A Cost Effective High Assurance Layered Solution for MLS Test Training and LVC
|
|
- Isaac Nelson
- 6 years ago
- Views:
Transcription
1 A Cost Effective High Assurance Layered Solution for MLS Test Training and LVC 2014 Layered Assurance Workshop 8-Dec, 2014 James Marek 2014 Rockwell 2014 Collins. Rockwell Collins.
2 Introduction Solution space to address modern test and training and LVC interoperability issues is an ideal application of layered assurance Significant security-related scope as well as safety issues High assurance/robustness is critical to address these issues Cost and schedule viability are a serious consideration This presentation describes a solution which is based on the principles of layered assurance and composability at multiple levels in the architecture All of the elements described herein have completed their individual certification efforts (e.g. NSA Type 1, Common Criteria, etc.) The system-level solution is rapidly maturing and is in the process of completing accreditation as part of its fielding 2
3 Overview of Problem Space Testing Modern military ranges testing platforms that can each host and share information at a wide range of classification / caveat / compartment levels Training 3rd, 4th, and 5th gen platforms & UAS, Weapon/Threat sims with different security levels and requirements for exchange Coalition partners Current environment results in reduced training effectiveness Common Problem Need for security enforcing MLS information exchange solution Enables effective/efficient testing and training to be performed Affordably control the flow of timely information exchange Low impact scalable solution that supports System-high (at a single-level) through certified MLS operation 3
4 Elements of the solution Modular building blocks for layered solution Composibility at the component and system levels Mobile/Airborne based elements MLS Participant Interface Module (PIM) Multi-Channel MLS NSA Type 1 End Cryptographic Unit (ECU) High-Throughput Data-Link (HT-DL) High Accuracy Time Space Position Information (HA-TSPI) User Interface (UI) with high capacity Data Recorder Device (UI-DRD) Ground based elements Multi-Channel MLS Mission/Debriefing Room Cross Domain Guard (MMMDR- CDG) Multi-Channel MLS NSA Type 1 End Cryptographic Unit (ECU) Data Link Controller (DLC) System Controller Workstation (SCW) Mission/Debrief Room Workstation (MDRW) Portable Test Set (PTS) Remote Ground System (RGS) Range Gateways 4
5 MLS Participant Interface Module (PIM) Multi-Level MILS processing environment Configurable at boot time Works synergistically with ECU & MMMDR-CDG Configurable interfaces Fibre Channel, 1553, Ethernet, Serial CC EAL6+ MILS RTOS Hosts Multiple SL enclaves & CDG TS-U info processing, MAC, & flow control System-high (single or multiple channels) & MLS operation Modular NSA-evaluated CDG Flexible user generated rules e.g. C2, BIT, Status, RTKN NSA-evaluated Labeler ( L ) Bind & check packet labels Composed security policy SK + FE + Labeler 1.5 x 3.5 x 6.4 package for easy embedment Demonstrating that MLS can be packaged in a constrained pkg 5
6 Multi-Channel MLS NSA Type 1 End Cryptographic Unit (ECU) MILS-based multi-channel MLS ECU 4 red traffic channels (TS-U), 1 Ctl (U) 3 black traffic channels (U) MILS SK hosts KM & control IP/Ethernet I/O abstracts encryption from red & black sides Datalink-agnostic encryption Data-In-Transit encryption for off board communication Data-At-Rest encryption for on board storage of mission data Classification level packet label checking on each channel Classification levels configurable based on boot load Key and Algorithm agility per channel Leverages NSA Type 1 certified Janus cryptographic engine 1.5 x 3.5 x 6.4 package 6
7 Multi-Channel MLS Mission/Debriefing Room Cross Domain Guard (MMMDR-CDG) Based on PIM processor Significant SW reuse Scalable, rack mounted version of the PIM Cfg d to filter for mission & exercise debriefing Currently on class level / caveat and mission # Open/Modularity supports direct connection of PIM and MMMDR-CDG Ease system integration, testing, and debug Isolation from ECU s, datalinks, infrastructure Note: ECU s can also be directly connected Isolation from the datalinks, infrastructure 7
8 Participant Sub-System 8
9 Ground Control System Guard ECU SCW DataLink UI-DRD UI-DRD UI-DRD Mission/Debrief Mission/Debrief Rm(s) Room 9
10 Typical Application Virt1 Virt2 Const 10
11 Summary Presented solution for modern test/training/lvc MLS needs Applies layering and abstraction Focus on modularity and composability MILS building blocks to reduce C&A cost, schedule, and risk Enables cost effective implementation for range of applications Supports several modes of operation as needed by users (e.g. system-high, MSL, MLS) Not simply a proposed concept but is Founded on Technology Readiness Level (TRL) 6+ certified products and technologies Currently finishing accreditation through deployment for both domestic and international applications to solve MLS test, training, and LVC challenges 11
12 Backup These elements are included in the paper and have a limited role in the layered assurance. However, due to time constraints they are not covered in the main brief 2014 Rockwell 2014 Collins. Rockwell Collins. 12
13 Participant Elements 2014 Rockwell 2014 Collins. Rockwell Collins.
14 High-Throughput Data-Link (HT-DL) Employs uplink, downlink, and peer-peer crosslink services with packet rates roughly 4 to 5 times greater than legacy podbased range instrumentation Relay routes are self-forming, out to 4 hops Manual routing can be managed between user-selected nodes Datalink range for a single-hop route is 100 nmi air-air, and 130 nmi air-ground. 6.6 lbs. is miniaturized to roughly half the weight of existing equipment Partitioned into a Transceiver Modem (TRM) module (6.6 ) and a Power Amplifier (PA) module (11 ), each having a 3.5 x 1.4 cross section Selectable to use built-in Type 3 encryption Type 1 encryption is provided external to the datalink to enable more modularity and support alternate datalinks easy datalink upgrade without NSA recertification
15 High Accuracy Time Space Position Information (HA-TSPI) Critical element of any test/training system Feeds testing exercises as well as on-board weapon and threat simulations Enhanced system modularity and composibility due to independent isolated TSPI function Leverages the Rockwell Collins high accuracy miniature Selective Availability Anti-Spoofing Module (SAASM) GPS Includes state-of-the-art Inertial Measurement Unit (IMU) technology Tightly coupled together to provide: Real-Time Horizontal (x, y) and Vertical (z) position accuracy of 0.5 meters RMS Real-Time Horizontal (x, y) and Vertical (z) velocity accuracy of 0.03 m/sec RMS Real-Time Attitude accuracy of 0.1 degrees RMS 15
16 User Interface (UI) with high capacity Data Recorder Device (UI-DRD) Modular User Interface to support: Remote key loading and zeroization for encryption and GPS Hosts user removable solid state storage media for mission data recording Storage media is also able to store configuration data and files Supports over-the-air configuration/loading option 16
17 Ground Elements 2014 Rockwell 2014 Collins. Rockwell Collins.
18 Data Link Controller (DLC) Commercial computing platform Hosting management software for Ground-based and participant package datalink modules Datalink network Information flow to and from ground and airborne nodes Hosts an EAL4 certified OS and conforms to DISA STIG guidelines for cyber security 18
19 System Controller Workstation (SCW) Commercial computing platform Hosting mission and participant management software Supports configuration for ground and airborne elements, as well as key distribution Hosts an EAL4 certified OS and conforms to DISA STIG guidelines for cyber security Allocated a port on the MMMDR-CDG which filters range traffic to and from the SCW Operates in a blind administration mode Not typically accessing range participant traffic, but primarily focused on command and control functions that manage the range assets participating in exercises Plays a part in the layered security architecture Managing encryption keys Cfg and control functions for airborne/mobile/ground elements 19
20 Mission/Debrief Room Workstation (MDRW) Commercial computing platform Hosting mission management and debrief application software Hosts an EAL4 certified OS and conforms to DISA STIG guidelines for cyber security Allocated a port on the MMMDR-CDG which filters range traffic (live, recorded playback or a hybrid) Functionality reuse from the SCW Uses isolation and independent configuration & management with respect to the other elements of the system for added layer of security 20
21 Portable Test Set (PTS) Man-portable miniature ground sub-system Capable of being carried around the range to support wired remote operations Also supports configuration, test, and debug of airborne equipment spread across the range locale Each PTS includes a ruggedized laptop computer that hosts an EAL4 certified OS and conforms to DISA STIG guidelines for cyber security Leverages some common software from the SCW and MDRW 21
22 Remote Ground System (RGS) Includes Datalink Optional weather sensor Ability to remotely power manage the RGS elements One or more RGS datalinks are used to provide area coverage (diversity) for the ground-based DLC (Data Link Controller) They can also support extended range for airborne platforms through relay functionality The weather sensor augments accuracy when operating an RGS in a GPS-denied mode 22
23 Range Gateways A variety of flexible computing and networking equipment and associated protocol translation and formatting software & firmware are also key elements of the range system to enable inter/intra-range operability and bridging to legacy systems 23
SESSION G.1 CONVERGING LIVE AND VIRTUAL ARCHITECTURES FOR TRAINING, TEST AND EVALUATION
SESSION G.1 CONVERGING LIVE AND VIRTUAL ARCHITECTURES FOR TRAINING, TEST AND EVALUATION Common Open Architecture for Test and Training Airborne Instrumentation Packages Presenter: Rob Scott OBJECTIVE Compare
More informationTacNet Tactical Radio (TTR) Overview
TacNet Tactical Radio (TTR) Overview 1 Topics Data Link Solutions Overview Why Small Form Factors Advantages of Small Form Factors Key Performance Characteristics Small Form Factor Interoperability Ease
More informationInmarsat Global Xpress. Global, Mobile, Trusted.
Inmarsat Global Xpress Global, Mobile, Trusted. The New Standard in Mobile Satellite Communications Global Xpress Changes Everything: Worldwide wideband coverage Seamless mobile roaming Interoperable with
More informationA Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction
A Data-Centric Approach for Modular Assurance Gabriela F. Ciocarlie, Heidi Schubert and Rose Wahlin Real-Time Innovations, Inc. {gabriela, heidi, rose}@rti.com Abstract. A mixed-criticality system is one
More informationThe MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems
The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems Kevin Buesing Objective Interface Systems Field Applications Engineer kevin.buesing@ois.com Jeff Chilton Objective
More informationMILS Multiple Independent Levels of Security. Carol Taylor & Jim Alves-Foss University of Idaho Moscow, Idaho
MILS Multiple Independent Levels of Security Carol Taylor & Jim Alves-Foss University of Idaho Moscow, Idaho United states December 8, 2005 Taylor, ACSAC Presentation 2 Outline Introduction and Motivation
More informationMILS Middleware: High Assurance Security for Real-time, Distributed Systems
2001 Objective Interface Systems, Inc. MILS Middleware: High Assurance Security for Real-time, Distributed Systems Bill Beckwith bill.beckwith@ois.com Objective Interface Systems, Inc. 13873 Park Center
More informationQuicker response through increased collaboration
Quicker response through increased collaboration www.chemringts.com No two incidents are the same Yet there is one certainty; lives are saved when first responders and security organisations get the right
More informationMultiple Independent Layers of Security (MILS) Network Subsystem Protection Profile (MNSPP) An Approach to High Assurance Networking Rationale
Multiple Independent Layers of Security (MILS) Subsystem Protection Profile (MNSPP) An Approach to High Assurance ing Rationale 1 2008 Wind River Systems, Inc. The MILS Subsystem (MNS) is A class of subsystem
More informationData-Centric Architecture for Space Systems
Data-Centric Architecture for Space Systems 3 rd Annual Workshop on Flight Software, Nov 5, 2009 The Real-Time Middleware Experts Rajive Joshi, Ph.D. Real-Time Innovations Our goals are the same but not
More informationMLS for Tactical Soldier, Sensor and Munitions Networks September 10, 2003
MLS for Tactical Soldier, Sensor and Munitions Networks September 10, 2003 2 Outline 0 Purpose / Background 0 Statement of the Challenge 0 Additional Security Discussion 0 Emerging Communication Network
More informationInmarsat Global Xpress Global, Mobile, Trusted. U.S. Government > Services > Global Xpress
Inmarsat Global Xpress Global, Mobile, Trusted. U.S. Government > Services > Global Xpress The New Standard in Mobile Satellite Communications As a long-trusted partner of the U.S. government sector, we
More informationIntegrated C4isr and Cyber Solutions
Integrated C4isr and Cyber Solutions When Performance Matters L3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a
More informationOver 70% of servers within a data center are not connected to Fibre Channel SANs for any of the following reasons:
Overview The provides modular multi-protocol SAN designs with increased scalability, stability and ROI on storage infrastructure. Over 70% of servers within a data center are not connected to Fibre Channel
More informationFrom Terminals to Teleports to All the Tools in Between. Aerospace Broadcast Government Infrastructure. datapath.com
From Terminals to Teleports to All the Tools in Between Aerospace Broadcast Government Infrastructure datapath.com High Definition Communications in Even the Most Remote Locations For operations in remote,
More informationThe Perfect Storm Cyber RDT&E
The Perfect Storm Cyber RDT&E NAVAIR Public Release 2015-87 Approved for public release; distribution unlimited Presented to: ITEA Cyber Workshop 25 February 2015 Presented by: John Ross NAVAIR 5.4H Cyberwarfare
More informationHigh Assurance Platform (HAP) High Assurance Challenges. Rob Dobry Trusted Computing NSA Commercial Solutions Center 04 & 05 August 2009
High Assurance Platform (HAP) High Assurance Challenges Rob Dobry Trusted Computing NSA Commercial Solutions Center 04 & 05 August 2009 What is HAP? HAP is being developed to provide users with two primary
More informationSecuring the End Node in a Cloud World
Securing the End Node in a Cloud World Approved for Public Release: RY-11-0022, 88 ABW-11-0375 Lt Col Ken Edge, PhD Electronic & Net-Centric Warfare Division Air Force Research Laboratory Of Clouds and
More informationThe ZigBee Architecture An Introduction
The ZigBee Architecture An Introduction May 18 th, 2011 Session I Introduction & Architecture I, 1 Contents Outline 1. Architectural Overview 2. Market Positioning 3. Convergence 4. Summary 2 ch.1: IEEE802.15.4
More informationJOINT MISSION ENVIRONMENT TEST CAPABILITY (JMETC)
JOINT MISSION ENVIRONMENT TEST CAPABILITY (JMETC) Cyber T&E Initiatives AJ Pathmanathan JMETC Deputy PM for Engineering NCR Technical Director November 14, 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE
More informationExploring the ISA100.11a Standard. Exploring the ISA100.11a Standard. William (Bill) Ayers America s OneWireless Consultant.
Exploring the ISA100.11a Standard March 2012 William (Bill) Ayers America s OneWireless Consultant Exploring the ISA100.11a Standard WHY Standards World Leader SolutionsFocused Greatest Flexibility International
More informationHose-McCann Communications
Hose-McCann Communications THE NEXT GENERATION COMMUNICATION SYSTEM Hose-McCann Communications is a leader in marine communication products. From our beginnings in 1923, pioneering Sound Powered Telephone
More informationBringing Core-Level Data Protection Solutions to the Tactical Field. January 2018
Bringing Core-Level Data Protection Solutions to the Tactical Field January 2018 1 Core-level Security Extended to the Tactical Field Trusted, U.S. based source for tactical cyber security solutions from
More informationInmarsat Global Xpress Global. Mobile. Trusted. U.S. Government > Services > Global Xpress
Inmarsat Global Xpress Global. Mobile. Trusted. U.S. Government > Services > Global Xpress Delivering seamless connectivity worldwide Through Global Xpress, the first and only end-to-end high-throughput
More informationMulti-Layered Security Framework for Metro-Scale Wi-Fi Networks
Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the
More informationOpen Standards in Aircraft Instrumentation
Open Standards in Aircraft Instrumentation Robert Hill Eglin AFB, FL 96 th Test Wing 96 th Range Group 896 th Test Support Squadron Outline Background Challenges Why Standards? What Standards are Needed?
More informationCato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief
Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based
More informationA Standards-Based Integration Platform for Reconfigurable Unmanned Aircraft Systems
June 2011 A Standards-Based Integration Platform for Reconfigurable Unmanned Aircraft Systems Edwin de Jong, Ph.D. US HEADQUARTERS Real-Time Innovations, Inc. 385 Moffett Park Drive Sunnyvale, CA 94089
More informationEasy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications
Infineon Network Use Case Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications Providing Infineon customers with an easy path to integrating TPM support into their products and systems
More informationPassTorrent. Pass your actual test with our latest and valid practice torrent at once
PassTorrent http://www.passtorrent.com Pass your actual test with our latest and valid practice torrent at once Exam : 352-011 Title : Cisco Certified Design Expert Practical Exam Vendor : Cisco Version
More informationFederated Mission Networking
Federated Mission Networking Learning & Applying the Lessons John Palfreyman, IBM V4; 20 Mar 14 Agenda Future Mission Networking - Context Effective Coalitions through OPEN Integration Save money through
More informationUsing the Network to Optimize a Virtualized Data Center
Using the Network to Optimize a Virtualized Data Center Contents Section I: Introduction The Rise of Virtual Computing. 1 Section II: The Role of the Network. 3 Section III: Network Requirements of the
More informationSYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS
SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS David Murotake, (SCA Technica, Inc. Nashua NH, USA; david.murotak@scatechnica.com) Antonio Martin (SCA Technica, Inc., Nashua NH, USA;
More informationApplying MILS to multicore avionics systems
Applying MILS to multicore avionics systems Eur Ing Paul Parkinson FIET Principal Systems Architect, A&D EuroMILS Workshop, Prague, 19 th January 2016 2016 Wind River. All Rights Reserved. Agenda A Brief
More informationRapidly deployable secure cellular comms
Rapidly deployable secure cellular comms Delivering global protection CAPABILITY OVERVIEW SMARTLINK is a rapidly deployable, scalable, low size, weight and power (SWAP) cellular network-in-a-box for demanding
More informationUBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT
2018 Viasat White Paper August 27, 2018 UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT With Hybrid Adaptive Networking By Craig Miller Vice President, Chief Technical Officer
More informationINTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES
INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES CASE STUDY Application of High-Assurance Network Encryption Sector : Use Case: Solution: CCTV security HD video Layer 2 network architecture A Major
More informationBeyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development
Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat
More informationNational Policy Governing the Use of High Assurance Internet Protocol Encryptor (HAIPE) Products
Committee on National Security Systems CNSS Policy No. 19 February 2007 National Policy Governing the Use of High Assurance Internet Protocol Encryptor (HAIPE) Products This document prescribes minimum
More informationGSAW Information Assurance in Government Space Systems: From Art to Engineering
GSAW 2006 Information Assurance in Government Space Systems: From Art to Engineering Charles Lavine The Aerospace Corporation 310-336-1595 lavine@aero.org 1 Toward the Global Information Grid Toward the
More informationCato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN
Cato Cloud Software-defined and Cloud-based Secure Enterprise Network Solution Brief NETWORK + SECURITY IS SIMPLE AGAIN Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The
More informationMANAGING THE COMPLEXITY.
AS A SERVICE MANAGING THE COMPLEXITY. HOW WILL YOU SIMPLIFY ESN MIGRATION? Control room IT solutions play a vital role in incident management. Technologies such as Integrated Communications Control Systems
More informationSecuring the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.
Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change
More informationINTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK
INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK CASE STUDY Application of High-Assurance Network Encryption Sector: Use Case: Solution: Government CCTV security Real-time HD video transmission across Layer
More informationSatellite Technology Trends - A perspective from Intelsat
Satellite Technology Trends - A perspective from Intelsat Gonzalo de Dios ITU International Satellite Symposium 2017 May 29, 2017 2 Building Blocks of Transformation of the Satellite Industry - A Renaissance
More informationC UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14
Supreme Allied Commander Transformation C UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14 Major Jean-Claude Deskeuvre, BEL A CUAxS PM 5-Feb-15 1 Outline Reminder of the objectives
More informationHAMES Review at SRI, 7 October 2008 partly based on Layered Assurance Workshop 13, 14 August 2008, BWI Hilton and based on Open Group, 23 July 2008,
HAMES Review at SRI, 7 October 2008 partly based on Layered Assurance Workshop 13, 14 August 2008, BWI Hilton and based on Open Group, 23 July 2008, Chicago Component Security Integration John Rushby Computer
More informationSecuring your Virtualized Datacenter. Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008
Securing your Virtualized Datacenter Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008 Agenda VMware Virtualization Technology How Virtualization Affects Datacenter Security Keys to
More informationUnderstanding Data Link Gateway Challenges
Understanding Data Link Gateway Challenges TDL Summit November 2018 Introduction Technology improvements allow new technology radios to be deployed in shorter periods of time than past history Gateway
More informationBridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang
Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang University of Wisconsin - Madison 1 Wireless Access in Vehicles Wireless network in public vehicles use existing infrastructure
More informationTechnical Brief Distributed Trusted Computing
Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,
More informationRetrofitting Ground Systems to improve Cyber Security
Retrofitting Ground Systems to improve Cyber Security Michael Worden Security Engineer 25 February 2014 Copyright 2014 Raytheon Company. Published by The Aerospace Corporation with permission.. Customer
More informationThe Open Application Platform for Secure Elements.
The Open Application Platform for Secure Elements. Java Card enables secure elements, such as smart cards and other tamper-resistant security chips, to host applications, called applets, which employ Java
More informationKPIT S Connected Vehicle Practice
KPIT S Connected Vehicle Practice Vehicle Telematics Vehicle-to-Anything (V2X) Cybersecurity With an intent to shape up the futuristic Internet-of-Vehicles era, KPIT offers Vehicle-to-anything (V2X) solutions
More informationARC VIEW. Leveraging New Automation Approaches Across the Plant Lifecycle. Keywords. Summary. By Larry O Brien
ARC VIEW JUNE 22, 2017 Leveraging New Automation Approaches Across the Plant Lifecycle By Larry O Brien Keywords Operational Excellence, Cloud, Virtualization, Operations Management, Field Commissioning,
More informationRapidly deployable secure cellular comms
Rapidly deployable secure cellular comms Delivering global protection Capability Overview SMARTLINK is a rapidly deployable, scalable, low size, weight and power (SWAP) cellular network-in-a-box for demanding
More informationSYNERGISTIC WARFARE COMMUNICATION SOLUTIONS
SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS Tactical Communications & Networking Wireless / wired networks Full spectrum of tactical communications Tactical datalinks Radio ancillaries and accessories
More informationBuilding High-Assurance Systems out of Software Components of Lesser Assurance Using Middleware Security Gateways
Building High-Assurance Systems out of Software Components of Lesser Assurance Using Middleware Security Gateways A PrismTech Product Line OMG's First Software Assurance Workshop: Working Together for
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationCritical networking using mesh Wi-SUN technology Dr Simon Dunkley
Critical networking using mesh Wi-SUN technology Dr Simon Dunkley 1 Content Critical infrastructure requirements Wi-SUN Mesh architecture Wi-SUN technology Case studies 2 Critical infrastructure requirements
More informationOSIsoft Technologies for the Industrial IoT and Industry 4.0
OSIsoft Technologies for the Industrial IoT and Industry 4. Dan Lopez, Senior Systems Engineer Wednesday November 27 Industry 4. and Industrial IoT The Development of Industry 4. Industry. Industry 2.
More informationNaval Surface Warfare Center,
CAPT Brian R. Durant Commander NSWCDD Technical Director - (540) 653-8103 Dennis M. McLaughlin Technical Director Naval Surface Warfare Center, Dahlgren Naval Undersea DivisionWarfare Center The The Leader
More informationE3-E4 (CM MODULE) WiMAX OVERVIEW & BSNL WiMAX PROJECT
E3-E4 (CM MODULE) WiMAX OVERVIEW & BSNL WiMAX PROJECT WELCOME This is a presentation for the E3-E4 Technical (CM- Module) for the Topic: WiMAX Overview & BSNL WiMAX Project Eligibility: Those who have
More informationProviding Cybersecurity Inventory, Compliance Tracking, and C2 in a Heterogeneous Tool Environment
Providing Cybersecurity Inventory, Compliance Tracking, and C2 in a Heterogeneous Tool Environment Joseph L. Wolfkiel Secure Configuration Management Lead Engineer May 2018 1 Disclaimer The information
More informationTECHNOLOGY BRIEF. 10 Gigabit Ethernet Technology Brief
TECHNOLOGY BRIEF 10 Gigabit Ethernet Technology Brief The 10 Gigabit Ethernet Standard In June 2002, the IEEE standard for 10 Gigabit Ethernet, IEEE Std 802.3ae- 2002, was unanimously approved by the IEEE
More informationSOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE
SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE March 2018 Table of Contents Introduction...1 Design...2 Use Cases...2 Underlay...3 Overlay...3 Dynamic Segmentation...3 Non-Stop Networking...4 Summary...5
More informationDynamic WAN Selection
KNOW YOUR NETWORK DATA SHEET Dynamic WAN Selection Overview Ipanema s Dynamic WAN Selection (DWS) is a core component of Ipanema SD-WAN and provides user-centric, dynamic path selection. It automatically
More informationFeliCa Approval for Security and Trust (FAST) Overview. Copyright 2018 FeliCa Networks, Inc.
FeliCa Approval for Security and Trust (FAST) Overview Introduction The security certification scheme called FeliCa Approval for Security and Trust (FAST) has been set up to enable the evaluation and certification
More informationmbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017
mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE
Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Air Force DATE: April 2013 COST ($ in Millions) # ## FY 2015 FY 2016 FY 2017 FY 2018 Program Element - 0.000 0.000 5.853-5.853 5.961 6.181 6.290 6.404
More informationSecurity: The Key to Affordable Unmanned Aircraft Systems
AN INTEL COMPANY Security: The Key to Affordable Unmanned Aircraft Systems By Alex Wilson, Director of Business Development, Aerospace and Defense WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY
More informationGREEN HILLS SOFTWARE: EAL6+ SECURITY FOR MISSION CRITICAL APPLICATIONS
GREEN HILLS SOFTWARE: EAL6+ SECURITY FOR MISSION CRITICAL APPLICATIONS 15 December 2008: EAL6+ Security for Mission Critical Applications INTERVIEWEE. DAVID KLEIDERMACHER CHIEF TECHNOLOGY OFFICER TEL.
More informationIntegrated and Separate?
Integrated and Separate? A document to aid the demonstration of Independence between Control & Safety by The 61508 Association Overriding key principle...it must be safe! DISCLAIMER: Whilst every effort
More informationGlobal Xpress. 10 things you need to know about GX. GLOBAL GOVERNMENT > Solution > GX 10 things
Global Xpress 10 things you need to know about GX GLOBAL GOVERNMENT > Solution > GX 10 things What does GX mean for Governments? The Global Xpress service complements Inmarsat s existing L-Band network
More informationGen-Z Overview. 1. Introduction. 2. Background. 3. A better way to access data. 4. Why a memory-semantic fabric
Gen-Z Overview 1. Introduction Gen-Z is a new data access technology that will allow business and technology leaders, to overcome current challenges with the existing computer architecture and provide
More informationAdvanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014.
Advanced Mobile Computing and Networking - CS 560 Assessment CA 40% - Assignment 20% - 2 Tests 10% each Exam 60% Wireless Technologies, Infrared Data Association (),, and Institute of Electrical and Electronic
More informationProduct Brochure Secure Connectivity for Critical Infrastructure
Device Secure Channel HIPswitch -200 Shared HIPswitch Secure Channel -100 Device 100SNR1.0 / Page 1 Product Overview The Tempered s product line provides a centrally managed security appliance solution
More informationStorage Networking Strategy for the Next Five Years
White Paper Storage Networking Strategy for the Next Five Years 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Top considerations for storage
More informationVXLAN Overview: Cisco Nexus 9000 Series Switches
White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide
More informationFPGAs: High Assurance through Model Based Design
FPGAs: High Assurance through Based Design AADL Workshop 24 January 2007 9:30 10:00 Yves LaCerte Rockwell Collins Advanced Technology Center 400 Collins Road N.E. Cedar Rapids, IA 52498 ylacerte@rockwellcollins.cm
More informationJoint Mission Environment Test Capability (JMETC)
Joint Mission Environment Test Capability (JMETC) Distributed Testing for Cyber Security Marty Arnwine JMETC, Deputy for Plans and Operations February 26, 2015 Agenda JMETC Overview JMETC Networks National
More informationTASMUS.
TASMUS www.aselsan.com.tr TACTICAL AREA COMMUNICATIONS SYSTEM TASMUS Tactical Area Communications System TASMUS, Tactical Area Communications System, is a network centric communication infrastructure that
More informationHybrid Mesh Networking for Distributed Operations
Hybrid Mesh Networking for Distributed Operations LT M.S. Maupin, USN OpTech East Tokyo, Japan 01 December 2015 Overview Distributed Operations Motivation Dispersed littoral operations Distributed mesh
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete Total Cost Total Program Element - - 38.094-38.094 38.503 39.587 40.754 41.292 Continuing Continuing
More informationSimple IoT connectivity. Product Overview: Vodafone USB Connect
Simple IoT connectivity Product Overview: Vodafone USB Connect Contents Part of Integrated Terminals 2 Product overview: Vodafone USB Connect Part of Integrated Terminals Part of Integrated Terminals Are
More informationThis presentation provides an overview of Gen Z architecture and its application in multiple use cases.
This presentation provides an overview of Gen Z architecture and its application in multiple use cases. 1 2 Despite numerous advances in data storage and computation, data access complexity continues to
More informationInteragency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008
Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal
More informationLora-A Revolutionary Technology for IOT LPWAN. Tony Li Vice President of China Sales and Marketing, Semtech Corporation
Lora-A Revolutionary Technology for IOT LPWAN Tony Li Vice President of China Sales and Marketing, Semtech Corporation IoT Connected Device Opportunity Ericsson Gartner 28B 21B Source:Ericsson. Ericsson
More informationMake Networks Work. Network simulation emulation software for: Development Analysis Testing Cyber Assessment DATASHEET
DATASHEET Make Networks Work Network simulation emulation software for: Development Analysis Testing Cyber Assessment The EXata Simulation Emulation Platform The EXata software (EXata) provides ultra high-fidelity
More informationCloud-Enable Your District s Network For Digital Learning
Cloud-Enable Your District s Network For Digital Learning Session B40 BrainStorm 17.0 Gavin Lee Education Business Development Manager Juniper Networks gavinl@juniper.net Juniper Innovations for Mission
More informationOnline Services Security v2.1
Online Services Security v2.1 Contents 1 Introduction... 2 2... 2 2.1... 2 2.2... 2 2.3... 3 3... 4 3.1... 4 3.2... 5 3.3... 6 4... 7 4.1... 7 4.2... 7 4.3... 7 4.4... 7 4.5... 8 4.6... 8 1 Introduction
More informationWeapon Systems Open Architecture Overview
Weapon Systems Open Architecture Overview OMG Real-Time and Embedded Distributed Object Computing Workshop July 24-27, 2000 . Vision for Joint Theater Operations Joint Joint Forces Forces Global Global
More informationAT Ground Surveillance System (GSS)
AT Ground Surveillance System (GSS) AT Ground Surveillance System (GSS) AT Ground Security Sensors The AT Ground Surveillance System (GSS) is integrated network of sensors, cameras and mesh radio network
More informationCommand and Control for Security, Port Operations, and IT Considerations for Planning and Implementation
Command and Control for Security, Port Operations, and IT Considerations for Planning and Implementation Port Operations, Safety and Information Technology Seminar Gary Hicks, Science Applications International
More information<Insert Picture Here> Enterprise Data Management using Grid Technology
Enterprise Data using Grid Technology Kriangsak Tiawsirisup Sales Consulting Manager Oracle Corporation (Thailand) 3 Related Data Centre Trends. Service Oriented Architecture Flexibility
More informationINTRODUCTION. BridgeWay. Headquarters
MILITARY PRODUCTS INTRODUCTION Voiceboard Corporation s MediaPro products provide enhanced communications capabilities for military applications. State of the art technology, including redundant networking,
More informationTop-Down Network Design
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Network Security Design The steps for security design are: 1. Identify
More informationAided-inertial for GPS-denied Navigation and Mapping
Aided-inertial for GPS-denied Navigation and Mapping Erik Lithopoulos Applanix Corporation 85 Leek Crescent, Richmond Ontario, Canada L4B 3B3 elithopoulos@applanix.com ABSTRACT This paper describes the
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions)
More informationPerspective Sensing for Inertial Stabilization
Perspective Sensing for Inertial Stabilization Dr. Bernard A. Schnaufer Jeremy Nadke Advanced Technology Center Rockwell Collins, Inc. Cedar Rapids, IA Agenda Rockwell Collins & the Advanced Technology
More information