دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: Unabridged نویسندگان: Garik Markarian, Rainer Koelle, Alex Tarter سری: Artech House Intelligence and Information Operations ISBN (شابک) : 9781608070725 ناشر: Artech House Publishers سال نشر: 2011 تعداد صفحات: 360 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 3 مگابایت
در صورت تبدیل فایل کتاب Aviation Security Engineering: A Holistic Approach به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مهندسی امنیت هوانوردی: یک رویکرد کل نگر نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این منبع منحصربهفرد و بهموقع با پر کردن یک شکاف مهم در ادبیات مهندسی هوانوردی، مقدمهای کامل با امنیت سیستم هوانوردی را در اختیار متخصصان قرار میدهد. این به پزشکان امکان میدهد تا چالشهایی را که صنعت با آن مواجه است و نحوه رسیدگی به آنها را درک کنند. خوانندگان تجزیه و تحلیل کاملی از استانداردهای فعلی امنیت هوانوردی ARINC 811، ED-127 و پیش نویس SC-216 دریافت می کنند. این کتاب قدردانی از مجموعه متنوع اعضای صنعت هوانوردی را ارائه می دهد. علاوه بر این، روشهایی را که برای طراحی کنترلهای امنیتی استفاده میشود، ارائه میکند که نه تنها منافع شرکتی فردی ذینفعان را برآورده میکند، بلکه در راستای تامین امنیت کل صنعت نیز کار میکند. این جلد آیندهنگر، حوزههای جدیدی از تحقیقات و تکنیکهای امنیتی هوانوردی را برای حل چالشبرانگیزترین مشکلات امروزی، مانند شناسایی حملات امنیتی و پاسخ، معرفی میکند.
Filling a critical gap in aviation engineering literature, this unique and timely resource provides professionals with a thorough introduction to aviation system security. It enables practitioners to understand the challenges the industry faces and how they are being addressed. Readers get a complete analysis of the current aviation security standards ARINC 811, ED-127 and the draft SC-216. The book offers an appreciation for the diverse collection of members within the aviation industry. Moreover, it provides a detailed treatment of methods used to design security controls that not only meet individual corporate interests of a stakeholder, but also work towards the holistic securing of the entire industry. This forward-looking volume introduces exiting new areas of aviation security research and techniques for solving today's the most challenging problems, such as security attack identification and response.
Aviation Security Engineering: A Holistic Approach Contents PREFACE FOREWORDS HOW TO READ THIS BOOK REFERENCES AND LINKS LEARNING OBJECTIVES AND QUESTIONS Part I: Security and Aviation Chapter 1: Aviation Security Engineering 1.1 INTRODUCTION 1.2 WHAT IS SECURITY? 1.2.1 Security as a State 1.2.2 Security as a Process 1.2.3 Security as a Trade-Off 1.2.4 Security Risk Based Approach and Utility Theory 1.2.5 Summary 1.3 AVIATION—AVIATION SECURITY 1.3.1 Aviation—A Complex Supply Chain 1.3.2 Aviation Security 1.4 AN EMERGING DISCIPLINE 1.4.1 Aviation Security Engineering—An Emerging Discipline 1.4.2 Paradigm Changes 1.4.3 Overt Approach 1.4.4 “Fighting-The-Last-War” Phenomenon 1.5 CONCLUSIONS QUESTIONS References Chapter 2: Security: An Introduction and Tutorial 2.1 INTRODUCTION 2.1.1 An Example 2.2 WHAT IS SECURITY? 2.3 TERMINOLOGY 2.3.1 Asset-Centric Versus Attacker-Centric 2.3.2 Fundamental Concepts and Definitions 2.4 SECURITY RISK MANAGEMENT 2.4.1 Risk Management Cycle 2.4.2 Residual Risk and Risk Appetite 2.4.3 Undertaking Security Risk Management 2.5 CONTROLS AND CONTROL PHILOSOPHIES 2.5.1 Incident Response Cycle 2.6 SECURITY MEETS REALITY—TRUST 2.7 AVIATION SECURITY 2.7.1 Annex 17 2.7.2 The Evolving Nature of Aviation Security 2.7.3 Aviation Information Assets 2.7.4 Who Is In Charge of Aviation Security? 2.8 HOLISTIC SECURITY APPROACH 2.9 RELEVANT STANDARDS 2.9.1 ICAO Annex 17 2.9.2 ARINC Report 811 2.9.3 ED-200 2.9.4 SC-216 2.9.5 NIST SP-800 and ISO 27000 Series 2.10 CONCLUSIONS QUESTIONS References Chapter 3: Aviation as a System: Air Transportation System 3.1 INTRODUCTION 3.2 AVIATION TERMINOLOGY 3.3 HIGH-LEVEL VIEW ON AIR TRANSPORTATION 3.3.1 Transportation Systems 3.3.2 Air Transportation—Multiple Stakeholders and Multiple Objectives 3.3.3 Growth and Challenges 3.4 AIR TRANSPORTATION SYSTEM MODEL 3.4.1 System and Systems Theory 3.4.2 System Terminology 3.4.3 System Model 3.5 SYSTEM-OF-SYSTEMS—AIR TRANSPORTATION SUBSYSTEMS 3.5.1 Airport Subsystem 3.5.2 Aircraft Subsystem—Airspace User Operations 3.5.3 Air Traffic Management/Communication, Navigation, and Surveillance Subsystem 3.5.4 Airspace/Network Subsystem 3.6 PERFORMANCE FRAMEWORK—SECURITY PERFORMANCE 3.7 CONCLUSIONS QUESTIONS References Part II: Where We Stand Today Chapter 4: Traditional Approach to Aviation Security 4.1 INTRODUCTION 4.2 UNDERSTANDING TODAY—BY LOOKING BACK 4.2.1 Historic Overview of Aviation Security 4.2.2 Attack Methods and Threat Conditions 4.3 WHERE ARE WE TODAY—RESPONSES TO DEFINING MOMENTS 4.3.1 Incremental Change 4.3.2 International Coordination 4.3.3 Reactive Nature 4.4 TODAY’S PARADIGM—LAYERED APPROACH—FOCUSON PREVENTION 4.4.1 Layered Security 4.4.2 Example Approach 4.4.3 Today’s Approach and Focus 4.4.4 A Growing Concern—Air Cargo 4.4.5 Summary 4.5 LESSONS LEARNED FROM 9/11—PARADIGM SHIFT—PREVENTION CAN FAIL 4.6 EMERGING CONCERNS 4.6.1 Attacks Against Airports 4.6.2 Attacks Against CNS Infrastructures 4.6.3 The Next Challenge—Cyber Security 4.7 CONCLUSIONS QUESTIONS References Chapter 5: Aviation Regulations and Standards 5.1 INTRODUCTION 5.2 AVIATION AND REGULATION 5.2.1 Total Aviation System 5.2.2 Principles of Administrative Law—Laws and Regulation 5.3 INTERNATIONAL AIR LAWAND NATIONAL REGULATION 5.3.1 Chicago Convention—Source of International Air Law 5.3.2 Principles of Air Law 5.3.3 National Regulation 5.3.4 Summary 5.4 INTERFACE BETWEENREGULATION AND INDUSTRY STANDARDS 5.4.1 Hard Law and Soft Law 5.4.2 Industry Standards 5.4.3 System Engineering Approach to Certification and Operation 5.5 NOTABLE RULES AND ACTORS 5.5.1 International Level—ICAO—SARPs 5.5.2 Regional Level—European Union 5.5.3 Regional/National Level—United States of America 5.5.4 Standards Level—Use Case 5.6 NEW CHALLENGES—INDUSTRY STANDARDS 5.6.1 Aviation Undergoing a Transformation 5.6.2 Industry Responses to Emerging Security Needs 5.7 CONCLUSIONS QUESTIONS References Chapter 6: Implementing Security Controls 6.1 INTRODUCTION 6.2 IMPLEMENTING SECURITY VERSUS SAFETY 6.3 SECURITY CERTIFICATION 6.4 A LIFECYCLE APPROACH TO SECURITY 6.5 EFFECTIVE INCIDENT RESPONSE 6.6 GROUNDWORTHINESS 6.7 FORMALIZED TRUST MODELS 6.8 SECURITY AUTOMATION 6.9 CONCLUSIONS QUESTIONS References Part III: Moving Forward Chapter 7: Reaction to Threats: Time-Critical Decision-Making and Natural Decision-Making 7.1 INTRODUCTION 7.2 DECISION-MAKING—TCDM VERSUS DM 7.3 NDM AND RPD—SOLVING KNOWN PROBLEMS 7.4 ISSUES AND LIMITATIONS 7.5 OPERATIONAL ISSUES 7.6 SOLUTION IN AN AERONAUTICAL ENVIRONMENT 7.7 SUMMARY AND CONCLUSIONS QUESTIONS References Chapter 8: Aircraft Security 8.1 INTRODUCTION 8.2 THE PROBLEM OF AIRCRAFT SECURITY 8.3 GROUND ATTACKS 8.4 THE USE OF IMAGERY 8.5 PREVENTING ATTACKS BY CREW 8.6 PREVENTING PASSENGER ATTACKS 8.7 CONCLUSIONS QUESTIONS References Chapter 9: Airport Security 9.1 INTRODUCTION 9.2 CURRENT CONCERNS 9.3 CURRENT APPROACHES 9.4 SOLUTIONS 9.4.1 Overview 9.4.2 Landside—Terminal Security 9.4.3 Behavior Assessment 9.4.4 Profiles 9.4.5 Screening 9.5 AIRSIDE—SUPPLY CHAIN CONSIDERATIONS 9.6 AIRSIDE OPERATIONS CONSIDERATIONS 9.7 CONCLUSIONS QUESTIONS References Chapter 10: Communication, Navigation, and Surveillance System 10.1 INTRODUCTION 10.2 COMMUNICATION, NAVIGATION, AND SURVEILLANCE SUBSYSTEMS 10.2.1 Navigation 10.2.2 Surveillance 10.2.3 Communication 10.2.4 Aeronautical Telecommunication Network 10.3 FUTURE OF CNS 10.3.1 SESAR/NextGen—SWIM System—Wide Information Management 10.3.2 Summary 10.4 ATTACK SPACES 10.4.1 Physical Attacks 10.4.2 Electromagnetic Attacks 10.4.3 Data-Level Attacks 10.5 THE CNS SYSTEM IN RESPONSE TO AN ATTACK 10.5.1 SWIM Integration 10.5.2 Transponder Utilization 10.5.3 Research Projects 10.6 CONCLUSIONS QUESTIONS References Chapter 11: Airspace Security 11.1 INTRODUCTION 11.2 STATE AUTHORITY—HOMELAND SECURITY AND NATIONALDEFENSE 11.2.1 Sovereignty—Aviation Security 11.2.2 Homeland Security and National Defense 11.2.3 Summary 11.3 PROBLEM—SECURING THE AIRSPACE 11.4 INTERCEPTION 11.5 GROUND INTERVENTIONS 11.6 RECENT RESEARCH 11.7 CONCLUSIONS QUESTIONS References Chapter 12: Conclusions: Holistic Approach to Aviation Security 12.1 INTRODUCTION 12.2 STEPPING STONES 12.2.1 Part I—Security and Aviation 12.2.2 Part II—Where We Stand Today 12.2.3 Part III—Moving Forward 12.3 AVIATION SECURITY ENGINEERING 12.3.1 Paradigm Shift—Holistic Approach 12.3.2 Engineering Practical Solutions 12.4 FINAL WORDS—ARE WE GOING IN THE RIGHT DIRECTION? ABOUT THE AUTHORS Index