Joint Session: NAV/AMS/SM&C with Security WG SM&C Mission Operations Services and Security Presented by: Roger Thompson.

Slides:



Advertisements
Similar presentations
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Advertisements

IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
System integrity The term system integrity has the following meanings: That condition of a system where in its specified operational and technical parameters.
28.2 Functionality Application Software Provides Applications supply the high-level services that user access, and determine how users perceive the capabilities.
Folie 1 Service Oriented Architecture - Prototyping study - DLR/GSOC Author: S.Gully.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
6/4/2015Page 1 Enterprise Service Bus (ESB) B. Ramamurthy.
Chapter 7 HARDENING SERVERS.
Team: Maya Zalcberg Diana Attar Levona Hershtik Academic advisor: Prof. Ehud Gudes ADD Presentation.
© Copyright 1997, The University of New Mexico C-1 Internet Service Provider Services What to do once you’re connected.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
COS 420 DAY 24. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Student evaluations Latest.
Security Guidelines and Management
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
Adapted from Afyouni, Database Security and Auditing DB Auditing Examples (Ch. 9) Dr. Mario Guimaraes.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Authorization architecture sketches draft-selander-core-access-control-02 draft-gerdes-core-dcaf-authorize-02 draft-seitz-ace-design-considerations-00.
PerfSONAR Client Construction February 11 th 2010, APAN 29 – perfSONAR Workshop Jeff Boote, Assistant Director R&D.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
FORESEC Academy FORESEC Academy Security Essentials (II)
Unrestricted Connection manager MIF WG IETF 78, Maastricht Gaëtan Feige, Cisco (presenter) Pierrick Seïté, France Telecom -
SM&C Mission Operations Services: Prototype Demonstration SM&C Core & Common Layer Demonstration ESA/BNSC Collaborative Prototype Presented by: Roger Thompson.
CCSDS Spacecraft Monitor & Control Working Group (SM&C WG) SpaceOps 2004.
Mission Operation (MO) Services SM&C-MIA Joint Meeting ESTEC, 27 October 2009 Mario Merri, ESA.
1 Version 3.0 Module 11 TCP Application and Transport.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
1 May 2010 CCSDS INFORMATION SERVICE ARCHITECTURE CONCEPTS.
Figures – Chapter 14. Figure 14.1 System layers where security may be compromised.
OSI Model. Topics What is the OSI Model? What is a Protocol? Why 7 Layers? The 7 Layers – Application – Presentation – Session – Transport – Network –
SQL Server Security By Mattias Lind For PASS Security VC.
Eye-Sat : an astronomy student nanosatellite CCSDS meeting, March 23, 2015.
Architectural Patterns Support Lecture. Software Architecture l Architecture is OVERLOADED System architecture Application architecture l Architecture.
Application Layer Security Mike Pajevski (NASA/JPL) April 2009.
A Secure JBoss Platform Nicola Mezzetti Acknowledgments: F. Panzieri.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
Wyn Cudlip BNSC/QinetiQ Presentation to WGISS25 China, February 2008 CCSDS Liaison Consultative Committee on Space Data Systems.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
ESA UNCLASSIFIED – For Official Use Workshop #23 Pasadena, USA 25 rd March 2015 Sam Cooper Common services update (part 2)
CSTS File Transfer Service CS File Transfer Specification – Initial Discussions IOAG Service Catalogue #1 Scope Candidate Applications File Content.
Operating Systems Proj.. Background A firewall is an information technology (IT) security device which is configured to permit, deny or proxy data connections.
Overview of SOIS Electronic Data Sheets (EDS) & Dictionary of Terms (DoT) SOIS APP WG Fall 2012.
ESA UNCLASSIFIED – For Official Use Workshop #23 Pasadena, USA 24 rd March 2015 Sam Cooper Common services update (part 1)
1 UML Modeling of Spacecraft Onboard Instruments Takahiro Yamada, JAXA/ISAS April 2005.
MOIMS Plenary CCSDS Spacecraft Monitoring & Control WG (SM&C) Workshop #02, May 2004 Mario Merri, ESA/ESOC, Chairman.
Differences Training BAAN IVc-BaanERP 5.0c: Application Administration, Customization and Exchange BaanERP 5.0c Tools / Exchange.
Web Services Security Patterns Alex Mackman CM Group Ltd
CCSDS Spacecraft Monitor & Control Services Concept CCSDS Spacecraft Monitor & Control Working Group (SM&C WG) 6TH INTERNATIONAL SYMPOSIUM REDUCING THE.
CCSDS Reference Architecture Notes from SAWG discussion & from SEA Report to CESG/CMC 12 & 17 Nov 2014.
EGOS Workshop 2005 GDSS - Ground Data System Services: a Service Oriented Architecture for Mission Operations Roger Thompson, Nestor Peccia,
CCSDS Security Working Group Application Layer Security Discussion Mike Pajevski NASA/JPL October 2008.
1 A mechanism for file directory with SIP draft-garcia-sipping-resource-sharing-framework-01.txt draft-garcia-sipping-resource-event-package-01.txt draft-garcia-sipping-resource-desc-pidf-00.txt.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
Java Programming: Advanced Topics 1 Building Web Applications Chapter 13.
1 Steve Hughes Daniel J. Crichton NASA/JPL January 16, 2007 CCSDS Information Architecture Working.
CEOS WGISS Meeting, Hanoi May CCSDS Liaison Consultative Committee on Space Data Systems Wyn Cudlip BNSC/QinetiQ Presentation.
Current Topic – EPP - TWNIC Jeff Yeh
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Spacecraft Monitor & Control Working Group (SM&C WG) CCSDS SM&C WG.
ASP.NET 2.0 Security Alex Mackman CM Group Ltd
1 Seminar: Pervasive Computing 2004 Automatic mobile device configuration: Status & open challenges Stefan Hoferer Supervisor: Andreas Fasbender.
ESA UNCLASSIFIED – For Official Use Cleveland, OH, USA 04-08Apr16 Mario Merri, ESA/ESOC Brigitte Behal, CNES MOIMS Opening Plenary.
IEEE SISWG (P1619.3)‏ Messaging & Transport. AGENDA Transport Protocols & Channel Protection Messaging Layer Capability Exchange & Authentication Groups.
ArcGIS for Server Security: Advanced
Application Layer Functionality and Protocols Abdul Hadi Alaidi
Mission Operation (MO) Services
Instructor Materials Chapter 5 Providing Network Services
EGOS Workshop 2005 GDSS - Ground Data System Services: a Service Oriented Architecture for Mission Operations Roger Thompson, Nestor Peccia, Stewart Hall,
DATA COMMUNICATION Lecture-10.
Presentation transcript:

Joint Session: NAV/AMS/SM&C with Security WG SM&C Mission Operations Services and Security Presented by: Roger Thompson

Presentation Title Date 2 Mission Operations [MO] Services

Presentation Title Date 3 Generic Service Pattern: Parameter Example Service Layer Service Provider Service Consumer HCI Displays Other Applications Service Configuration Database Service History Archive Observe Control Manage Archive Replay, RetrieveAccess Parameter Class Parameter Object Definitions Parameter History Parameter Events Set Parameter Action Disable/Enable Monitoring Checks Dynamic History Replay: Observer view Block Retrieval

Presentation Title Date 4 CCSDS SM&C Layers SM&C Mission Operations Services Core, Time, Software Management … SM&C Common Services Directory, Replay Control SM&C Protocol Messaging [AMS] File Transfer [CFDP] Mail [SMTP/SMS] MessagingFile TransferMail Consumer/Provider Generic Interaction Patterns MOIMS SM&C Services

Presentation Title Date 5 SM&C Security Requirements  Consumer Authentication  Service Provider must be Security Aware  Service Provider must Enforce (not Client)  Common Login Mechanism?  Consumer Privileges  Domain Scope  Access Level and Protected Functions  Observe/Control/Manage split?  Common Layer Function?  Or Generic to all MO Services?  Secure Communications  Responsibility of Underlying Transport Protocol  Technology Dependent  What does SM&C need to pass through to any underlying security layer?