Preface |
|
xv | |
Forewords |
|
xix | |
|
|
1 | (86) |
|
Chapter 1 Aviation Security Engineering |
|
|
3 | (18) |
|
|
3 | (1) |
|
|
4 | (5) |
|
1.2.1 Security as a State |
|
|
5 | (1) |
|
1.2.2 Security as a Process |
|
|
5 | (1) |
|
1.2.3 Security as a Trade-Off |
|
|
6 | (1) |
|
1.2.4 Security Risk Based Approach and Utility Theory |
|
|
7 | (2) |
|
|
9 | (1) |
|
1.3 Aviation---Aviation Security |
|
|
9 | (4) |
|
1.3.1 Aviation---A Complex Supply Chain |
|
|
9 | (2) |
|
|
11 | (2) |
|
1.4 An Emerging Discipline |
|
|
13 | (4) |
|
1.4.1 Aviation Security Engineering---An Emerging Discipline |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (2) |
|
1.4.4 "Fighting-The-Last-War" Phenomenon |
|
|
16 | (1) |
|
|
17 | (2) |
|
|
19 | (1) |
|
|
20 | (1) |
|
Chapter 2 Security: An Introduction and Tutorial |
|
|
21 | (30) |
|
|
21 | (2) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
24 | (4) |
|
2.3.1 Asset-Centric Versus Attacker-Centric |
|
|
25 | (1) |
|
2.3.2 Fundamental Concepts and Definitions |
|
|
26 | (2) |
|
2.4 Security Risk Management |
|
|
28 | (5) |
|
2.4.1 Risk Management Cycle |
|
|
29 | (2) |
|
2.4.2 Residual Risk and Risk Appetite |
|
|
31 | (1) |
|
2.4.3 Undertaking Security Risk Management |
|
|
31 | (2) |
|
2.5 Controls and Control Philosophies |
|
|
33 | (3) |
|
2.5.1 Incident Response Cycle |
|
|
35 | (1) |
|
2.6 Security Meets Reality---Trust |
|
|
36 | (1) |
|
|
37 | (6) |
|
|
37 | (1) |
|
2.7.2 The Evolving Nature of Aviation Security |
|
|
38 | (1) |
|
2.7.3 Aviation Information Assets |
|
|
39 | (1) |
|
2.7.4 Who Is In Charge of Aviation Security? |
|
|
40 | (3) |
|
2.8 Holistic Security Approach |
|
|
43 | (1) |
|
|
44 | (3) |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
2.9.5 NIST SP-800 and ISO 27000 Series |
|
|
47 | (1) |
|
|
47 | (2) |
|
|
49 | (1) |
|
|
50 | (1) |
|
Chapter 3 Aviation as a System: Air Transportation System |
|
|
51 | (36) |
|
|
51 | (1) |
|
|
52 | (2) |
|
3.3 High-Level View on Air Transportation |
|
|
54 | (5) |
|
3.3.1 Transportation Systems |
|
|
54 | (2) |
|
3.3.2 Air Transportation---Multiple Stakeholders and Multiple Objectives |
|
|
56 | (1) |
|
3.3.3 Growth and Challenges |
|
|
56 | (3) |
|
3.4 Air Transportation System Model |
|
|
59 | (5) |
|
3.4.1 System and Systems Theory |
|
|
59 | (1) |
|
|
60 | (3) |
|
|
63 | (1) |
|
3.5 System-of-Systems---Air Transportation Subsystems |
|
|
64 | (17) |
|
|
64 | (4) |
|
3.5.2 Aircraft Subsystem---Airspace User Operations |
|
|
68 | (7) |
|
3.5.3 Air Traffic Management/Communication, Navigation, and Surveillance Subsystem |
|
|
75 | (3) |
|
3.5.4 Airspace/Network Subsystem |
|
|
78 | (3) |
|
3.6 Performance Framework---Security Performance |
|
|
81 | (3) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
87 | (94) |
|
Chapter 4 Traditional Approach to Aviation Security |
|
|
91 | (30) |
|
|
