What is included with this book?
Preface | p. xv |
Forewords | p. xix |
Security and Aviation | p. 1 |
Aviation Security Engineering | p. 3 |
Introduction | p. 3 |
What is Security? | p. 4 |
Security as a State | p. 5 |
Security as a Process | p. 5 |
Security as a Trade-Off | p. 6 |
Security Risk Based Approach and Utility Theory | p. 7 |
Summary | p. 9 |
Aviation-Aviation Security | p. 9 |
Aviation-A Complex Supply Chain | p. 9 |
Aviation Security | p. 11 |
An Emerging Discipline | p. 13 |
Aviation Security Engineering-An Emerging Discipline | p. 13 |
Paradigm Changes | p. 13 |
Overt Approach | p. 14 |
ôFighting-The-Last-Warö Phenomenon | p. 16 |
Conclusions | p. 17 |
Questions | p. 19 |
References | p. 20 |
Security: An Introduction and Tutorial | p. 21 |
Introduction | p. 21 |
An Example | p. 22 |
What is Security? | p. 23 |
Terminology | p. 24 |
Asset-Centric Versus Attacker-Centric | p. 25 |
Fundamental Concepts and Definitions | p. 26 |
Security Risk Management | p. 28 |
Risk Management Cycle | p. 29 |
Residual Risk and Risk Appetite | p. 31 |
Undertaking Security Risk Management | p. 31 |
Controls and Control Philosophies | p. 33 |
Incident Response Cycle | p. 35 |
Security Meets Reality-Trust | p. 36 |
Aviation Security | p. 37 |
Annex 17 | p. 37 |
The Evolving Nature of Aviation Security | p. 38 |
Aviation Information Assets | p. 39 |
Who Is In Charge of Aviation Security? | p. 40 |
Holistic Security Approach | p. 43 |
Relevant Standards | p. 44 |
ICAO Annex 17 | p. 45 |
ARINC Report 811 | p. 45 |
ED-200 | p. 46 |
SC-216 | p. 46 |
NIST SP-800 and ISO 27000 Series | p. 47 |
Conclusions | p. 47 |
Questions | p. 49 |
References | p. 50 |
Aviation as a System: Air Transportation System | p. 51 |
Introduction | p. 51 |
Aviation Terminology | p. 52 |
High-Level View on Air Transportation | p. 54 |
Transportation Systems | p. 54 |
Air Transportation-Multiple Stakeholders and Multiple Objectives | p. 56 |
Growth and Challenges | p. 56 |
Air Transportation System Model | p. 59 |
System and Systems Theory | p. 59 |
System Terminology | p. 60 |
System Model | p. 63 |
System-of-Systems-Air Transportation Subsystems | p. 64 |
Airport Subsystem | p. 68 |
Aircraft Subsystem-Airspace User Operations | p. 68 |
Air Traffic Management/Communication, Navigation, and Surveillance Subsystem | p. 75 |
Airspace/Network Subsystem | p. 78 |
Performance Framework-Security Performance | p. 81 |
Conclusions | p. 84 |
Questions | p. 85 |
References | p. 86 |
Where We Stand Today | p. 87 |
Traditional Approach to Aviation Security | p. 91 |
Introduction | p. 91 |
Understanding Today-By Looking Back | p. 92 |
Historic Overview of Aviation Security | p. 92 |
Attack Methods and Threat Conditions | p. 93 |
Where Are We Today-Responses to Defining Moments | p. 98 |
Incremental Change | p. 98 |
International Coordination | p. 99 |
Reactive Nature | p. 103 |
Today's Paradigm-Layered Approach-Focus on Prevention | p. 104 |
Layered Security | p. 104 |
Example Approach | p. 106 |
Today's Approach and Focus | p. 108 |
A Growing Concern-Air Cargo | p. 110 |
Summary | p. 111 |
Lessons Learned From 9/11-Paradigm Shift-Prevention Can Fail | p. 112 |
Emerging Concerns | p. 113 |
Attacks Against Airports | p. 113 |
Attacks Against CNS Infrastructures | p. 114 |
The Next Challenge-Cyber Security | p. 115 |
Conclusions | p. 116 |
Questions | p. 118 |
References | p. 119 |
Aviation Regulations and Standards | p. 121 |
Introduction | p. 121 |
Aviation and Regulation | p. 123 |
Total Aviation System | p. 123 |
Principles of Administrative Law-Laws and Regulation | p. 125 |
Summary of Principles of Aviation Regulation | p. 126 |
International Air Law and National Regulation | p. 126 |
Chicago Convention-Source of International Air Law | p. 126 |
Principles of Air Law | p. 128 |
National Regulation | p. 130 |
Summary | p. 130 |
Interface Between Regulation and Industry Standards | p. 131 |
Hard Law and Soft Law | p. 131 |
Industry Standards | p. 133 |
System Engineering Approach to Certification and Operation | p. 136 |
Notable Rules and Actors | p. 138 |
International Level-ICAO-SARPs | p. 139 |
Regional Level-European Union | p. 141 |
Regional/National Level-United States of America | p. 145 |
Standards Level-Use Case | p. 146 |
New Challenges-Industry Standards | p. 149 |
Aviation Undergoing a Transformation | p. 149 |
Industry Responses to Emerging Security Needs | p. 151 |
Conclusions | p. 155 |
Questions | p. 157 |
References | p. 158 |
Implementing Security Controls | p. 159 |
Introduction | p. 159 |
Implementing Security Versus Safety | p. 161 |
Security Certification | p. 163 |
A Lifecycle Approach to Security | p. 166 |
Effective Incident Response | p. 169 |
Groundworthiness | p. 172 |
Formalized Trust Models | p. 173 |
Security Automation | p. 175 |
Conclusions | p. 177 |
Questions | p. 179 |
References | p. 180 |
Moving Forward | p. 181 |
Reaction to Threats: Time-Critical Decision-Making and Natural Decision-Making | p. 185 |
Introduction | p. 185 |
Decision-Making-TCDM Versus DM | p. 186 |
NDM and RPD-Solving Known Problems | p. 190 |
Issues and Limitations | p. 193 |
Operational Issues | p. 196 |
Solution in an Aeronautical Environment | p. 201 |
Summary and Conclusions | p. 205 |
Questions | p. 207 |
References | p. 208 |
Aircraft Security | p. 209 |
Introduction | p. 209 |
The Problem of Aircraft Security | p. 210 |
Ground Attacks | p. 212 |
The Use of Imagery | p. 213 |
Preventing Attacks by Crew | p. 218 |
Preventing Passenger Attacks | p. 225 |
Conclusions | p. 230 |
Questions | p. 232 |
References | p. 233 |
Airport Security | p. 235 |
Introduction | p. 235 |
Current Concerns | p. 237 |
Current Approaches | p. 240 |
Solutions | p. 241 |
Overview | p. 241 |
Landside-Terminal Security | p. 243 |
Behavior Assessment | p. 245 |
Profiles | p. 247 |
Screening | p. 250 |
Airside-Supply Chain Considerations | p. 252 |
Airside Operations Considerations | p. 253 |
Conclusions | p. 255 |
Questions | p. 257 |
References | p. 258 |
Communication, Navigation, and Surveillance System | p. 259 |
Introduction | p. 259 |
Communication, Navigation, and Surveillance Subsystems | p. 262 |
Navigation | p. 262 |
Surveillance | p. 263 |
Communication | p. 265 |
Aeronautical Telecommunication Network | p. 267 |
Future of CNS | p. 268 |
SESAR/NextGen-SWIM System-Wide Information Management | p. 271 |
Summary | p. 273 |
Attack Spaces | p. 274 |
Physical Attacks | p. 275 |
Electromagnetic Attacks | p. 279 |
Data-Level Attacks | p. 279 |
The CNS System in Response to an Attack | p. 287 |
SWIM Integration | p. 289 |
Transponder Utilization | p. 290 |
Research Projects | p. 291 |
Conclusions | p. 292 |
Questions | p. 294 |
References | p. 295 |
Airspace Security | p. 297 |
Introduction | p. 297 |
State Authority-Homeland Security and National Defense | p. 298 |
Sovereignty-Aviation Security | p. 298 |
Homeland Security and National Defense | p. 299 |
Summary | p. 300 |
Problem-Securing the Airspace | p. 300 |
Interception | p. 301 |
Ground Interventions | p. 303 |
Recent Research | p. 305 |
Conclusions | p. 306 |
Questions | p. 307 |
References | p. 308 |
Conclusions: Holistic Approach to Aviation Security | p. 309 |
Introduction | p. 309 |
Stepping Stones | p. 310 |
Part I-Security and Aviation | p. 310 |
Part II-Where We Stand Today | p. 311 |
Part III-Moving Forward | p. 312 |
Aviation Security Engineering | p. 313 |
Paradigm Shift-Holistic Approach | p. 314 |
Engineering Practical Solutions | p. 315 |
Final Words-Are We Going in the Right Direction? | p. 318 |
About the Authors | p. 321 |
Index | p. 323 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.