1 National Workshop on Aviation Software Systems: Design for Certifiably Dependable Systems Natasha Neogi October 5-6, 2006 Arlington, VA.

Slides:



Advertisements
Similar presentations
Safety and Security in Air Traffic Management Rod Graff Agenda Item 2.
Advertisements

Module N° 7 – Introduction to SMS
Lesson 3 ODOT Analysis & Assessment. Analysis & Assessment Learning Outcomes As part of a small group, apply the two- part analysis by generating exposure-
VSE Corporation Proprietary Information
Protection of Information Assets I. Joko Dewanto 1.
Aviation Safety, Security & the Environment: The Way Forward Vince Galotti Chief/Air Traffic Management ICAO Safety and Efficiency An ICAO Perspective.
IPM in NRCS Programs Joe Bagdon USDA - NRCS National Water & Climate Center Amherst, Massachusetts.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Service Design – Section 4.5 Service Continuity Management.
Master Narratives & Global Climate Change Charlie Vars Dave Bella Court Smith IPCC January 29, 2013.
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
Trust, Privacy, and Security Moderator: Bharat Bhargava Purdue University.
Pratt & Whitney National Workshop on Aviation Software Systems for the Second Century of Flight: Design for Certifiably Dependable Systems October 5-6,
Ensuring Non-Functional Properties. What Is an NFP?  A software system’s non-functional property (NFP) is a constraint on the manner in which the system.
Software Engineering for Safety : A Roadmap Presentation by: Manu D Vij CS 599 Software Engineering for Embedded Systems.
Design of a Certifiably Dependable Next- Generation Air Transportation System Stephen A. JacklinMichelle M. Eshow Michael R. LowryDave McNally Ewen Denny.
Federal Aviation Administration Software for Critical Aviation Systems Presented to:National Workshop on Aviation Software Systems By:Hal Pierson Date:5.
An Approach to the Software Aspects of Safety Management
Air and space power for Australia ’ s security FLTLT Andrew STOCKWELL 8 August 2012 for International System Safety Conference 2012.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
DEFINITION OF CONCEPTS Disaster: A serious disruption of society, causing widespread human, material or environmental losses that exceed the capacity of.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Risk Assessment Farrokh Alemi, Ph.D. Monday, July 07, 2003.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
SERIT Contributo per la preparazione di HORIZON 2020 Cultural Heritage and Built Environment Francesco Soldovieri, Laura Moltedo.
PRESENTED TO: NATA October, 2010 Overview of 145 Repair Station Satellite System.
1 Policy Analysis for RISPO II National Workshop XXXXX 2006.
Sustainable Asset Management Planning Tony Miguel 17 June 2005.
Case for Quality Initiative Industry Perspective Monica J. Wilkins April 30, 2013.
Management of Change ► The health, safety, security, environmental, technical and other impacts of temporary and permanent changes are formally assessed,
Federal Aviation Administration Acquisition Career Certification & Management Rebecca Deloney Acquisition Career Management November 4, 2009.
THE REGIONAL ENVIRONMENTAL CENTER for Central and Eastern Europe Integrated planning and Assessment of National Development Plan of the Czech Republic.
INTRODUCTION TO SAFETY. WHAT IS SAFETY/LOSS PREVENTION? The prevention of accidents through the use of appropriate techniques OR technologies to identify.
Business Analysis. Business Analysis Concepts Enterprise Analysis ► Identify business opportunities ► Understand the business strategy ► Identify Business.
PDP SUBMISSION Purpose (1) The purpose of this Act is to promote the sustainable management of natural and physical resources. (2) In this Act, sustainable.
An EDI Testing Strategy Rosemary B. Abell Director, National HIPAA Practice Keane, Inc. HIPAA Summit V October 30 – November 1, 2002.
TMALL 0141 Presentation v 1.0 Asset Management Bo Olsson Bucharest October 7th, 2015.
Principles of I-4 Risk Management. 2 Prevention of Serious Incidents is The Highest Priority.
Social Analysis Workshop on Country Analytical Work June 19, 2001 Anis Ahmad Dani World Bank, Social Development Department.
1 1 EPA Nanotechnology Research Program – LCA Considerations Jeff Morris National Program Director for Nanotechnology 5 November 2009.
{ Risk Management. Step 1. Identify the hazards Identify all hazards associated with the systems of work Risk Management Four Step Process.
How Does Sustainability Fit with Other Environmental Initiatives?
A Technology Partnership for the New Millennium Anne Harlan, Director William J. Hughes Technical Center 68th NASAO Annual Convention September 20, 1999.
111 © 2001, Cisco Systems, Inc. All rights reserved. Presentation_ID Cisco Services & Support World Class Partners Technical Support Services Advanced.
Revision N° 11ICAO Safety Management Systems (SMS) Course01/01/08 Module N° 9 – SMS operation.
Subway Chemical Detection: A Proposed System Process for a Detect-to-Warn Capability to Save Lives CAPT Joselito Ignacio, MA, MPH, CIH, CSP, REHS Acting.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Resilience best practices in the aviation field
1 Design and evaluation methods: Objectives n Design life cycle: HF input and neglect n Levels of system design: Going beyond the interface n Sources of.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Vulnerability Assessment Sequoia Voting Systems October 10, 2006.
and Security Management: ISO 28000
Jack Pokrzywa Director Ground Vehicle Standards, SAE International
CS 450/650 Fundamentals of Integrated Computer Security
Xiaohong (Dorothy) Yuan North Carolina A&T State University 11/16/2017
CAPACITY BUILDING FOR GHS IMPLEMENTATION: the perspective of Civil Society Contact : Dr Olga Speranskaya Co-Chair, IPEN
Safety plan.
Understanding Security Layers
Safety & Security of future SATCOM based Aviation Data Links
Chapter 27 Security Engineering
Specification of Countermeasures for CYRAIL
Software Engineering for Safety: a Roadmap
Final Conference 18 Set 2018.
Albeado - Enabling Smart Energy
URS Washington Group International, Inc.
Aerodrome Certification Workshop
Presentation transcript:

1 National Workshop on Aviation Software Systems: Design for Certifiably Dependable Systems Natasha Neogi October 5-6, 2006 Arlington, VA

2 The Next Generation Air Transportation System

3 Security and Safety Issues  Security and Safety are highest priorities Self-inflicted DOS or DOI not an option Liveness (physical systems must obey dynamic constraints) Most access/authentication systems not appropriate  Diversity involves multiple technologies  Integrity and Availability can be more important than Confidentiality Safety and Security Properties can lead to Competing Requirements

4 Sustainment & Retirement Requirements Specification and Analysis System Specification Modelling: Components and Interfaces Integration of Techniques Simulation and Testing Assessment and Measurements Approach: Build in Safety/ Security from system inception Evaluate tradeoff between Safety and Security throughout the lifecycle Can use tradeoff analysis to evaluate/distinguish between design alternatives Safety and Security Tradeoffs System Safety Process Preliminary Hazard Analysis Monitor Residual Risk Accident and Risk Models Elimination, Mitigation, Control Certification System Security Process Preliminary Threat Assessment Certification Monitor Vulnerability Vulnerabilities and Attack Models Avoidance, Detection, Masking

5 Fundamental Research Questions  How do you quantify safety and security in a predictive manner?  What are the effects of other qualities on safety, security and their relationship Capacity, Efficiency, Environmental etc.  Can we model/quantify tradeoffs for the relationship between safety and security?

6 Thank You!