A Design of Risk-Based Security Threat Assessment Process for Fighter-Aircraft Airworthiness Security Certification


KIPS Transactions on Software and Data Engineering, Vol. 8, No. 6, pp. 223-234, Jun. 2019
https://doi.org/10.3745/KTSDE.2019.8.6.223, Full Text:
Keywords: Airworthiness Certification, Cyber Attack, Fighter-Aircraft Software, Security Threat, Risk Assessment, Airworthiness Security Certification Process
Abstract

Cyber ​​attacks are an important factor that determines the victory and defeat of Network-centric wars in which advanced weapon systems are highly interlinked. In addition the increasing dependability on software as its develop as the latest fighter is demanding enhanced security measures for fighter software to Cyber attacks. In this paper, we apply the DO-326A, which is an airworthiness security certification standard, to design a risk-based security threat assessment process by reflecting characteristics and operational environment of fighter aircraft. To do this, we add the following steps in security threat assessment stage of DO-326A's airworthiness security certification process. First, we derive security threats of fighter. And then, we scored the security threat in terms of possibility and impact on the fighter. Finally, we determine the security risk severity.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
H. Kim and D. Kang, "A Design of Risk-Based Security Threat Assessment Process for Fighter-Aircraft Airworthiness Security Certification," KIPS Transactions on Software and Data Engineering, vol. 8, no. 6, pp. 223-234, 2019. DOI: https://doi.org/10.3745/KTSDE.2019.8.6.223.

[ACM Style]
Hyunju Kim and Dongsu Kang. 2019. A Design of Risk-Based Security Threat Assessment Process for Fighter-Aircraft Airworthiness Security Certification. KIPS Transactions on Software and Data Engineering, 8, 6, (2019), 223-234. DOI: https://doi.org/10.3745/KTSDE.2019.8.6.223.