We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Aerospace Village - Critical Aerospace Cybersecurity

00:00

Formal Metadata

Title
Aerospace Village - Critical Aerospace Cybersecurity
Subtitle
A changing paradigm and how you can help
Title of Series
Number of Parts
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Aerospace is changing – Its digital transformation must now be synonymous with being cyber secure. In-cabin systems are looking more like your everyday living room and the numerous potential entry points must be tested for security. During this session we will take you through the offensive testing that we put systems through to show you what is happening to improve the life cycle of aviation systems thanks to cybersecurity-by-design principles influenced by a hack/fix process. From design to operation, blue teams and red teams are working together for a first line of defense to help identify vulnerabilities and ensure more robust and resilient systems – systems which we all rely on, and must be certified by Airworthiness Authorities when safety is at stake. Join Nathalie Feyt, Lawrence Rowell and Yannick Le Ray as they lead a presentation on securing avionics, passenger systems, and air traffic management systems, and show how industry designs, attacks, learns and improves aerospace systems.
Online helpAerodynamicsWeb pageInformation technology consultingOperations researchProduct (business)Disk read-and-write headInformationCybersexProgramming paradigmPhysical systemInformation technology consultingInformation securityCybersexDisk read-and-write headProduct (business)Operator (mathematics)Office suitePresentation of a groupInformationSoftware developerConnected spaceAnnihilator (ring theory)Focus (optics)Panel painting
Digital signalTransformation (genetics)CybersexInformation securityHacker (term)ChainShift operatorGoodness of fitAnnihilator (ring theory)Programming paradigmCybersexPhysical systemInformation securityChainData managementDigital signal processingFocus (optics)Hacker (term)Computer animation
Service (economics)Line (geometry)Digital signal processingGame controllerSoftware maintenanceCybersexInformation securitySurfaceSlide rulePresentation of a groupPhysical system
Physical systemIntegrated development environmentCondition numberConnected spaceSelf-organizationInformation securityCybersexCycle (graph theory)Video gameOnline helpDigital signal processing2 (number)Analytic continuationOperator (mathematics)Digital signal processingHacker (term)
Hacker (term)Dean numberMathematical analysisSoftware testingHacker (term)Type theoryTerm (mathematics)Integrated development environmentLatent heatVirtual realityInternetworkingService (economics)Internet service providerPhysical systemDesign by contractVulnerability (computing)Server (computing)Game controllerSlide ruleGoodness of fitAnnihilator (ring theory)Information security
Product (business)WordPoint (geometry)Programming paradigmRule of inferenceState of matterSoftware testingInformation securityCybersexCASE <Informatik>Line (geometry)Archaeological field surveyMultiplication signDivisorMereologyPhysical systemType theoryPower (physics)Annihilator (ring theory)Product (business)Limit (category theory)Integrated development environmentNumberConnectivity (graph theory)Computer architectureVector spaceEndliche ModelltheoriePersonal identification numberData conversionCuboidInformationVector potentialVulnerability (computing)Data managementShift operatorClosed setLevel (video gaming)
Service (economics)Order (biology)EvoluteNumberTerm (mathematics)Interface (computing)Physical systemTouchscreenInformationInformation securityMathematicsSoftware testingGoodness of fitInternetworkingSelectivity (electronic)AreaMereologyAnnihilator (ring theory)Nichtlineares GleichungssystemUsabilityContent (media)Cartesian coordinate systemGame theoryGoogolComputer configurationMobile appData storage deviceFastkörperComputer animation
Public domainData managementWorkstation <Musikinstrument>Computer networkInternetworkingPersonal identification numberAnnihilator (ring theory)Remote procedure callProduct (business)Multiplication signWebsiteCollaborationismUser interfaceDifferent (Kate Ryan album)Integrated development environmentEvoluteAreaSimilarity (geometry)Vapor barrierProcess capability indexVector spaceCASE <Informatik>Forcing (mathematics)Euler anglesView (database)Information securityCybersexMathematicsNumberPhysical systemSoftware testingProgramming paradigmGoodness of fitShift operatorHacker (term)Laurent seriesRight angle
Hacker (term)Physical systemPoint cloudClassical physicsSoftware testingComputer programmingPhase transitionReal numberHacker (term)Multiplication signPatch (Unix)TheoryTrailTwin primeCybersexAreaProduct (business)Interactive televisionInternetworkingSimulationWave packetGoodness of fitInformation and communications technologyCycle (graph theory)Operator (mathematics)Internet service providerProgramming paradigmSoftware frameworkConstraint (mathematics)IdentifiabilityIntelligent NetworkAnnihilator (ring theory)Web portalSoftware bugBoom (sailing)MereologyAvionics Full-Duplex Switched EthernetCommunications protocolTheory of relativitySocial classSequenceFunctional (mathematics)Representation (politics)Instance (computer science)National Institute of Standards and Technology2 (number)Laurent seriesINTEGRALWebsiteRankingDiagram
Data recoveryOnline helpExplosionPhysical systemPatch (Unix)Vulnerability (computing)Software testingField (computer science)Level (video gaming)CASE <Informatik>Configuration spacePhase transitionSoftware frameworkProduct (business)SubsetSignal processingSound effectDependent and independent variablesMultiplication signTouch typingGoodness of fitIncidence algebraInformation securityService (economics)InternetworkingHacker (term)Real numberReliefBit rateCartesian coordinate systemBitSource codeKnowledge-based configurationDescriptive statisticsSoftware maintenanceEvent horizonComputer programmingVideoconferencingAnnihilator (ring theory)Type theoryOperator (mathematics)Standard deviationConstraint (mathematics)Traffic reportingComputer animation
Vulnerability (computing)Operator (mathematics)Incidence algebraDependent and independent variablesChannel capacityArithmetic meanInformation securitySoftware maintenanceInformationCybersexPhysical systemInteractive televisionHacker (term)Point (geometry)Shared memoryComputer animationDiagram
Constraint (mathematics)Operator (mathematics)Phase transitionRepresentation (politics)Physical systemPlanningEmbedded systemChainGoodness of fitHacker (term)Vulnerability (computing)MereologyProgramming paradigmTouch typingWebsiteSoftware testingView (database)INTEGRALLorenz curveAnnihilator (ring theory)
Quantum stateFreewareProduct (business)Information securityTouch typingAddress spaceTouchscreenArithmetic meanDependent and independent variablesPhysical system
Transcript: Englisch(auto-generated)