91 | (1) |
|
4.2 Understanding Today---By Looking Back |
|
|
92 | (6) |
|
4.2.1 Historic Overview of Aviation Security |
|
|
92 | (1) |
|
4.2.2 Attack Methods and Threat Conditions |
|
|
93 | (5) |
|
4.3 Where Are We Today---Responses to Defining Moments |
|
|
98 | (6) |
|
|
98 | (1) |
|
4.3.2 International Coordination |
|
|
99 | (4) |
|
|
103 | (1) |
|
4.4 Today's Paradigm---Layered Approach---Focus on Prevention |
|
|
104 | (8) |
|
|
104 | (2) |
|
|
106 | (2) |
|
4.4.3 Today's Approach and Focus |
|
|
108 | (2) |
|
4.4.4 A Growing Concern---Air Cargo |
|
|
110 | (1) |
|
|
111 | (1) |
|
4.5 Lessons Learned From 9/11---Paradigm Shift---Prevention Can Fail |
|
|
112 | (1) |
|
|
113 | (3) |
|
4.6.1 Attacks Against Airports |
|
|
113 | (1) |
|
4.6.2 Attacks Against CNS Infrastructures |
|
|
114 | (1) |
|
4.6.3 The Next Challenge---Cyber Security |
|
|
115 | (1) |
|
|
116 | (2) |
|
|
118 | (1) |
|
|
119 | (2) |
|
Chapter 5 Aviation Regulations and Standards |
|
|
121 | (38) |
|
|
121 | (2) |
|
5.2 Aviation and Regulation |
|
|
123 | (3) |
|
5.2.1 Total Aviation System |
|
|
123 | (2) |
|
5.2.2 Principles of Administrative Law---Laws and Regulation |
|
|
125 | (1) |
|
5.2.3 Summary of Principles of Aviation Regulation |
|
|
126 | (1) |
|
5.3 International Air Law and National Regulation |
|
|
126 | (5) |
|
5.3.1 Chicago Convention---Source of International Air Law |
|
|
126 | (2) |
|
5.3.2 Principles of Air Law |
|
|
128 | (2) |
|
5.3.3 National Regulation |
|
|
130 | (1) |
|
|
130 | (1) |
|
5.4 Interface Between Regulation and Industry Standards |
|
|
131 | (7) |
|
5.4.1 Hard Law and Soft Law |
|
|
131 | (2) |
|
|
133 | (3) |
|
5.4.3 System Engineering Approach to Certification and Operation |
|
|
136 | (2) |
|
5.5 Notable Rules and Actors |
|
|
138 | (11) |
|
5.5.1 International Level---ICAO---SARPs |
|
|
139 | (2) |
|
5.5.2 Regional Level---European Union |
|
|
141 | (4) |
|
5.5.3 Regional Level---United States of America |
|
|
145 | (1) |
|
5.5.4 Standards Level---Use Case |
|
|
146 | (3) |
|
5.6 New Challenges---Industry Standards |
|
|
149 | (6) |
|
5.6.1 Aviation Undergoing a Transformation |
|
|
149 | (2) |
|
5.6.2 Industry Responses to Emerging Security Needs |
|
|
151 | (4) |
|
|
155 | (2) |
|
|
157 | (1) |
|
|
158 | (1) |
|
Chapter 6 Implementing Security Controls |
|
|
159 | (22) |
|
|
159 | (2) |
|
6.2 Implementing Security Versus Safety |
|
|
161 | (2) |
|
6.3 Security Certification |
|
|
163 | (3) |
|
6.4 A Lifecycle Approach to Security |
|
|
166 | (3) |
|
6.5 Effective Incident Response |
|
|
169 | (3) |
|
|
172 | (1) |
|
6.7 Formalized Trust Models |
|
|
173 | (2) |
|
|
175 | (2) |
|
|
177 | (2) |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
181 | (140) |
|
Chapter 7 Reaction to Threats: Time-Critical Decision-Making and Natural Decision-Making |
|
|
185 | (24) |
|
|
185 | (1) |
|
