For more information please contact:

info@airinformatics.com

Copyright © 2008-2016 Air Informatics® LLC

Meeting the Information Needs of Aviation

Links of interest:

With any new or emerging technology application many questions arise. The links to the described documents provide information that may help to expand your knowledge base and answer a few questions. This list will change and grow over time. If you want to be notified of additions to this list, please email a request to the address given below.

links_subscription@airinformatics.com

The information below is provided to inform our customers and the aviation community on issues important to the development and operation of IT-enabled Airplanes and systems. The National Institute of Standards and Technology (NIST) Special Publications are especially important as the backbone of the emerging AEEC and ARINC aviation security standards. 

Important Articles, Reports and Links

Business Reports, Articles and Papers

Technical Analysis and Reports

Airplane, Software, and Network Security Analysis and Reports

National Institute of Standards and Technology (NIST) Special Publications

Federal Aviation Administration (FAA) Reports, Publications and Special Conditions

Boeing's e-Enabled Advantage, Jul 12, 2006, Lynda M. Applegate, Joseph S. Valacich, Mara E. Vatz, Christoph Schneider;The Harvard Business Publishing case study examines Boeing's new strategy of offering services to regain market dominance and help its struggling airline customers improve efficiency and profitability.;Click this paragraph to go to the HBS order page. https://hbr.org/product/Boeing-s-e-Enabled-Advant/an/807011-PDF-ENG
Rolls Royce: Britain’s lonely high-flyer, Jan 8, 2008, DERBY;A resurgent Rolls-Royce has become the most powerful symbol of British manufacturing. Its success may be hard to replicate, especially in difficult times.;Click this paragraph to go to the Economist.com web site for a copy of this article. http://www.economist.com/business/displayStory.cfm?story_id=12887368 http://www.economist.com/business/displayStory.cfm?story_id=12887368 shapeimage_15_link_0
Wi-Fi Gatelink Trial white paper, Aug 2006, Juan Carlos Joday, Jeannie Hendricks, Andrew Kemmetmueller. This report presents the results from the ARINC WiFi Gatelink Trials. ;Click this paragraph to download a copy of their “Wi-Fi Gatelink Trial” white paper from the ARINC site. http://www.arinc.com/downloads/gatelink_trial_white_paper.pdf
Board of Appeal of the European Patent Office, Case Number T_0382/03 - 3.5.1, Wireless frequency-agile spread spectrum ground link-based aircraft data communication system. Many Gatelink systems, equipment and those companies providing services are impacted by existing and emerging patents. Some companies have attempted to extend their patents rights beyond the U.S. borders. Click this paragraph to go to the European Patent Office web site for the report on a successful challenge to the extension of U.S. patents. ;Click this paragraph to download the Appeal Board report from the European Patent Office Web site. http://legal.european-patent-office.org/dg3/pdf/t030382eu1.pdf
Information Assurance Technical Framework (IATF), Release 3.1, Sep 2000, UNCLASSIFIED, Issued by: National Security Agency Information Assurance Solutions Technical Directors, Booz-Allen and Hamilton. This document captures security needs and potential technology solutions for information systems and networks. The information contained in this document is provided for information purposes only.”  ;Click this paragraph to download the paper from the cryptome.org web site. http://cryptome.org/nsa-iatf-3-1.zip
Click here for version v3.0 http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA393328&Location=U2&doc=GetTRDoc.pdf
Common Event Expression, June 2008. This Mitre white paper defines a framework to enable collaborative efforts in the creation of an open, practical, and industry-accepted event interoperability standard for electronic systems. Click this paragraph to download the report from the the Mitre web site. http://cee.mitre.org/docs/Common_Event_Expression_White_Paper_June_2008.pdf
Common Criteria for Information Technology Security Evaluation, CCMB-2006-09-001, Ver 3.1 Rev 1, Sep 2006, part 1, Introduction and general model. The CC permits comparability between the results of independent security evaluations. 
Click this paragraph to download the document from the common criteria portal.org web site. http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R1.pdf
Click here for part 2, “Security functional components” http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R1.pdf
Click here for part 3, “Security assurance components” http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R1.pdf
Common Methodology for Information Technology Security Evaluation, CCMB-2007-09-004, Ver 3.1, Rev 2, Sep 2007, part 1, Evaluation methodology. Click this paragraph to download the report from the commoncriterialporta.org web site. http://www.commoncriteriaportal.org/files/ccfiles/CEMV3.1R2.pdf
Secure Operation, Control, and Maintenance of Future E-Enabled Airplanes, Jan 16, 2009 (Revised), Krishna Sampigethaya, Radha Poovendran, Linda Bushnell, Invited Paper, Proceedings of the IEEE, Special issue on Aviation Information Systems, December 2008. “Measures to protect safety and business viability are important in the operation, control and maintenance of aircraft and air traffic enabled by advanced information systems.” Click this paragraph to download the paper from the University of Washington web site. http://www.ee.washington.edu/research/nsl/papers/PROC-08.pdf
Secure Network-Enabled Commercial Airplane Operations: IT Support Infrastructure Challenges, Sep 2007, Richard Robinson, Krishna Sampigethaya, Mingyan Li, Scott Lintelman, Radha Poovendran, David von Oheimb, First CEAS European Air and Space Conference Century Perspectives (CEAS). “The next-generation commercial airplane models have networking facilities that enable onboard systems to communicate between themselves as well as with off-board systems. However, vulnerabilities are introduced that can threaten the onboard systems.” Click this paragraph to download the paper from the University of Washington web site. http://www.ee.washington.edu/research/nsl/papers/CEAS-07.pdf
Impact of Public Key Enabled Applications on the Operation and Maintenance of Commercial Airplanes, Sep 2007, Richard Robinson, Mingyan Li, Scott Lintelman, Krishna, Sampigethaya, Radha Poovendran, David von Oheimb, Jens-Uwe Bußer, AIAA Aviation Technology, Integration and Operations (ATIO) conference. This paper addresses challenges that emerge for network-enabled airplanes that use public key cryptography-based applications.” Click this paragraph to download the paper from the University of Washington web site. http://www.ee.washington.edu/research/nsl/papers/ATIO-07.pdf
Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety, Sep 2007, Richard Robinson, Mingyan Li, Scott Lintelman, Krishna Sampigethaya, Radha Poovendran, David von Oheimb, Jens-Uwe Bußer, and Jorge Cuellar, International Conference on Computer Safety, Reliability and Security (Safecomp). This paper explores the role of information security in emerging information technology (IT) infrastructure for distribution of safety-critical and business-critical airplane software and data.” Click this paragraph to download the paper from the University of Washington web site. http://www.ee.washington.edu/research/nsl/papers/SAFECOMP-07.pdf
Click here for part 2, “Security functional components” http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R1.pdf
An Introduction to Computer Security: The NIST Handbook, Oct 1995 ; ;Click this paragraph to download the report from the nist.gov web site. http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdfhttp://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdfshapeimage_22_link_0
Telecommunications Security Guidelines for Telecommunications Management Network, Oct 1995 ; ;Click this paragraph to download the report from the nist.gov web site. http://csrc.nist.gov/publications/nistpubs/800-13/sp800-13.pdfhttp://csrc.nist.gov/publications/nistpubs/800-13/sp800-13.pdfshapeimage_29_link_0
Contingency Planning Guide for Information Technology Systems, Jun 2002 ; ;Click this paragraph to download the report from the nist.gov web site. http://csrc.nist.gov/publications/nistpubs/800-34-rev1/sp800-34-rev1_errata-Nov11-2010.pdfhttp://csrc.nist.gov/publications/nistpubs/800-34-rev1/sp800-34-rev1_errata-Nov11-2010.pdfshapeimage_30_link_0
Creating a Patch and Vulnerability Management, Version 2.0, Nov 2005. Click this paragraph to download the report from the nist.gov web site. http://csrc.nist.gov/publications/nistpubs/800-40-Ver2/SP800-40v2.pdfhttp://csrc.nist.gov/publications/nistpubs/800-40-Ver2/SP800-40v2.pdfshapeimage_23_link_0
Guidelines on Electronic Mail Security, Version 2.0, Feb, 2007 ; ;Click this paragraph to download the report from the nist.gov web site. http://csrc.nist.gov/publications/nistpubs/800-45-version2/SP800-45v2.pdf http://csrc.nist.gov/publications/nistpubs/800-45-version2/SP800-45v2.pdfshapeimage_24_link_0
Recommendation for Key Management, Mar 8, 2007 ; ;Click this paragraph to download the report from the nist.gov web site. http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57-Part1-revised2_Mar08-2007.pdf http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57-Part1-revised2_Mar08-2007.pdfshapeimage_31_link_0
Computer Security Incident Handling Guide, Rev. 1, Mar 2008 ; ;Click this paragraph to download the report from the nist.gov web site. http://csrc.nist.gov/publications/nistpubs/800-61-rev1/SP800-61rev1.pdfhttp://csrc.nist.gov/publications/nistpubs/800-61-rev1/sp800-61.pdfshapeimage_25_link_0
Click here for part 2, “Recommendation for Key Management” http://csrc.nist.gov/publications/nistpubs/800-57/SP800-57-Part2.pdf
Click here for part 3 Draft, “Recommendation for Key Management” http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_PART3_key-management_Dec2009.pdf
Guide to Malware Incident Prevention and Handling, Nov 2005 ; ;Click this paragraph to download the report from the nist.gov web site. http://csrc.nist.gov/publications/nistpubs/800-83/SP800-83.pdfhttp://csrc.nist.gov/publications/nistpubs/800-83/sp800-83.pdfshapeimage_26_link_0
Computer Security Incident Handling Guide, May 2008. Click this paragraph to download the report from the nist.gov web site. http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf http://csrc.nist.gov/publications/nistpubs/800-92/sp800-92.pdf shapeimage_25_link_0
Guide to Intrusion Detection and Prevention Systems (IDPS), Feb 2007. ; ;Click this paragraph to download the report from the nist.gov web site. http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf nist800-94_link_0
User's Guide to Securing External Devices for Telework and Remote Access, Nov 2007 ; ;Click this paragraph to download the report from the nist.gov web site. http://csrc.nist.gov/publications/nistpubs/800-114/SP800-114.pdfhttp://csrc.nist.gov/publications/nistpubs/800-114/SP800-114.pdfnist800-114_link_0
Technical Guide to Information Security Testing and Assessment, Sept 2008 ; ;Click this paragraph to download the report from the nist.gov web site. http://csrc.nist.gov/publications/nistpubs/800-115/SP800-115.pdfhttp://csrc.nist.gov/publications/nistpubs/800-115/SP800-115.pdf nist800-115_link_0
Recommendations for EAO Methods Used in Wireless Network Access Authentication, Sept 2009 ; ;Click this paragraph to download the report from the nist.gov web site. http://csrc.nist.gov/publications/nistpubs/800-120/sp800-120.pdf http://csrc.nist.gov/publications/nistpubs/800-120/sp800-120.pdf nist800-120_link_0
Guide to Securing WIMAX Communications, Sept 2010 ; ;Click this paragraph to download the report from the nist.gov web site. http://csrc.nist.gov/publications/nistpubs/800-127/sp800-127.pdf http://csrc.nist.gov/publications/nistpubs/800-127/sp800-127.pdf nist800-127_link_0
Guide for Security-Focused Configureation Management of Information Systems, Aug 2011 ; ;Click this paragraph to download the report from the nist.gov web site. http://csrc.nist.gov/publications/nistpubs/800-128/sp800-128.pdf http://csrc.nist.gov/publications/nistpubs/800-128/sp800-128.pdf nist800-128_link_0
Recommendations for Cryptographic Key Generation, July 2011. Click this paragraph to download the report from the nist.gov web site. http://csrc.nist.gov/publications/drafts/800-133/Draft-SP-800-133_Key-Generation.pdf http://csrc.nist.gov/publications/drafts/800-133/Draft-SP-800-133_Key-Generation.pdf nist800-133_link_0
DOT/FAA/AR-08/35, Handbook for Networked Local Area Networks in Aircraft, Eric Fleischman. This Handbook addresses potential safety impacts introduced by networking LANs onboard aircraft. Click this paragraph to download the paper from the faa.gov web site. http://www.tc.faa.gov/its/worldpac/techrpt/ar0835.pdf
DOT/FAA/AR-08/31, Networked Local Area Networks in Aircraft: Safety, Security, and Certification Issues and Initial Acceptance Criteria (Phases 1 and 2, Jan 2008, E. Fleischman N. Multari R. E. Smith. This is the final report of a 2-year Federal Aviation Administration (FAA)-funded study to address security and safety issues associated with networked airborne local area networks. Click this paragraph to download the report from the the faa.gov web site. http://www.faa.gov/aircraft/air_cert/design_approvals/air_software/media/AR-08-31.pdf
FAA-STD_039C, Aug 2003, E. Fleischman N. Multari R. E. Smith. Click this paragraph to download the report from the the faa.gov web site. http://www.faa.gov/air_traffic/nas/system_standards/standards/media/pdf/FAA-STD-039C.pdf
FAA-STD-45A, National Aerospace Systems (NAS) Communications Security Protocols and Mechanisms, March 2005. Click this paragraph to download the report from the the faa.gov web site. http://www.everyspec.com/FAA/FAA-STD/download.php?spec=FAA-STD-045A.00000104.pdf
FAA Standard-042B, National Aerospace System (NAS) Naming and Addressing Structure for Ground-to-Ground communication, 11 MAR 2005. Click this paragraph to download the report from the the faa.gov web site. http://www.everyspec.com/FAA/FAA-STD/download.php?spec=FAA-STD-042B.020306.pdf
FAA Standard-060B, Aug 2003, Data Standard for the National Aerospace System. Click this paragraph to download the report from the the acc.dau.mil web site. https://acc.dau.mil/adl/en-US/33741/file/6859/FAA-STD-060_REVB%20Data%20Std%20for%20the%20NAS.pdf
FAA Standard AC 20-166, June 15, 2010, Issue Paper Process. Click this paragraph to download the AC from the the faa.gov web site. http://www.faa.gov/documentLibrary/media/Advisory_Circular/AC%2020.166.pdf
TCCA Staff Instruction, Development, Approval and Publication of Special Conditions - Airworthiness, 2011-10-03. Click this paragraph to download the Staff Instruction from the the tc.gc.ca web site. http://www.tc.gc.ca/media/documents/ca-opssvs/SI_500-004_-_DEVELOPMENT_AND_PROCESSING_OF_SPECIAL_CONDITIONS.pdf
Special Conditions: Boeing Model 787-8 Airplane; Systems and Data Networks Security-Protection of Airplane Systems and Data Networks from Unauthorized External Access, Dec 2007. These special conditions are issued for the Boeing 787-8 airplane. The architecture of the Boeing 787-8 computer systems and networks may allow access to external systems and networks, such as wireless airline operations and maintenance systems, satellite communications, electronic mail, the Internet, etc. Click this paragraph to download the report from the the gpo.gov web site. http://edocket.access.gpo.gov/2007/E7-25075.htm
Special Conditions: Boeing Model 787-8 Airplane; Systems and Data Networks Security--Isolation or Protection From Unauthorized Passenger Domain Systems Access, Jan 2008. These special conditions are issued for the Boeing 787-8 airplane. This airplane will have novel or unusual design features when compared to the state of technology envisioned in the airworthiness standards for transport category airplanes. Click this paragraph to download the report from the the gpo.gov web site. http://edocket.access.gpo.gov/2008/E7-25467.htm
These special conditions are issued for the Boeing Model 747-8/-8F airplane. This airplane will have novel or unusual design features associated with the architecture and connectivity capabilities of the airplane's computer systems and networks, which may allow access to external computer systems and networks. Connectivity to external systems and networks may result in security vulnerabilities to the  airplane's systems. Click this paragraph to download the report from the the gpo.gov web site. http://www.gpo.gov/fdsys/pkg/FR-2010-01-15/html/2010-661.htm
These special conditions are issued for Boeing Model 747-8 airplanes. This airplane will have novel or unusual design features associated with connectivity of the passenger domain computer systems to the airplane critical systems and data networks. Click this paragraph to download the report from the the gpo.gov web site. http://www.gpo.gov/fdsys/pkg/FR-2011-03-18/html/2011-6323.htm
These special conditions are issued for the Gulfstream Aerospace LP, Model Gulfstream G280 airplane. This airplane will have novel or unusual design features associated with the architecture and connectivity capabilities of the airplane's computer systems and networks, which may allow access to or by external computer systems and networks. Connectivity to, or access by, external systems and networks may result in security vulnerabilities to the airplane's systems. Click this paragraph to download the report from the the gpo.gov web site. http://www.gpo.gov/fdsys/pkg/FR-2012-06-18/html/2012-14787.htm
These special conditions are issued for the Gulfstream Aerospace LP, Model Gulfstream G280 airplane. This airplane will have novel or unusual design features associated with connectivity of the passenger service computer systems to the airplane critical systems and data networks. Click this paragraph to download the report from the the gpo.gov web site. http://www.gpo.gov/fdsys/pkg/FR-2012-06-28/html/2012-15913.htm
These special conditions are issued for the Gulfstream Aerospace Corporation Model GIV-X airplane. This airplane will have novel or unusual design features associated with connectivity of the passenger domain computer systems to the airplane critical systems and data networks. Click this paragraph to download the report from the the gpo.gov web site. http://www.gpo.gov/fdsys/pkg/FR-2011-10-20/pdf/2011-27198.pdf
These special conditions are issued for the Gulfstream Aerospace Corporation Model GIV-X airplane. This airplane will have novel or unusual design features associated with connectivity of the passenger domain computer systems to the airplane critical systems and data networks. Click this paragraph to download the report from the the gpo.gov web site. http://www.gpo.gov/fdsys/pkg/FR-2011-10-20/pdf/2011-27196.pdf
Special Conditions No. 25-437-SC: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From Unauthorized External Access  Click this paragraph to download the report from the the gpo.gov web site. http://www.gpo.gov/fdsys/pkg/FR-2011-06-23/pdf/2011-15706.pdf
Special Conditions No. 25-436-SC: Gulfstream Model GVI Airplane; Electronic Systems Security Isolation or Protection From Unauthorized Passenger Systems Access Click this paragraph to download the report from the the gpo.gov web site. http://www.gpo.gov/fdsys/pkg/FR-2011-06-23/pdf/2011-15705.pdf
OpSpec D301, Aircraft Network Security Program (ANSP), N 8900.189, 5/31/12. This notice introduces a new operations specification (OpSpec) D301, Aircraft Network Security Program (ANSP), to support the operation of Next Generation (NextGen) e-Enabled aircraft. Click this paragraph to download the report from the the gpo.gov web site. http://www.faa.gov/documentLibrary/media/Notice/N%208900.189.pdf
Policy Statement, PS-AIR-21.16_2, 3/6/14. This policy statement is intended to provide guidance to the Aircraft Certification Offices regarding the application of special conditions to address cyber security vulnerabilities in aircraft certification programs. Click this paragraph to download the report from the the gpo.gov web site. https://www.airweb.faa.gov/Regulatory_and_Guidance_Library/rgPolicy.nsf/0/34e0a8b89f20a44686257c93006b20e5/$FILE/PS-AIR-21.16-02.pdf
Advisory Circular, AC-119-1, 9/30/15. This advisory circular (AC) describes an acceptable means, but not the only means, of obtaining operational authorization for an aircraft certified with a special condition (SC) related to security of the onboard computer network. Click this paragraph to download the report from the the airweb.faa.gov web site. http://www.faa.gov/documentLibrary/media/Advisory_Circular/AC_119-1.pdf
Advisory Circular, AC-119-1, 9/30/15. This advisory circular (AC) describes an acceptable means, but not the only means, of obtaining operational authorization for an aircraft certified with a special condition (SC) related to security of the onboard computer network. Click this paragraph to download the report from the the airweb.faa.gov web site. https://www.casa.gov.au/sites/g/files/net351/f/_assets/main/download/caaps/ops/232_1.pdf

“Boeing's e-Enabled Advantage”

Rolls Royce: Britain’s lonely high-flyer

“Gatelink WiFi Trial”

Gatelink Patent Issues

Information Assurance Technical Framework (IATF)

Common Event Expression

“Common Criteria for Information Technology Security Evaluation”

“Common Methodology for Information Technology Security Evaluation”

“Secure Operation, Control, and Maintenance of Future E-Enabled Airplanes”

“Secure Network-Enabled Commercial Airplane Operations: IT Support Infrastructure Challenges”

“Impact of Public Key Enabled Applications on the Operation and Maintenance of Commercial Airplanes”

Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety

NIST Special Publication 800-12, An Introduction to Computer Security: The NIST Handbook

NIST Special Publication 800-13, Telecommunications Security Guidelines for Telecommunications Management Network

NIST Special Publication 800-34, Contingency Planning Guide for Information Technology Systems

NIST Special Publication 800-40, Creating a Patch and Vulnerability Management

NIST Special Publication 800-45, Guidelines on Electronic Mail Security

NIST Special Publication 800-57, Recommendation for Key Management

NIST Special Publication 800-61, Computer Security Incident Handling Guide

NIST Special Publication 800-83, Guide to Malware Incident Prevention and Handling

NIST Special Publication 800-92, Guide to Computer Security Log Management

NIST Special Publication 800-94, Guide to Intrusion Detection and Prevention Systems (IDPS)

NIST Special Publication 800-114, User's Guide to Securing External Devices for Telework and Remote Access

NIST Special Publication 800-115, Technical Guide to Information Security Testing and Assessment

NIST Special Publication 800-120, Recommendation for EAP Methods Used in Wireless Network Access Authentication

NIST Special Publication 800-127, Guide to Securing WiMax Communications

NIST Special Publication 800-128, Guide for Security-Focused Configuration Management of Information Systems

NIST Special Publication 800-133, Recommendations for Cryptographic Key Generation

“DOT/FAA/AR-08/35, Handook for Networked Local Area Networks in Aircraft”

“DOT/FAA/AR-08/31, Networked Local Area Networks in Aircraft: Safety, Security, and Certification Issues and Initial Acceptance Criteria (Phases 1 and 2)”

“FAA-STD-039C, National Airspace System (NAS) Open System Architecture and Protocols”

“FAA-STD-045A, National Aerospace Systems (NAS) Communications Security Protocols and Mechanisms”

“FAA-STD-042B, National Aerospace Systems (NAS) Naming and Addressing Structures for Ground-to-Ground Communication, March 2005”

“FAA-STD-060B, Data Standard for the National Airspace System, March 2004”

FAA, Transport Canada, and EASA issued Special conditions are searchable by clicking the links below:

FAA, Transport Canada, and EASA Special condition process are defined bt the following documents:

“FAA Advisory Circular, Issue Paper Process, AC 20-166, June 15,2010”

“Transport Canada, Development, Approval and Publications of Special Conditions - Airworthiness, SI 500-004, 2011-10-03”

“Special Conditions: Boeing Model 787-8 Airplane; Systems and Data Networks Security-Protection of Airplane Systems and Data Networks from Unauthorized External Access”

“Special Conditions: Boeing Model 787-8 Airplane; Systems and Data Networks Security-Isolation or Protection From Unauthorized Passenger Domain Systems Access”

“Special Conditions No. 25-401-SC: Boeing Model 747-8/-8F Airplanes, Systems and Data Networks Security--Protection of Airplane Systems and Data Networks From Unauthorized External Access”

“Special Conditions No. 25-421-SC: Boeing Model 747-8 Airplanes, Systems and Data Networks Security--Isolation or Protection From Unauthorized Passenger Domain Systems Access”

“Special Conditions No. 25-465-SC: Gulfstream Aerospace LP (GALP), Model Gulfstream G280 Airplane; Aircraft Electronic System Security Protection From Unauthorized External Access”

“Special Conditions No. 25-464-SC: Gulfstream Aerospace LP (GALP), Model Gulfstream G280 Airplane; Isolation or Aircraft Electronic System Security Protection From Unauthorized Internal Access”

“Special Conditions No. 25-450-SC: Gulfstream Aerospace Corporation, Model GIV-X Airplane; Isolation or Aircraft Electronic System Security Protection From Unauthorized Internal Access”

“Special Conditions No. 25-451-SC: Gulfstream Aerospace Corporation, Model GIV-X Airplane; Aircraft Electronic System Security Protection From Unauthorized External Access ”

“Special Conditions No. 25-437-SC: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From Unauthorized External Access”

“Special Conditions No. 25-436-SC: Gulfstream Model GVI Airplane; