Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Avionics Safety and Secured Connectivity: A Look at DO-326A/ED-202A, DO-355 and DO-356
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Avionics Safety and Secured Connectivity: A Look at DO-326A/ED-202A, DO-355 and DO-356

5 years ago Tripwire Guest Authors
Avionics Safety and Secured Connectivity: A Look at DO-326A/ED-202A, DO-355 and DO-356

One of the major improvements that the avionics industry is undergoing is an Internet of Things (IoT) upgrade. And this is inevitably affecting how airlines approach aircraft safety. From the beginning, safety has been paramount to the aviation industry. But while it is a welcome innovation, the incorporation of IoT devices in aircraft comes with attendant challenges that are not unrelated to cybersecurity risks. Safety for aircraft no longer rests upon physical security. Now, it extends to securing connectivity between networked aircraft components, including avionics systems.

Avionics, Connectivity, and Cybersecurity Risks

In 2015, security researcher Chris Roberts was sanctioned for exploiting vulnerabilities in a United Airlines plane and causing it to fly sideways briefly. According to widely publicized report of the FBI, Roberts hacked into the plane’s In-Flight Entertainment (IFE) system while aboard the flight and tampered with the command of the plane. Three years later, researcher Ruben Santamarta hacked planes flying above by exploiting weaknesses in satellite communications infrastructure. These flaws enabled him to gain remote access to and to spy on hundreds of planes from the ground.

Both events brought to light the new reality of aviation and why flight connectivity must be kept very secure. Flight connectivity is the vehicle of sensor information and analytics data flow. Any digital device can be hacked—even more so if it’s connected to the internet. The connectivity capability of airplanes boosts efficiency, but it could also create loopholes for unauthorized remote access. And since connectivity is based on networking, one cannot imagine the far-reaching damage that a hacker can wreak by exploiting one teeny-weeny loophole.

For instance, according to the Design Assurance Levels set by avionics certification documents, a ‘no-effect’ danger level would be a failure that affects no more than the IFE system. Recalling what Roberts was able to do with an IFE vulnerability, significant risks exist with even these low-level security weaknesses.?

Avionics Cybersecurity Certification

As aviation adjusts to the new normal of the ‘connected aircraft,’ how can we keep avionics systems secure? Over the years, certain certification documents have been introduced to regulate information security and ensure safety on aircraft. They include DO-326A/ED-202A, DO-355 and DO-356.

DO-326A/ED-202A

The main certification document addressing aircraft cybersecurity is DO-326A/ED-202A. Titled “Airworthiness Security Process Specification,” it’s colloquially referred to as an intro to aviation cybersecurity. It is also called the cyber version of the DO-178, the main certification document for avionics software systems. The creation of a separate document for aircraft information security different from DO-178 rightly highlights the utmost importance that must be attached to cybersecurity in avionics.

The guidance set in the documents is meant for implementation throughout the development life cycle, from design to deployment. The seven steps it covers are as follows: Plan for Security Aspects of Certification, Security Scope Definition, Security Risk Assessment, Risk Acceptability Determination, Security Development, Security Effectiveness Assurance and Communication of Evidence.

DO-355

The full title of DO-355 is “Information Security Guidance for Continuing Airworthiness.” It was published in June 2014 as a collection of supplementary requirements focused on operations and maintenance. It is different from DO-326A in that the latter is meant for development-wide implementation rather than for addressing maintenance needs arising from aviation information security threats.

DO-356

The full title of DO-356 is “Airworthiness Security Methods and Considerations.” It was published in September 2014 just after the introduction of DO-355. It is a companion document to DO-326A/ED-202A that proves compliance with airworthiness security requirements throughout the stages of development.

It should be noted that DO-326A/ED-202A, DO-355, and DO-356 offer no guidance on physical attacks. Instead, they focus on intentional unauthorized electronic interaction including instances of malware installation and system manipulation.

Aviation companies should be looking towards the full-scale adoption of the requirements in these documents for the development and maintenance of their avionics systems. That focus should be on identifying compliance gaps. The earlier in the development stage that gaps are discovered, the easier they are to fix.

In addition, information security, much like physical security, requires continuous monitoring as threats keep getting exposed. Malicious actors are looking to exploit any vulnerability that they find. Therefore, security monitoring is necessary even if, and especially when, nothing seems wrong with the system.

The provisions in DO-326A/ED-202A and the other documents are not yet mandatory. Currently, they mainly serve as guidelines. However, airlines that recognize its need have integrated its regulations into their avionics development processes. In any case, talks have been underway for a while to make the requirements of DO-326A/ED-202A mandatory for airworthiness across the board.


About the Author: Michael Usiagwu is an Entrepreneur, Tech Pr Expert and CEO of Visible Links Pro. He assists various organizations to stay abreast of the latest technology. Some of his insightful content can be seen in Readwrite, InfoSecurity Magazine, Hackernoon, and lots more. He’s very much open to assist organizations to increase their latest technology development. 

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” Avionics Safety and Secured Connectivity: A Look at DO-326A/ED-202A, DO-355 and DO-356″ appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Encryption, Exploit, Hacker, Low Severity, TripWire

Continue Reading

Previous Two New Chrome 0-Days Under Active Attacks – Update Your Browser
Next MISSIONS — The Next Level of Interactive Developer Security Training

More Stories

  • Cyber Attacks
  • Data Breach

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

12 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

12 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

15 hours ago [email protected] (The Hacker News)
  • Data Breach

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

18 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

20 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

22 hours ago [email protected] (The Hacker News)

Recent Posts

  • Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models
  • DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files
  • China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns
  • Orchid Security Introduces Continuous Identity Observability for Enterprise Applications
  • The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT