Verification and Validation of Mission Data Libraries for Electronic Warfare Operational Support

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Verification and Validation of Mission Data Libraries for Electronic Warfare Operational Support"

Transcription

1

2 Verification and Validation of Mission Data Libraries for Electronic Warfare Operational Support Flight Lieutenant Charles Winsor Royal Australian Air Force Dr Thomas Millhouse Nova Systems, Australia

3 Introduction Electronic Support systems depend on libraries of accurate, current and relevant mission data to identify emitters and provide tactical threat warning to aircraft and ships Electronic Warfare Operational Support is the process of updating these mission data libraries to adapt to changes in the operational environment

4 Introduction Library reprogramming has historically been treated like software development Software engineering standards demand time-consuming Verification and Validation for mission critical systems Verification and Validation provide assurance that an Electronic Support system will perform in its intended operational environment

5 Introduction Excessive Verification and Validation may compromise the essential responsiveness of Electronic Warfare Operational Support We propose a new approach to balance the rigour of software engineering with the responsiveness of Electronic Warfare Operational Support

6 Acknowledgement

7 Outline Electronic Support Mission Data Libraries Electronic Warfare Operational Support Verification and Validation Finding the Balance A New Approach

8 Electronic Support Electronic Support is the branch of Electronic Warfare that deals with the passive intercept, analysis and exploitation of electromagnetic radiation Electronic Support is used in modern warfare for surveillance, intelligence collection and tactical threat warning of radar-guided weapons

9 Electronic Support Electronic Support systems aim to: intercept and detect signals locate, identify and report emitters INTERCEPT Receiver DETECT LOCATE Signal Processor Mission Data Library REPORT Operator Display IDENTIFY

10 Mission Data Libraries Most Electronic Support systems are loaded pre-mission with reprogrammable mission data libraries These libraries enable automatic identification of detected emitters High quality libraries are essential to achieve timely threat warning: manual emitter identification by an operator is slow fast reactions needed against threats

11 Mission Data Libraries Emitter parameters form the basis of a mission data library: enables identification of emitters from detected signals Emitter-to-platform associations improve situational awareness: identified emitters may be correlated to known platforms or locations Additional information can be associated to emitters to improve situational understanding

12 Mission Data Libraries Mission data quality characteristics: Accuracy Currency Relevance All share a common dependence on time All are interdependent

13 Mission Data Libraries Mission data libraries are typically specified to suit an Area of Operations: libraries should be updated as emitters enter or leave the specified region Mission data is typically based on observed emitter parameters: libraries should be updated as emitter parameters change particularly important as we enter the era of software-defined radio

14 Consequences No identification Misidentification Ambiguous identification

15 Consequences No identification: no threat warning countermeasures not initiated platform loss Misidentification or ambiguous identification: false alarm wrong countermeasures initiated mission abort

16 EW Operational Support Aim To update libraries before they become ineffective or unsuitable for operational use Problem The electromagnetic environment may change significantly on a daily basis Challenge To complete post-mission analysis, update library requirements, develop an updated library, and verify and validate that library to a suitable extent all before the current library becomes an operational liability!

17 EW Operational Support Pre-Mission Upload Post-Mission Download OPERATE Mission Replay ANALYSE Resolve Anomalies Recommend Changes Validate Verify REPROGRAM Develop Design

18 Verification & Validation Australian Technical Airworthiness regulations treat mission data libraries as software (not as data): similar regulations are applied in the Australian maritime and land domains Software engineering standards like DO-178B are applied to routine library reprogramming: threat warning sensors are mission critical systems libraries may be assessed to need high Software Assurance Levels Assurance of mission critical software demands time-consuming Verification and Validation

19 Verification & Validation Verification The evaluation of whether or not a product complies with a requirement specification The library was developed correctly Validation The assurance that a product meets the needs of the customer The correct library was developed [IEEE ]

20 Verification & Validation Verification and Validation are important to provide assurance that mission data requirements are satisfied by a library......but those mission data requirements change whilst library Verification and Validation is being conducted An optimal balance must be found between rigour and responsiveness

21 Finding the Balance 1. Programming errors found and resolved 2. System performance optimisation 3. Mission data currency degradation 4. Mission data relevance degradation

22 Verification Software-only testing: basic error checking basic performance estimation Was the library implemented as designed? Hardware-in-the-loop testing: advanced error checking advanced performance estimation assess emitter interactions Does the library design satisfy its requirements?

23 Limitations of Verification The same mission data is used to develop and verify the library The performance of a library is fundamentally limited by the quality of the available mission data Verification predicts library performance assuming mission data is correct Library verification provides no assurance of underlying mission data quality

24 Validation Field testing: Were the library requirements fit for purpose? Options: controlled or mission conditions? generic test scenario or mission rehearsal? emitters of interest only, or background emissions as well?

25 Limitations of Validation High cost If emitter emulators are used, same fundamental limitation as verification: predicts library performance assuming emitter emulation is correct If authentic emitters are used, still not a true representation of the operational environment: no two radars emit exactly the same signal when does close enough become good enough?

26 A New Approach Verification and Validation are activities performed as part of the library reprogramming process Library reprogramming is an activity performed within the EWOS cycle What if we treated the entire EWOS cycle as a holistic Validation activity? Can rapid, continuous execution of the EWOS cycle fulfil the aim of Validation?

27 EWOS as Validation Collect test data from operations: true mission conditions emitters of interest background emitters Assess library performance in the operational environment through post-mission analysis Assess the ongoing suitability of library requirements: Were yesterday's library requirements still valid during today's mission? If not, what needs to change? And how else do we expect tomorrow's mission to change those library requirements?

28 EWOS as Validation Does rapid, continuous execution of the EWOS cycle mitigate the need for a formal Verification and Validation process? A low quality library can still cause mission failure or the loss of life and materiel: focussed testing of high risk emitters Potential to compound errors: initial library version must be of reasonable quality Similar principles to the Spiral Model for software development [Boehm, 1988]

29 EWOS as Validation OPERATE ANALYSE REPROGRAM [Boehm, 1988]

30 Improving Library Performance

31 Implementation Holistic consideration of Verification, Validation and the entire EWOS cycle Organisations, personnel and infrastructure capable of sustaining highly responsive EWOS Expertise to identify mission risks within libraries and tailor Verification and Validation processes to specifically address those risks: instead of blanket-application of generic software engineering standards to EWOS

32 Into the Future Mission data library development processes for Electronic Support systems are currently similar to the Waterfall Model [Royce, 1970] Rapid, continuous execution of the EWOS cycle could be considered similar to the Spiral Model [Boehm, 1988] Many new software development models have emerged in the last few decades Is it time for EWOS to move into the twenty-first century?

33 Conclusion Libraries of accurate, current and relevant mission data are essential to enable the performance of Electronic Support systems Low quality mission data libraries can result in mission failure and other serious consequences Assurance of library quality is conventionally achieved through application of software engineering rigour

34 Conclusion Conducting extensive Verification and Validation processes to assure library quality can actually reduce performance The EWOS cycle must be responsive to keep pace with an evolving electromagnetic environment A better balance must be found between rigour and responsiveness

35 References D.C. Schleher (1999), Electronic Warfare in the Information Age R.G. Wiley (2006), Electronic Intelligence: The Interception and Analysis of Radar Signals DO-178B, Software Considerations in Airborne Systems and Equipment Certification IEEE , A Guide to the Project Management Body of Knowledge W. Royce (1970), Managing the Development of Large Software Systems B. Boehm (1988), A Spiral Model of Software Development and Enhancement

36 Verification and Validation of Mission Data Libraries for Electronic Warfare Operational Support Flight Lieutenant Charles Winsor Royal Australian Air Force Dr Thomas Millhouse Nova Systems, Australia

37

38

www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS)

www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS) www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS) Certified Foundation Watchkeeper X is built to the same standards as a manned aircraft, and conforms to CAA/MAA standards. It

More information

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 6 R-1 Line #165

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 6 R-1 Line #165 COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY 2015 FY 2015 OCO # Total FY 2016 FY 2017 FY 2018 FY 2019 Cost To Complete Total Program Element - 5.071 5.512 5.956-5.956 6.075 6.063 6.181

More information

GCC Homeland Security in a New Order. Dr. Theodore Karasik Director of Research and Consultancy INEGMA. September 2013

GCC Homeland Security in a New Order. Dr. Theodore Karasik Director of Research and Consultancy INEGMA. September 2013 GCC Homeland Security in a New Order Dr. Theodore Karasik Director of Research and Consultancy INEGMA September 2013 Secular Sectarian Tribal State Actors Regional Shifts and Threats in the New Order A

More information

Bio-inspired cyber security for your enterprise

Bio-inspired cyber security for your enterprise Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t

More information

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD

More information

Services we provide. Tel: +1 561-623-8810 email: contracts@eetengineering.com http://www.eetengineering.com

Services we provide. Tel: +1 561-623-8810 email: contracts@eetengineering.com http://www.eetengineering.com EET Engineering specializes in providing timely, cost-efficient, quality engineering solutions to support the successful implementation of our customer s requirements. For over 24 years, our leadership

More information

Position Descriptions. Aerospace

Position Descriptions. Aerospace Position Descriptions Aerospace Aerospace Engineering? Aeromechanics / Flight Control / Flight Qualities Engineer Predict, analyze, and verify air vehicle flight dynamics including aircraft aerodynamics,

More information

AIRBUS GROUP AUSTRALIA PACIFIC

AIRBUS GROUP AUSTRALIA PACIFIC AIRBUS GROUP AUSTRALIA PACIFIC GLOBAL EXPERTISE LOCAL FOCUS Airbus Group Australia Pacific is a part of Airbus Group, a global leader in aeronautics, space and related services. The Group comprises the

More information

ASTRAEA the findings so far

ASTRAEA the findings so far ASTRAEA the findings so far Lambert Dopping- Hepenstal, FREng RPAS CivOps 2014 3 rd December 2014 Contents The ASTRAEA programme Regulatory engagement Programme achievement examples Communications Detect

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

Propsim enabled Aerospace, Satellite and Airborne Radio System Testing

Propsim enabled Aerospace, Satellite and Airborne Radio System Testing www.anite.com Propsim enabled Aerospace, Satellite and Airborne Radio System Testing Anite is now part of Keysight Technologies Realistic and repeatable real-time radio channel emulation solutions for

More information

Rapid software development. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 17 Slide 1

Rapid software development. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 17 Slide 1 Rapid software development Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 17 Slide 1 Objectives To explain how an iterative, incremental development process leads to faster delivery of

More information

Surveillance and Security Systems

Surveillance and Security Systems Surveillance and Security Systems Surveillance & Security Systems Surveillance Company Overview and Security Systems Company Overview Company Overview Ultra Electronics Surveillance and Security Systems

More information

Information Assurance. and Critical Infrastructure Protection

Information Assurance. and Critical Infrastructure Protection Information Assurance and Critical Infrastructure Protection A Federal Perspective Information Assurance Presented by the Government Electronics and Information Technology Association 2001 Executive Summary

More information

ESKISP6064.03 Conducts vulnerability assessment under supervision

ESKISP6064.03 Conducts vulnerability assessment under supervision Conducts vulnerability assessment under supervision Overview This standard covers the competencies required to conduct vulnerability assessments under supervision. This includes following processes for

More information

Observation and Findings

Observation and Findings Chapter 6 Observation and Findings 6.1. Introduction This chapter discuss in detail about observation and findings based on survey performed. This research work is carried out in order to find out network

More information

Coordinated Operation Capability Using Scalable C2

Coordinated Operation Capability Using Scalable C2 Coordinated Operation Capability Using Scalable C2 Authors: Hüseyin KUTLUCA, İbrahim AKSU, Arda ÜNAL MilSOFT Yazılım Teknolojileri A.Ş. Teknokent, 06800 ODTU Ankara / TURKEY hkutluca@milsoft.com.tr iaksu@milsoft.com.tr

More information

ELBIT SYSTEMS. Jefferies Global Industrials Conference - August 2014. Joseph Gaspar EVP & CFO

ELBIT SYSTEMS. Jefferies Global Industrials Conference - August 2014. Joseph Gaspar EVP & CFO ELBIT SYSTEMS Jefferies Global Industrials Conference - August 2014 Joseph Gaspar EVP & CFO AT A GLANCE HEADQUARTED ISRAEL with International Operations 11,700 EMPLOYEES 50% engineers TEL AVIV & NASDAQ

More information

IAI/Malat Solutions for the Maritime Arena

IAI/Malat Solutions for the Maritime Arena IAI/Malat Solutions for the Maritime Arena Any country with a proximity to the sea has an important operational need to positively and unambiguously identify, in time, threats that originate in the maritime

More information

TRANSPORTATION SECURITY ASSOCIATES, LLC

TRANSPORTATION SECURITY ASSOCIATES, LLC Introduction The purpose of this white paper is to examine the benefits and limitations of shore based marine radar for waterside security applications. This technology has been deployed for over 60 years

More information

Data center solutions from Siemens. For the factories of the 21 st century. siemens.com/datacenters

Data center solutions from Siemens. For the factories of the 21 st century. siemens.com/datacenters Data center solutions from Siemens For the factories of the 21 st century siemens.com/datacenters We face the challenges for the factories of the 21 st century Based on our vast experience, we offer a

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication

More information

CUSTOMER KEYNOTE Hal Buddenbohm

CUSTOMER KEYNOTE Hal Buddenbohm CUSTOMER KEYNOTE Hal Buddenbohm Supply Chain Director ITT Force Protection Systems Hal Buddenbohm is the Supply Chain Director at ITT Force Protection Systems in Thousand Oaks, CA. Prior to joining ITT,

