Fig. 1. Example of Threat Tree
Fig. 2. Information Security Risk Management Process
Fig. 3. Airworthiness Security Certification Process based on Risk
Fig. 4. Rule of Generating Security Threat Sentence
Fig. 5. Generating of Threat Tree
Fig. 6. Data Interlocking System of Fighter-Aircraft
Fig. 7. Example of Threat Tree
Table 1. Airworthiness Security Acceptability Matrix
Table 2. Threat Sentence Structure of CC ToolBox/PKB
Table 3. Threat Sentence Structure of OCTAVE
Table 4. Comparison of Security Threat Derivation Methods
Table 5. Threat Agent Factors
Table 6. Attack Method Factors
Table 7. Aircraft & Mission Impact Factors
Table 8. Technical Impact Factors
Table 9. Example of Likelihood & Impact Scoring
Table 10. Likelihood & Impact Definition
Table 11. Determining the Severity of the Risk
Table 12. Likelihood & Impact Definition
Table 13. Likelihood & Impact Definition
Table 14. Determinig the Severity of the Risk & Apply Airworthiness Security Acceptability Matrix
References
- Government Accountability Office, FAA Needs a More Comprehensive Approach to Address Cybersecurity As Agency Transitions to NextGen, GAO Report, 2015.
- H. J. Kim and D. S. Kang, "A Study of Fighter-plane Airworthiness Security Certification," in Proceedings of KIPS, Vol.25, No.1, pp.117-120, 2018.
- D. M. Seo, K. J. Cha, Y. S. Shin, C. H. Jeong, and Y. M. Kim, "Assessment Method of Step-by-Step Cyber Security in the Software Development Life Cycle," Jounal of KIISC, Vol.25, No.2, pp.363-373, 2015.
- M. G. Han and T. K. Park, "A Study on Intergrated Airworthiness Certification Criteria for Avionics Software Safety and Security," Journal of the Korean Society for Aeronautical & Space Sciences, Vol.46, No.1, pp.86-94, 2018. https://doi.org/10.5139/JKSAS.2018.46.1.86
- RTCA, DO-326A, Airworthiness Security Process Specification, Aug. 6, 2014.
- RTCA, DO-356, Airworthiness Security Methods and Consideration, Sep. 23, 2014.
- Adam Shostack, Threat Modeling: Designing for Security, H.Y., Yang, etc., Acorn Publisher, 2016.
- E. J. Park and S. J. Kim, "Derivation of Security Requirements of Smart Factory Based on STRIDE Threat Modeling," Journal of the Korea Institute of Information Security & Cryptology, Vol.27, No.6, pp.1467-1482, 2017. https://doi.org/10.13089/JKIISC.2017.27.6.1467
- J. S. Han, K. J. Kim, and Y. J. Song, Introduction of UML, Hanbit Academy, 2008.
- G. Sindre and A. L. Opdahl, "Templates for Misuse Case Description," Proceeding of. 7th International Workshop on Requirements Engineering, pp.26-28, 2001.
- S. S. Choi, S. J. Jang, M. G. Choi, and G. S. Lee, "A Methodology for CC-based Security Requirements Analysis and Specification by using Misuse Case Model," Journal of KIISC, Vol.14, No.3, pp.85-100, 2004.
- Common Criteria, Common Criteria for Information Technology Security Evaluation Version 3.1, 2017.
- K. S. Lee, J. H. Ko, S. J. Jang, S. J. Choi, and S. H. Hwang, Analysis of Security Environment for the Common Criteria based protection Profile, Research Report, Korea Information Security Agency, 2002.
- C. J. Alberts and A. J. Dorofee, OCTAVE Criteria, Version 2.0. Technical Report, Carnegie Mellon Software Engineering Institute, 2001.
- ISO/IEC 27001, Information technology, Security techniques, Information security management systems, Requirements, 2014.
- ISO/IEC 27005, Imformation Technology, Security techniques, Information security risk management, 2014.
- J. H. Ko and K. S. Lee, "A Threat Statement Generation Method for Security Environment of Protection Profil," Journal of Society for e-Business Studies, Vol.8, No.3, pp. 69-86, 2003.
- Matteo Meucci, Andrew Muller, "Testing Guide 4.0 Release," 2015.
- J. S. Choi and K. H. Kook, "Secure Coding Rule Selecting Evaluation for Air Warfare System Considering Military Air Worthiness," Journal of Security Engineering, Vol.11, No. 6, pp.439-454, 2014. https://doi.org/10.14257/jse.2014.12.01
- CVE Details [Internet], https://www.cvedetails.com/(Search 2018. 12.16.)