(1)
1.2 What is Security?
4(5)
1.2.1 Security as a State
5(1)
1.2.2 Security as a Process
5(1)
1.2.3 Security as a Trade-Off
6(1)
1.2.4 Security Risk Based Approach and Utility Theory
7(2)
1.2.5 Summary
9(1)
1.3 Aviation---Aviation Security
9(4)
1.3.1 Aviation---A Complex Supply Chain
9(2)
1.3.2 Aviation Security
11(2)
1.4 An Emerging Discipline
13(4)
1.4.1 Aviation Security Engineering---An Emerging Discipline
13(1)
1.4.2 Paradigm Changes
13(1)
1.4.3 Overt Approach
14(2)
1.4.4 "Fighting-The-Last-War" Phenomenon
16(1)
1.5 Conclusions
17(2)
Questions
19(1)
References
20(1)
Chapter 2 Security: An Introduction and Tutorial
21(30)
2.1 Introduction
21(2)
2.1.1 An Example
22(1)
2.2 What is Security?
23(1)
2.3 Terminology
24(4)
2.3.1 Asset-Centric Versus Attacker-Centric
25(1)
2.3.2 Fundamental Concepts and Definitions
26(2)
2.4 Security Risk Management
28(5)
2.4.1 Risk Management Cycle
29(2)
2.4.2 Residual Risk and Risk Appetite
31(1)
2.4.3 Undertaking Security Risk Management
31(2)
2.5 Controls and Control Philosophies
33(3)
2.5.1 Incident Response Cycle
35(1)
2.6 Security Meets Reality---Trust
36(1)
2.7 Aviation Security
37(6)
2.7.1 Annex 17
37(1)
2.7.2 The Evolving Nature of Aviation Security
38(1)
2.7.3 Aviation Information Assets
39(1)
2.7.4 Who Is In Charge of Aviation Security?
40(3)
2.8 Holistic Security Approach
43(1)
2.9 Relevant Standards
44(3)
2.9.1 ICAO Annex 17
45(1)
2.9.2 ARINC Report 811
45(1)
2.9.3 ED-200
46(1)
2.9.4 SC-216
46(1)
2.9.5 NIST SP-800 and ISO 27000 Series
47(1)
2.10 Conclusions
47(2)
Questions
49(1)
References
50(1)
Chapter 3 Aviation as a System: Air Transportation System
51(36)
3.1 Introduction
51(1)
3.2 Aviation Terminology
52(2)
3.3 High-Level View on Air Transportation
54(5)
3.3.1 Transportation Systems
54(2)
3.3.2 Air Transportation---Multiple Stakeholders and Multiple Objectives
56(1)
3.3.3 Growth and Challenges
56(3)
3.4 Air Transportation System Model
59(5)
3.4.1 System and Systems Theory
59(1)
3.4.2 System Terminology
60(3)
3.4.3 System Model
63(1)
3.5 System-of-Systems---Air Transportation Subsystems
64(17)
3.5.1 Airport Subsystem
64(4)
3.5.2 Aircraft Subsystem---Airspace User Operations
68(7)
3.5.3 Air Traffic Management/Communication, Navigation, and Surveillance Subsystem
75(3)
3.5.4 Airspace/Network Subsystem
78(3)
3.6 Performance Framework---Security Performance
81(3)
3.7 Conclusions
84(1)
Questions
85(1)
References
86(1)
II Where We Stand Today
87(94)
Chapter 4 Traditional Approach to Aviation Security
91(30)
4.1 Introduction
91(1)
4.2 Understanding Today---By Looking Back
92(6)
4.2.1 Historic Overview of Aviation Security
92(1)
4.2.2 Attack Methods and Threat Conditions
93(5)
4.3 Where Are We Today---Responses to Defining Moments
98(6)
4.3.1 Incremental Change
98(1)
4.3.2 International Coordination
99(4)
4.3.3 Reactive Nature
103(1)
4.4 Today's Paradigm---Layered Approach---Focus on Prevention
104(8)
4.4.1 Layered Security
104(2)
4.4.2 Example Approach
106(2)
4.4.3 Today's Approach and Focus
108(2)
4.4.4 A Growing Concern---Air Cargo
110(1)
4.4.5 Summary
111(1)
4.5 Lessons Learned From 9/11---Paradigm Shift---Prevention Can Fail
112(1)
4.6 Emerging Concerns
113(3)
4.6.1 Attacks Against Airports
113(1)
4.6.2 Attacks Against CNS Infrastructures
114(1)
4.6.3 The Next Challenge---Cyber Security
115(1)
4.7 Conclusions
116(2)
Questions
118(1)
References
119(2)
Chapter 5 Aviation Regulations and Standards
121(38)
5.1 Introduction
121(2)
5.2 Aviation and Regulation
123(3)
5.2.1 Total Aviation System
123(2)
5.2.2 Principles of Administrative Law---Laws and Regulation
125(1)
5.2.3 Summary of Principles of Aviation Regulation
126(1)
5.3 International Air Law and National Regulation
126(5)
5.3.1 Chicago Convention---Source of International Air Law
126(2)
5.3.2 Principles of Air Law
128(2)
5.3.3 National Regulation
130(1)
5.3.4 Summary
130(1)
5.4 Interface Between Regulation and Industry Standards
131(7)
5.4.1 Hard Law and Soft Law
131(2)
5.4.2 Industry Standards
133(3)
5.4.3 System Engineering Approach to Certification and Operation
136(2)
5.5 Notable Rules and Actors
138(11)
5.5.1 International Level---ICAO---SARPs
139(2)
5.5.2 Regional Level---European Union
141(4)
5.5.3 Regional Level---United States of America
145(1)
5.5.4 Standards Level---Use Case
146(3)
5.6 New Challenges---Industry Standards
149(6)
5.6.1 Aviation Undergoing a Transformation
149(2)
5.6.2 Industry Responses to Emerging Security Needs
151(4)
5.7 Conclusions
155(2)
Questions
157(1)
References
158(1)
Chapter 6 Implementing Security Controls
159(22)
6.1 Introduction
159(2)
6.2 Implementing Security Versus Safety
161(2)
6.3 Security Certification
163(3)
6.4 A Lifecycle Approach to Security
166(3)
6.5 Effective Incident Response
169(3)
6.6 Groundworthiness
172(1)
6.7 Formalized Trust Models
173(2)
6.8 Security Automation
175(2)
6.9 Conclusions
177(2)
Questions
179(1)
References
180(1)
III Moving Forward
181(140)
Chapter 7 Reaction to Threats: Time-Critical Decision-Making and Natural Decision-Making
185(24)
7.1 Introduction
185(1)
7.2 Decision-Making---TCDM Versus DM
186(4)
7.3 NDM and RPD---Solving Known Problems
190(3)
7.4 Issues and Limitations
193(3)
7.5 Operational Issues
196(5)
7.6 Solution in an Aeronautical Environment
201(4)
7.7 Summary and Conclusions
205(2)
Questions
207(1)
References
208(1)
Chapter 8 Aircraft Security
209(26)
8.1 Introduction
209(1)
8.2 The Problem of Aircraft Security
210(2)
8.3 Ground Attacks
212(1)
8.4 The Use of Imagery
213(5)
8.5 Preventing Attacks by Crew
218(7)
8.6 Preventing Passenger Attacks
225(5)
8.7 Conclusions
230(2)
Questions
232(1)
References
233(2)
Chapter 9 Airport Security
235(24)
9.1 Introduction
235(2)
9.2 Current Concerns
237(3)
9.3 Current Approaches
240(1)
9.4 Solutions
241(11)
9.4.1 Overview
241(2)
9.4.2 Landside---Terminal Security
243(2)
9.4.3 Behavior Assessment
245(2)
9.4.4 Profiles
247(3)
9.4.5 Screening
250(2)
9.5 Airside---Supply Chain Considerations
252(1)
9.6 Airside Operations Considerations
253(2)
9.7 Conclusions
255(2)
Questions
257(1)
References
258(1)
Chapter 10 Communication, Navigation, and Surveillance System
259(38)
10.1 Introduction
259(3)
10.2 Communication, Navigation, and Surveillance Subsystems
262(6)
10.2.1 Navigation
262(1)
10.2.2 Surveillance
263(2)
10.2.3 Communication
265(2)
10.2.4 Aeronautical Telecommunication Network
267(1)
10.3 Future of CNS
268(6)
10.3.1 SESAR/NextGen---SWIM System---Wide Information Management
271(2)
10.3.2 Summary
273(1)
10.4 Attack Spaces
274(13)
10.4.1 Physical Attacks
275(4)
10.4.2 Electromagnetic Attacks
279(1)
10.4.3 Data-Level Attacks
279(8)
10.5 The CNS System in Response to an Attack
287(5)
10.5.1 SWIM Integration
289(1)
10.5.2 Transponder Utilization
290(1)
10.5.3 Research Projects
291(1)
10.6 Conclusions
292(2)
Questions
294(1)
References
295(2)
Chapter 11 Airspace Security
297(12)
11.1 Introduction
297(1)
11.2 State Authority---Homeland Security and National Defense
298(2)
11.2.1 Sovereignty---Aviation Security
298(1)
11.2.2 Homeland Security and National Defense
299(1)
11.2.3 Summary
300(1)
11.3 Problem---Securing the Airspace
300(1)
11.4 Interception
301(2)
11.5 Ground Interventions
303(2)
11.6 Recent Research
305(1)
11.7 Conclusions
306(1)
Questions
307(1)
References
308(1)
Chapter 12 Conclusions: Holistic Approach to Aviation Security
309(12)
12.1 Introduction
309(1)
12.2 Stepping Stones
310(3)
12.2.1 Part I---Security and Aviation
310(1)
12.2.2 Part II---Where We Stand Today
311(1)
12.2.3 Part III---Moving Forward
312(1)
12.3 Aviation Security Engineering
313(5)
12.3.1 Paradigm Shift---Holistic Approach
314(1)
12.3.2 Engineering Practical Solutions
315(3)
12.4 Final Words---Are We Going in the Right Direction?
318(3)
About the Authors 321(2)
Index 323
Garik Markarian is chair and head of the Department of Communications Systems at Lancaster University. He is one of the world's leading scientists specializing in the area of wireless broadband communications. Rainer Kolle is an ATM security expert at EUROCONTROL in Brussels, Belgium. A Ph.D. candidate at the University of Lancaster, Mr. Kolle holds a master's degree in electrical engineering from the University of the Federal Armed Forces in Hamburg, Germany. Alex Tarter works for Ultra Electronics in London, specializing in UAV and aviation security projects. He holds a master's degree in engineering from Imperial College London and is currently pursuing his Ph.D. at Lancaster University.