Cover image for Aviation Security Engineering : A Holistic Approach.
Aviation Security Engineering : A Holistic Approach.
Title:
Aviation Security Engineering : A Holistic Approach.
Author:
Kölle, Rainer.
ISBN:
9781608070732
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (360 pages)
Contents:
Aviation Security Engineering: A Holistic Approach -- Contents -- PREFACE -- FOREWORDS -- HOW TO READ THIS BOOK -- REFERENCES AND LINKS -- LEARNING OBJECTIVES AND QUESTIONS -- Part I: Security and Aviation -- Chapter 1: Aviation Security Engineering -- 1.1 INTRODUCTION -- 1.2 WHAT IS SECURITY? -- 1.2.1 Security as a State -- 1.2.2 Security as a Process -- 1.2.3 Security as a Trade-Off -- 1.2.4 Security Risk Based Approach and Utility Theory -- 1.2.5 Summary -- 1.3 AVIATION-AVIATION SECURITY -- 1.3.1 Aviation-A Complex Supply Chain -- 1.3.2 Aviation Security -- 1.4 AN EMERGING DISCIPLINE -- 1.4.1 Aviation Security Engineering-An Emerging Discipline -- 1.4.2 Paradigm Changes -- 1.4.3 Overt Approach -- 1.4.4 "Fighting-The-Last-War" Phenomenon -- 1.5 CONCLUSIONS -- QUESTIONS -- References -- Chapter 2: Security: An Introduction and Tutorial -- 2.1 INTRODUCTION -- 2.1.1 An Example -- 2.2 WHAT IS SECURITY? -- 2.3 TERMINOLOGY -- 2.3.1 Asset-Centric Versus Attacker-Centric -- 2.3.2 Fundamental Concepts and Definitions -- 2.4 SECURITY RISK MANAGEMENT -- 2.4.1 Risk Management Cycle -- 2.4.2 Residual Risk and Risk Appetite -- 2.4.3 Undertaking Security Risk Management -- 2.5 CONTROLS AND CONTROL PHILOSOPHIES -- 2.5.1 Incident Response Cycle -- 2.6 SECURITY MEETS REALITY-TRUST -- 2.7 AVIATION SECURITY -- 2.7.1 Annex 17 -- 2.7.2 The Evolving Nature of Aviation Security -- 2.7.3 Aviation Information Assets -- 2.7.4 Who Is In Charge of Aviation Security? -- 2.8 HOLISTIC SECURITY APPROACH -- 2.9 RELEVANT STANDARDS -- 2.9.1 ICAO Annex 17 -- 2.9.2 ARINC Report 811 -- 2.9.3 ED-200 -- 2.9.4 SC-216 -- 2.9.5 NIST SP-800 and ISO 27000 Series -- 2.10 CONCLUSIONS -- QUESTIONS -- References -- Chapter 3: Aviation as a System: Air Transportation System -- 3.1 INTRODUCTION -- 3.2 AVIATION TERMINOLOGY -- 3.3 HIGH-LEVEL VIEW ON AIR TRANSPORTATION.

3.3.1 Transportation Systems -- 3.3.2 Air Transportation-Multiple Stakeholders and Multiple Objectives -- 3.3.3 Growth and Challenges -- 3.4 AIR TRANSPORTATION SYSTEM MODEL -- 3.4.1 System and Systems Theory -- 3.4.2 System Terminology -- 3.4.3 System Model -- 3.5 SYSTEM-OF-SYSTEMS-AIR TRANSPORTATION SUBSYSTEMS -- 3.5.1 Airport Subsystem -- 3.5.2 Aircraft Subsystem-Airspace User Operations -- 3.5.3 Air Traffic Management/Communication, Navigation, and Surveillance Subsystem -- 3.5.4 Airspace/Network Subsystem -- 3.6 PERFORMANCE FRAMEWORK-SECURITY PERFORMANCE -- 3.7 CONCLUSIONS -- QUESTIONS -- References -- Part II: Where We Stand Today -- Chapter 4: Traditional Approach to Aviation Security -- 4.1 INTRODUCTION -- 4.2 UNDERSTANDING TODAY-BY LOOKING BACK -- 4.2.1 Historic Overview of Aviation Security -- 4.2.2 Attack Methods and Threat Conditions -- 4.3 WHERE ARE WE TODAY-RESPONSES TO DEFINING MOMENTS -- 4.3.1 Incremental Change -- 4.3.2 International Coordination -- 4.3.3 Reactive Nature -- 4.4 TODAY'S PARADIGM-LAYERED APPROACH-FOCUSON PREVENTION -- 4.4.1 Layered Security -- 4.4.2 Example Approach -- 4.4.3 Today's Approach and Focus -- 4.4.4 A Growing Concern-Air Cargo -- 4.4.5 Summary -- 4.5 LESSONS LEARNED FROM 9/11-PARADIGM SHIFT-PREVENTION CAN FAIL -- 4.6 EMERGING CONCERNS -- 4.6.1 Attacks Against Airports -- 4.6.2 Attacks Against CNS Infrastructures -- 4.6.3 The Next Challenge-Cyber Security -- 4.7 CONCLUSIONS -- QUESTIONS -- References -- Chapter 5: Aviation Regulations and Standards -- 5.1 INTRODUCTION -- 5.2 AVIATION AND REGULATION -- 5.2.1 Total Aviation System -- 5.2.2 Principles of Administrative Law-Laws and Regulation -- 5.3 INTERNATIONAL AIR LAWAND NATIONAL REGULATION -- 5.3.1 Chicago Convention-Source of International Air Law -- 5.3.2 Principles of Air Law -- 5.3.3 National Regulation -- 5.3.4 Summary.

5.4 INTERFACE BETWEENREGULATION AND INDUSTRY STANDARDS -- 5.4.1 Hard Law and Soft Law -- 5.4.2 Industry Standards -- 5.4.3 System Engineering Approach to Certification and Operation -- 5.5 NOTABLE RULES AND ACTORS -- 5.5.1 International Level-ICAO-SARPs -- 5.5.2 Regional Level-European Union -- 5.5.3 Regional/National Level-United States of America -- 5.5.4 Standards Level-Use Case -- 5.6 NEW CHALLENGES-INDUSTRY STANDARDS -- 5.6.1 Aviation Undergoing a Transformation -- 5.6.2 Industry Responses to Emerging Security Needs -- 5.7 CONCLUSIONS -- QUESTIONS -- References -- Chapter 6: Implementing Security Controls -- 6.1 INTRODUCTION -- 6.2 IMPLEMENTING SECURITY VERSUS SAFETY -- 6.3 SECURITY CERTIFICATION -- 6.4 A LIFECYCLE APPROACH TO SECURITY -- 6.5 EFFECTIVE INCIDENT RESPONSE -- 6.6 GROUNDWORTHINESS -- 6.7 FORMALIZED TRUST MODELS -- 6.8 SECURITY AUTOMATION -- 6.9 CONCLUSIONS -- QUESTIONS -- References -- Part III: Moving Forward -- Chapter 7: Reaction to Threats: Time-Critical Decision-Making and Natural Decision-Making -- 7.1 INTRODUCTION -- 7.2 DECISION-MAKING-TCDM VERSUS DM -- 7.3 NDM AND RPD-SOLVING KNOWN PROBLEMS -- 7.4 ISSUES AND LIMITATIONS -- 7.5 OPERATIONAL ISSUES -- 7.6 SOLUTION IN AN AERONAUTICAL ENVIRONMENT -- 7.7 SUMMARY AND CONCLUSIONS -- QUESTIONS -- References -- Chapter 8: Aircraft Security -- 8.1 INTRODUCTION -- 8.2 THE PROBLEM OF AIRCRAFT SECURITY -- 8.3 GROUND ATTACKS -- 8.4 THE USE OF IMAGERY -- 8.5 PREVENTING ATTACKS BY CREW -- 8.6 PREVENTING PASSENGER ATTACKS -- 8.7 CONCLUSIONS -- QUESTIONS -- References -- Chapter 9: Airport Security -- 9.1 INTRODUCTION -- 9.2 CURRENT CONCERNS -- 9.3 CURRENT APPROACHES -- 9.4 SOLUTIONS -- 9.4.1 Overview -- 9.4.2 Landside-Terminal Security -- 9.4.3 Behavior Assessment -- 9.4.4 Profiles -- 9.4.5 Screening -- 9.5 AIRSIDE-SUPPLY CHAIN CONSIDERATIONS -- 9.6 AIRSIDE OPERATIONS CONSIDERATIONS.

9.7 CONCLUSIONS -- QUESTIONS -- References -- Chapter 10: Communication, Navigation, and Surveillance System -- 10.1 INTRODUCTION -- 10.2 COMMUNICATION, NAVIGATION, AND SURVEILLANCE SUBSYSTEMS -- 10.2.1 Navigation -- 10.2.2 Surveillance -- 10.2.3 Communication -- 10.2.4 Aeronautical Telecommunication Network -- 10.3 FUTURE OF CNS -- 10.3.1 SESAR/NextGen-SWIM System-Wide Information Management -- 10.3.2 Summary -- 10.4 ATTACK SPACES -- 10.4.1 Physical Attacks -- 10.4.2 Electromagnetic Attacks -- 10.4.3 Data-Level Attacks -- 10.5 THE CNS SYSTEM IN RESPONSE TO AN ATTACK -- 10.5.1 SWIM Integration -- 10.5.2 Transponder Utilization -- 10.5.3 Research Projects -- 10.6 CONCLUSIONS -- QUESTIONS -- References -- Chapter 11: Airspace Security -- 11.1 INTRODUCTION -- 11.2 STATE AUTHORITY-HOMELAND SECURITY AND NATIONALDEFENSE -- 11.2.1 Sovereignty-Aviation Security -- 11.2.2 Homeland Security and National Defense -- 11.2.3 Summary -- 11.3 PROBLEM-SECURING THE AIRSPACE -- 11.4 INTERCEPTION -- 11.5 GROUND INTERVENTIONS -- 11.6 RECENT RESEARCH -- 11.7 CONCLUSIONS -- QUESTIONS -- References -- Chapter 12: Conclusions: Holistic Approach to Aviation Security -- 12.1 INTRODUCTION -- 12.2 STEPPING STONES -- 12.2.1 Part I-Security and Aviation -- 12.2.2 Part II-Where We Stand Today -- 12.2.3 Part III-Moving Forward -- 12.3 AVIATION SECURITY ENGINEERING -- 12.3.1 Paradigm Shift-Holistic Approach -- 12.3.2 Engineering Practical Solutions -- 12.4 FINAL WORDS-ARE WE GOING IN THE RIGHT DIRECTION? -- ABOUT THE AUTHORS -- Index.
Abstract:
Filling a critical gap in aviation engineering literature, this unique and timely resource provides you with a thorough introduction to aviation system security. It enables you to understand the challenges the industry faces and how they are being addressed. You get a complete analysis of the current aviation security standards ARINC 811, ED-127 and the draft SC-216. The book offers you an appreciation for the diverse collection of members within the aviation industry. Moreover, you find a detailed treatment of methods used to design security controls that not only meet individual corporate interests of a stakeholder, but also work towards the holistic securing of the entire industry. This forward-looking volume introduces exiting new areas of aviation security research and techniques for solving today's the most challenging problems, such as security attack identification and response.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: