THALES Secure CMS: from a highly secure to the Trusted Information Exchange
Creators
Description
THALES Netherlands Naval is recognized as a distinguished, high class system integrator who provides cybersecurity as an integral part of its complex systems, where the Tacticos naval CMS (Combat Management System) is just one example taken out of its large portfolio. Mastering Security requires a professionally managed, orchestrated evolution of all underlying cybersecurity technologies. Latest when it comes to secure and even trusted computing on THALES systems, the presented results contribute to THALES’ discriminator solutions that excel not only in the naval CMS realm. THALES Research and Technology directorate manages the stepwise, well-considered application of emerging cybersecurity technologies, leading to high technology systems that navies worldwide can trust upon, both
now and in the future. To illustrate this fascinating ongoing THALES cybersecurity journey, the current paper provides realized examples that demonstrate some of the important early steps taken. For successfully mastering the complexity of naval IT platform systems an optimization approach is derived where Security necessarily comprises of more than only these three dimensions that are commonly known as confidentiality, availability and integrity. This paper focuses on ’Information and communication technologies’. In particular, the discussed Machine Authentication Continuum and Remote Attestation provide new insights on some techniques to power THALES solutions to a new distinctive level of cybersecurity. It is elaborated how well-considered applications of these technologies enhance the trust that navies globally can rely on: well-thought-out use cases demonstrate how Trusted Hardware harnesses the trusted information exchange between the complexity of subsystems that constitute the overall naval IT platform. This paper will further show how a concept of i.a. signed messages fits into complex architectures.
Files
INEC_2020_Paper_64.pdf
Files
(2.9 MB)
Name | Size | Download all |
---|---|---|
md5:554635a51618373f790a75b742dbf9a9
|
2.9 MB | Preview Download |
Additional details
References
- Bundesamt für Sicherheit in der Informationstechnik: 'Das Trusted Platform Module (TPM) und vertrauenswürdige Informationstechnik. Informationen zum zentralen Baustein des Trusted Computing…', https://www.bsi.bund.de/DE/Themen/Cyber-Sicherheit/Aktivitaeten/Trusted Computing/TrustedPlatformModuleTPM/dastrustedplatformmoduletpm_node.html
- Parker, Donn B. (1998). Fighting Computer Crime: A New Framework for Protecting Information. New York: NY: John Wiley & Sons. ISBN 0-471-16378-3.
- ISO/IEC 31010:2009 – Risk Management – Risk Assessment Techniques
- ISO Guide 73:2009 – Risk Management – Vocabulary
- EBIOS (Risk Manager) method https://www.ssi.gouv.fr/uploads/2019/11/anssi-guide-ebios_risk_manager-en-v1.0.pdf