More information

13.0. Safety Management and Airspace Protection

13.0. Safety Management and Airspace Protection 13.0 Safety Management and Airspace Protection 13.1 Safety management 119 13.2 Security 119 13.3 Airspace protection 119 13.4 Airports (Protection of Airspace) Regulations 1996 120 13.5 Engine-out procedures

More information

Systems Engineering. Designing, implementing, deploying and operating systems which include hardware, software and people

Systems Engineering. Designing, implementing, deploying and operating systems which include hardware, software and people Systems Engineering Designing, implementing, deploying and operating systems which include hardware, software and people Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 2 Slide 1 Objectives

More information

Records Authority. Australian Security Intelligence Organisation

Records Authority. Australian Security Intelligence Organisation Records Authority Australian Security Intelligence Organisation This is an accurate reproduction of the authorised records authority content, created for accessibility purposes CONTENTS INTRODUCTION 3

More information

AIRCRAFT WORK BREAKDOWN STRUCTURE (WBS) LEVELS (FROM MILITARY SPECIFICATION 881)

AIRCRAFT WORK BREAKDOWN STRUCTURE (WBS) LEVELS (FROM MILITARY SPECIFICATION 881) Appendix C AIRCRAFT WORK BREAKDOWN STRUCTURE (WBS) LEVELS (FROM MILITARY SPECIFICATION 881) Level 1 Level 2 Level 3 Aircraft System Air Vehicle (AV) System Engineering/ Program Management Airframe Propulsion

More information

INFORMATION & COMMUNICATIONS TECHNOLOGY (ICT) PHYSICAL & ENVIRONMENTAL SECURITY POLICY

INFORMATION & COMMUNICATIONS TECHNOLOGY (ICT) PHYSICAL & ENVIRONMENTAL SECURITY POLICY INFORMATION & COMMUNICATIONS TECHNOLOGY (ICT) PHYSICAL & ENVIRONMENTAL SECURITY POLICY 1. PURPOSE In respect to this policy the term physical and environmental security refers to controls taken to protect

More information

FCC HOMELAND SECURITY LIAISON ACTIVITIES

FCC HOMELAND SECURITY LIAISON ACTIVITIES FCC HOMELAND SECURITY LIAISON ACTIVITIES Committee on National Security Systems (CNSS) The CNSS consists of sixty Federal departments and agencies. The CNSS provides a forum for the discussion of policy

More information

Detect, Prevent, and Deter Fraud in Big Data Environments

Detect, Prevent, and Deter Fraud in Big Data Environments SAP Brief SAP s for Governance, Risk, and Compliance SAP Fraud Management Objectives Detect, Prevent, and Deter Fraud in Big Data Environments Detect and prevent fraud to reduce financial loss Detect and

More information

Image courtesy Newcastle Port Corporation CENTRE FOR OPTIMAL PLANNING & OPERATIONS. Productivity and Efficiency for the Energy & Resources Sector

Image courtesy Newcastle Port Corporation CENTRE FOR OPTIMAL PLANNING & OPERATIONS. Productivity and Efficiency for the Energy & Resources Sector Image courtesy Newcastle Port Corporation CENTRE FOR OPTIMAL PLANNING & OPERATIONS Productivity and Efficiency for the Energy & Resources Sector The energy and resources sectors are critical drivers of

More information

Usability Study of the Department of Defense Joint Analysis System

Usability Study of the Department of Defense Joint Analysis System Usability Study of the Department of Defense Joint Analysis System Doug Bardin, Estelle Hong, Daniel O Loughlin and Zachary Maodus Abstract The Department of Defense (DoD) uses modeling and simulation

More information

Why it may be time to consider Certified Avionics for UAS (Unmanned Aerial Vehicles/Systems) White paper

Why it may be time to consider Certified Avionics for UAS (Unmanned Aerial Vehicles/Systems) White paper Why it may be time to consider Certified Avionics for UAS (Unmanned Aerial Vehicles/Systems) White paper UAS growth There are a number of different UAS types flying today in multiple applications. There

More information

G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE

G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE G2 Industry Day 2015 29 JULY 2015 Mr. Stephen Kreider PEO IEW&S 1 PEO IEW&S Organization 2 PEO IEW&S Snap-Shot Overview Army Chartered Program Executive Officer responsible for management of assigned programs

More information

GOOD SECURITY IS A GROUP EFFORT

GOOD SECURITY IS A GROUP EFFORT THE OFFICE OF SECURITY Operations Security (OPSEC) GOOD SECURITY IS A GROUP EFFORT Operations Security (OPSEC) "Even minutiae should have a place in our collection, for things of a seemingly trifling nature,

More information

Should you allow your employees to bring their own technology to work?

Should you allow your employees to bring their own technology to work? Should you allow your employees to bring their own technology to work? August 2014 Should you allow your employees to bring their own technology to work? Known by a number of terms such as Bring Your Own

More information

Continuous Network Monitoring

Continuous Network Monitoring Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment

More information

Propsim enabled Mobile Ad-hoc Network Testing

Propsim enabled Mobile Ad-hoc Network Testing www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile

More information

National Information Assurance Certification and Accreditation Process (NIACAP)

National Information Assurance Certification and Accreditation Process (NIACAP) NSTISSI No. 1000 April 2000 National Information Assurance Certification and Accreditation Process (NIACAP) THIS DOCUMENT PROVIDES MINIMUM STANDARDS. FURTHER INFORMATION MAY BE REQUIRED BY YOUR DEPARTMENT

More information

The University of Oxford IS Strategy Group G Opportunities and Challenges in IS: merger lessons

The University of Oxford IS Strategy Group G Opportunities and Challenges in IS: merger lessons The University of Oxford IS Strategy Group G Opportunities and Challenges in IS: merger lessons Prof. M.J. Clark Director Manchester Computing The University of Manchester, UK Synopsis A personalised view

More information

Enterprise Capabilities Descriptions

Enterprise Capabilities Descriptions 1 SYSTEMS ENGINEERING & INTEGRATION 6 COMMUNICATIONS SYSTEMS 11 LIFECYCLE SYSTEMS ENGINEERING 12 LIFECYCLE SYSTEMS INTEGRATION 13 MISSION INTEGRATION 14 DISCIPLINES 15 DOMAINS 2 CYBER 21 CYBER STRATEGIC

More information

A Model-based Methodology for Developing Secure VoIP Systems

A Model-based Methodology for Developing Secure VoIP Systems A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN

More information

Extended Resolution TOA Measurement in an IFM Receiver

Extended Resolution TOA Measurement in an IFM Receiver Extended Resolution TOA Measurement in an IFM Receiver Time of arrival (TOA) measurements define precisely when an RF signal is received, necessary in the identification of type and mode of RF and radar

More information

Using Spiral Development To Reduce Acquisition Cycle Times

Using Spiral Development To Reduce Acquisition Cycle Times Using Spiral Development To Reduce Acquisition Cycle Times Jacques S. Gansler, Ph.D. Professor and Roger C. Lipitz Chair Director, Center of Public Policy and Private Enterprise William Lucyshyn Director

More information

Intelligence, Information Technology and Cyber Programs

Intelligence, Information Technology and Cyber Programs Intelligence, Information Technology and Cyber Programs Andrew Davies The 2009 Defence White Paper has much to say about military hardware, which has naturally captured the headlines, but there are also

More information

Investor and Analyst Briefing November 2014

Investor and Analyst Briefing November 2014 Investor and Analyst Briefing November 2014 Forensic Technology Company Overview Presented by René Bélanger November 2014 Forensic Technology Acquired in May 2014 for 51.4m Forensic Technology pioneered

More information

Computer security technologies

Computer security technologies 4 Computer security technologies 4.1 Introduction Determining the risk that a vulnerability poses to a computer system and also its vulnerability risk status forms part of the information security field

More information

The Intelligent, Proactive Information Assurance and Security Technology IPDM

The Intelligent, Proactive Information Assurance and Security Technology IPDM The Intelligent, Proactive Information Assurance and Security Technology IPDM Next Generation Network Intrusion Prevention and Deception Management Revealed Webb Wang CSO/CTO, and Conceptual Architect

More information

Intelligent Surveillance & Security Systems

Intelligent Surveillance & Security Systems Intelligent Surveillance & Security Systems Weapon Station (Optional) - Lethal / Non-lethal weapon - Universal Gun Mount Tracking Module - Low light, High resolution Camera - Illuminator - Laser Range

More information

Feedback on the Inquiry into Serious Injury. Presented to the Road Safety Committee of the Parliament of Victoria. 08 May 2013

Feedback on the Inquiry into Serious Injury. Presented to the Road Safety Committee of the Parliament of Victoria. 08 May 2013 Feedback on the Inquiry into Serious Injury Presented to the Road Safety Committee of the Parliament of Victoria 08 May 2013 About the APA The Australian Physiotherapy Association (APA) is the peak body

More information

TIBCO Cyber Security Platform. Atif Chaughtai

TIBCO Cyber Security Platform. Atif Chaughtai TIBCO Cyber Security Platform Atif Chaughtai 2 TABLE OF CONTENTS 1 Introduction/Background... 3 2 Current Challenges... 3 3 Solution...4 4 CONCLUSION...6 5 A Case in Point: The US Intelligence Community...7

More information

Australian Maritime Safety Authority. Aviation rescue

Australian Maritime Safety Authority. Aviation rescue Australian Maritime Safety Authority Aviation search and rescue Rescue Coordination Centre Australia Rescue Coordination Centre Australia (RCC Australia) is the national aviation and maritime search and

More information

Information security management guidelines

Information security management guidelines Information security management guidelines Agency cyber security responsibilities when transacting online with the public Version 2.1 Approved July 2014 Amended April 2015 Commonwealth of Australia 2013

More information

Long Term Defence Study

Long Term Defence Study Long Term Defence Study 2014-09-10 LtCol Johan Hansson SwAF HQ 1 Long Term Defence Studies Three main objectives: To identify uncertainties. To create some scenarios which demonstrates the coming challenges

More information

Models of Software Development

Models of Software Development October 28, 2015 Verification & Validation In many computer science courses, software is submitted once, graded, and thrown away. In real life, software development is an process. Some attempts to codify

More information

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation

More information

Gaining and Maintaining Support for a SOC. Jim Goddard Executive Director, Kaiser Permanente

Gaining and Maintaining Support for a SOC. Jim Goddard Executive Director, Kaiser Permanente Gaining and Maintaining Support for a SOC Jim Goddard Executive Director, Kaiser Permanente Objectives Agenda 1 Lessons learned 2 How to build interest 3 Producing tangible benefits 4 Building momentum

More information

WHY THE WATERFALL MODEL DOESN T WORK

WHY THE WATERFALL MODEL DOESN T WORK Chapter 2 WHY THE WATERFALL MODEL DOESN T WORK M oving an enterprise to agile methods is a serious undertaking because most assumptions about method, organization, best practices, and even company culture

More information

Network Security Forensics

Network Security Forensics Network Security Forensics As hacking and security threats grow in complexity and organizations face stringent requirements to document access to private data on the network, organizations require a new

More information

Department of Defense. SUBJECT: Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS)

Department of Defense. SUBJECT: Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS) Department of Defense DIRECTIVE NUMBER 4630.05 May 5, 2004 Certified Current as of April 23, 2007 ASD(NII)/DoD CIO SUBJECT: Interoperability and Supportability of Information Technology (IT) and National

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing IBM Global Technology Services Statement of Work for IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing The information in this Statement of Work may not be disclosed

More information

Security Systems EMERGENCY MANAGEMENT. In security you cannot choose the second best option. indracompany.com

Security Systems EMERGENCY MANAGEMENT. In security you cannot choose the second best option. indracompany.com Security Systems EMERGENCY MANAGEMENT In security you cannot choose the second best option indracompany.com EMERGENCY MANAGEMENT EMERGENCY MANAGEMENT EMERGENCY C4i CENTRE Crisis management and preparednesss

More information

SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT

SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT Mar 31, 2014 Japan Aerospace Exploration Agency This is an English translation of JERG-2-610. Whenever there is anything ambiguous in this document, the original

More information

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: (wahlgren@dsv.su.se), 2: (stewart@dsv.su.se) ABSTRACT

More information

Safety Risk. Aligning perception with reality

Safety Risk. Aligning perception with reality Safety Risk Aligning perception with reality Operating instructions Perception a person s recognition of the nature and degree of risk affecting an activity Reality accurate assessment of risk based on

More information

Internal Audit Manual

Internal Audit Manual COMPTROLLER OF ACCOUNTS Ministry of Finance Government of the Republic of Trinidad Tobago Internal Audit Manual Prepared by the Financial Management Branch, Treasury Division, Ministry of Finance TABLE

More information

Moving to a new dimension of networks. Connect IQ: evaluator

Moving to a new dimension of networks. Connect IQ: evaluator Moving to a new dimension of networks Connect IQ: evaluator Welcome to Connect IQ evaluator We begin the journey into the new network dimension with the BT Connect IQ evaluator. This is a complimentary

More information

Ethical Issues in the Software Quality Assurance Function

Ethical Issues in the Software Quality Assurance Function Ethical Issues in the Software Quality Assurance Function Jim Nindel-Edwards Microsoft, Inc. USA jimne@ieee.org Gerhard Steinke Seattle Pacific University USA gsteinke@spu.edu ABSTRACT The responsibility

More information

Contents. peakwork The Player Hub Company. 4 Player-Hub technology cutting edge solution for the distribution travel products

Contents. peakwork The Player Hub Company. 4 Player-Hub technology cutting edge solution for the distribution travel products EN peakwork The Company peakwork is the software specialist for the travel industry. The innovative and unique world-wide - technology has set new standards, resulting in higher quality, quantity, accuracy

More information

A Review of Security System for Smart Home Applications

A Review of Security System for Smart Home Applications Journal of Computer Science 8 (7): 1165-1170, 2012 ISSN 1549-3636 2012 Science Publications A Review of Security System for Smart Home Applications Mohammad Syuhaimi Ab-Rahman and Mohd Ariff Razaly Department

More information

Tactical Targeting Network Technology and Connectivity. Provided by Rockwell Collins

Tactical Targeting Network Technology and Connectivity. Provided by Rockwell Collins Tactical Targeting Network Technology and Connectivity Provided by Rockwell Collins Tactical Targeting Network Technology (TTNT) is a waveform technology based on the Joint Airborne Network-Tactical Edge

More information

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations

More information

Guidance for Data Users on the Collection and Use of Personal Data through the Internet 1

Guidance for Data Users on the Collection and Use of Personal Data through the Internet 1 Guidance for Data Users on the Collection and Use of Personal Data through the Internet Introduction Operating online businesses or services, whether by commercial enterprises, non-government organisations

More information

Prepared for tomorrow s challenges with your global full service partner

Prepared for tomorrow s challenges with your global full service partner Prepared for tomorrow s challenges with your global full service partner The changing nature of conflicts RUAG Defence: independent, flexible, solution-oriented RUAG Defence stands for top-level technological

More information

Rapid software development. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 17 Slide 1

Rapid software development. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 17 Slide 1 Rapid software development 1 Objectives To explain how an iterative, incremental development process leads to faster delivery of more useful software To discuss the essence of agile development methods

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5200.44 November 5, 2012 DoD CIO/USD(AT&L) SUBJECT: Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN) References: See Enclosure

More information

HIGH-TECH IN ELECTRONIC WARFARE: THE EF-18G ELECTRONIC ATTACK FIGHTER

HIGH-TECH IN ELECTRONIC WARFARE: THE EF-18G ELECTRONIC ATTACK FIGHTER VÉDELMI INFOKOMMUNIKÁCIÓ LÁSZLÓ KOVÁCS HIGH-TECH IN ELECTRONIC WARFARE: THE EF-18G ELECTRONIC ATTACK FIGHTER CSÚCSTECHNOLÓGIA AZ ELEKTRONIKAI HADVISELÉSBEN: AZ EF-18G ELEKTRONIKAI ELLENTEVÉKENYSÉGI REPÜLŐGÉP

More information

Requirements When Considering a Next- Generation Firewall

Requirements When Considering a Next- Generation Firewall White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration

More information

Multilink Processors (Link 11/16/22) and Integration Architectures

Multilink Processors (Link 11/16/22) and Integration Architectures Multilink Processors (Link 11/16/22) and Integration Architectures Authors: Serdar ÖZTÜRK, Emine ESEN TAŞDEMİR, Murat ŞAHİN MilSOFT Yazılım Teknolojileri A.Ş. Teknokent, 06531 ODTU Ankara / TURKEY Mailto:sozturk@milsoft.com.tr,

More information

Title: Search & Detection of Marine Wrecks Using Airborne Magnetometer. Address: Propulsion Division, SOREQ NRC, Yavne 81800, Israel.

Title: Search & Detection of Marine Wrecks Using Airborne Magnetometer. Address: Propulsion Division, SOREQ NRC, Yavne 81800, Israel. Application Information Title: Search & Detection of Marine Wrecks Using Airborne Magnetometer Name: Arie Sheinker Address: Propulsion Division, SOREQ NRC, Yavne 81800, Israel. Tel. 972 8 9434285 Fax.

More information

Agile development of safety-critical software while meetings standards' requirements

Agile development of safety-critical software while meetings standards' requirements 1(37) Agile development of safety-critical software while meetings standards' requirements Matti Vuori, Tampere University of Technology 2011-11-04 Contents 1/2 A study in Ohjelmaturva 4 Tendency to be

More information

RPAS for homeland security applications. Jean CARON Mission Air Systems Lima April 2012

RPAS for homeland security applications. Jean CARON Mission Air Systems Lima April 2012 RPAS for homeland security applications Jean CARON Mission Air Systems Lima April 2012 Agenda RPAS, what is it? Homeland security, what is it? RPAS for Homeland security RPAS Industry capabilities and

More information

Cyber and Operational Solutions for a Connected Industrial Era

Cyber and Operational Solutions for a Connected Industrial Era Cyber and Operational Solutions for a Connected Industrial Era OPERATIONAL & SECURITY CHALLENGES IN A HYPER-CONNECTED INDUSTRIAL WORLD In face of increasing operational challenges and cyber threats, and

More information

DCS - Data Center Shielding. Protection against espionage, electronic attacks and interception. www.rz-products.com

DCS - Data Center Shielding. Protection against espionage, electronic attacks and interception. www.rz-products.com DCS - Protection against espionage, electronic attacks and interception www.rz-products.com DCS - Protect the capital of your company The protection of data and IT infrastructures is no longer related

More information

SOUND INSULATION FOR AIR CONDITIONERS AND OTHER EXTERNAL MECHANICAL PLANT. Installing and Maintaining Air Conditioning Units

SOUND INSULATION FOR AIR CONDITIONERS AND OTHER EXTERNAL MECHANICAL PLANT. Installing and Maintaining Air Conditioning Units SOUND INSULATION FOR AIR CONDITIONERS AND OTHER EXTERNAL MECHANICAL PLANT Excessive noise from the operation of machines and external mechanical plant can disturb neighbours, disrupt sleep, interfere with

More information

Work Smarter, Not Harder: Leveraging IT Analytics to Simplify Operations and Improve the Customer Experience

Work Smarter, Not Harder: Leveraging IT Analytics to Simplify Operations and Improve the Customer Experience Work Smarter, Not Harder: Leveraging IT Analytics to Simplify Operations and Improve the Customer Experience Data Drives IT Intelligence We live in a world driven by software and applications. And, the

More information

Roger s Cyber Security and Compliance Mini-Guide

Roger s Cyber Security and Compliance Mini-Guide Roger s Cyber Security and Compliance Mini-Guide A Mini Guide for Small and Medium Business and not for profit organisations. By Roger Smith Managed Service Provider and Cyber Security Coach R & I ICT

More information

Incident Reporting & Management

Incident Reporting & Management Rivo Software Solution Layer allows you to report and manage incidents such as injuries, accidents and theft. With powerful capabilities including analytical trending you can make better decisions to reduce

More information

CHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

CHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC : INCIDENT RESPONSE THREAT INTELLIGENCE 1 THREAT INTELLIGENCE How it applies to our clients, and discuss some of the key components and benefits of a comprehensive threat intelligence strategy. Threat

More information

Network Mission Assurance

Network Mission Assurance Network Mission Assurance Michael F. Junod, Patrick A. Muckelbauer, PhD, Todd C. Hughes, PhD, Julius M. Etzl, and James E. Denny Lockheed Martin Advanced Technology Laboratories Camden, NJ 08102 {mjunod,pmuckelb,thughes,jetzl,jdenny}@atl.lmco.com

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

GHANA NATIONAL FREQUENCY ALLOCATION TABLE 2013

GHANA NATIONAL FREQUENCY ALLOCATION TABLE 2013 GHANA NATIONAL FREQUENCY ALLOCATION TABLE 2013 Table of Contents INTRODUCTION... 3 TERMS AND DEFINITIONS... 4 STRUCTURE OF THE NATIONAL TABLE OF FREQUENCY ALLOCATIONS... 10 TABLE OF FREQUENCY ALLOCATION...

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

Security Training Why It Benefits Your Organization and How to Make Your Case to Management

Security Training Why It Benefits Your Organization and How to Make Your Case to Management Security Training Why It Benefits Your Organization and How to Make Your Case to Management Author: Nick Murison Senior Security Consultant Foundstone Professional Services Introduction A major challenge

More information

JLENS Overview. 9 May 2013 R AY T H E O N P R O P R I E TA R Y

JLENS Overview. 9 May 2013 R AY T H E O N P R O P R I E TA R Y JLENS Overview 9 May 2013 Copyright 2011 Raytheon Company. All rights reserved. Customer Success Is Our Mission is a registered trademark of Raytheon Company. Source 1,2 Standard Missile - Range: Medium

More information

Agenda Overview for Emerging Marketing Technology and Trends, 2015

Agenda Overview for Emerging Marketing Technology and Trends, 2015 G00270688 Agenda Overview for Emerging Marketing Technology and Trends, 2015 Published: 18 December 2014 Analyst(s): Andrew Frank The best digital marketers exploit emerging trends and technologies to

More information

Security is one of the biggest concerns today. Ever since the advent of the 21 st century, the world has been facing several challenges regarding the security of people, economy, and infrastructure. One

More information

Physical Security of Remote Pilot Stations and Aircrafts (when On Ground)

Physical Security of Remote Pilot Stations and Aircrafts (when On Ground) Physical Security of Remote Pilot Stations and Aircrafts (when On Ground) Airbus Defence and Space / Military Aircraft / INFOSEC Juan Domingo Airbus Defence and Space INFOSEC Expert IF-G-MES84-15002 Table

More information