Challenges with the Application of Cyber Security for Airworthiness (CSA) in Real-World Contexts

05/16/2023
by   Beckett LeClair, et al.
0

The ever increasing push towards reliance upon computerised technology in commercial, general, and military aerospace brings with it an increasing amount of potential cyber hazards and attacks. Consequently, the variety of attack vectors is greater than ever. Recognized Good Practice standards such as DO 326A and ED 202A attempt to address this by providing guidelines for cyber security on in-service aircraft, though implementation work for such initiatives is still in early stages. From previous work on in service aircraft, the authors have determined that one of the key challenges is that of the retrospective application of new regulations to existing designs. This can present significant requirements for time, money, and Suitably Qualified and Experienced Personnel resource, things which are often in already limited supply in military environments. The authors have previously explored efficient ways of approaching compliance, with promising results. There is still the need to consider this retroactivity challenge in tandem with other key factors affecting the application of CSA, in order to determine any more potential mitigating actions that could lower the barrier to effective and efficient implementation of secure approaches in the air domain. This work explores the interrelated challenges surrounding real-world applications of CSA and the beginnings of how these may be overcome.

READ FULL TEXT
research
08/18/2021

A Review on Cybersecurity in Smart Local Energy Systems: Requirements, Challenges, and Standards

Smart local energy system (SLES) is considered as a promising pathway fa...
research
08/28/2023

Turnkey Technology: A Powerful Tool for Cyber Warfare

Turnkey technology has emerged as a game-changing tool in cyber warfare,...
research
05/15/2019

On the Cost of Security Compliance in Information Systems

The onward development of information and communication technology has l...
research
10/11/2020

Improving Interdisciplinary Communication With Standardized Cyber Security Terminology: A Literature Review

The growing demand for computer security and the cyberization trend are ...
research
12/26/2020

Harnessing Machine Learning, Data Analytics, and Computer-Aided Testing for Cyber Security Applications

While media reports frequently highlight the exciting aspects of the cyb...
research
12/07/2020

Real-time monitoring as a supplementary security component of vigilantism in modern network environments

The phenomenon of network vigilantism is autonomously attributed to how ...

Please sign up or login with your details

Forgot password? Click here to reset