7.2 Decision-Making---TCDM Versus DM |
|
|
186 | (4) |
|
7.3 NDM and RPD---Solving Known Problems |
|
|
190 | (3) |
|
7.4 Issues and Limitations |
|
|
193 | (3) |
|
|
196 | (5) |
|
7.6 Solution in an Aeronautical Environment |
|
|
201 | (4) |
|
7.7 Summary and Conclusions |
|
|
205 | (2) |
|
|
207 | (1) |
|
|
208 | (1) |
|
Chapter 8 Aircraft Security |
|
|
209 | (26) |
|
|
209 | (1) |
|
8.2 The Problem of Aircraft Security |
|
|
210 | (2) |
|
|
212 | (1) |
|
|
213 | (5) |
|
8.5 Preventing Attacks by Crew |
|
|
218 | (7) |
|
8.6 Preventing Passenger Attacks |
|
|
225 | (5) |
|
|
230 | (2) |
|
|
232 | (1) |
|
|
233 | (2) |
|
Chapter 9 Airport Security |
|
|
235 | (24) |
|
|
235 | (2) |
|
|
237 | (3) |
|
|
240 | (1) |
|
|
241 | (11) |
|
|
241 | (2) |
|
9.4.2 Landside---Terminal Security |
|
|
243 | (2) |
|
9.4.3 Behavior Assessment |
|
|
245 | (2) |
|
|
247 | (3) |
|
|
250 | (2) |
|
9.5 Airside---Supply Chain Considerations |
|
|
252 | (1) |
|
9.6 Airside Operations Considerations |
|
|
253 | (2) |
|
|
255 | (2) |
|
|
257 | (1) |
|
|
258 | (1) |
|
Chapter 10 Communication, Navigation, and Surveillance System |
|
|
259 | (38) |
|
|
259 | (3) |
|
10.2 Communication, Navigation, and Surveillance Subsystems |
|
|
262 | (6) |
|
|
262 | (1) |
|
|
263 | (2) |
|
|
265 | (2) |
|
10.2.4 Aeronautical Telecommunication Network |
|
|
267 | (1) |
|
|
268 | (6) |
|
10.3.1 SESAR/NextGen---SWIM System---Wide Information Management |
|
|
271 | (2) |
|
|
273 | (1) |
|
|
274 | (13) |
|
|
275 | (4) |
|
10.4.2 Electromagnetic Attacks |
|
|
279 | (1) |
|
10.4.3 Data-Level Attacks |
|
|
279 | (8) |
|
10.5 The CNS System in Response to an Attack |
|
|
287 | (5) |
|
|
289 | (1) |
|
10.5.2 Transponder Utilization |
|
|
290 | (1) |
|
|
291 | (1) |
|
|
292 | (2) |
|
|
294 | (1) |
|
|
295 | (2) |
|
Chapter 11 Airspace Security |
|
|
297 | (12) |
|
|
297 | (1) |
|
11.2 State Authority---Homeland Security and National Defense |
|
|
298 | (2) |
|
11.2.1 Sovereignty---Aviation Security |
|
|
298 | (1) |
|
11.2.2 Homeland Security and National Defense |
|
|
299 | (1) |
|
|
300 | (1) |
|
11.3 Problem---Securing the Airspace |
|
|
300 | (1) |
|
|
301 | (2) |
|
11.5 Ground Interventions |
|
|
303 | (2) |
|
|
305 | (1) |
|
|
306 | (1) |
|
|
307 | (1) |
|
|
308 | (1) |
|
Chapter 12 Conclusions: Holistic Approach to Aviation Security |
|
|
309 | (12) |
|
|
309 | (1) |
|
|
310 | (3) |
|
12.2.1 Part I---Security and Aviation |
|
|
310 | (1) |
|
12.2.2 Part II---Where We Stand Today |
|
|
311 | (1) |
|
12.2.3 Part III---Moving Forward |
|
|
312 | (1) |
|
12.3 Aviation Security Engineering |
|
|
313 | (5) |
|
12.3.1 Paradigm Shift---Holistic Approach |
|
|
314 | (1) |
|
12.3.2 Engineering Practical Solutions |
|
|
315 | (3) |
|
12.4 Final Words---Are We Going in the Right Direction? |
|
|
318 | (3) |
About the Authors |
|
321 | (2) |
Index |
|
323 | |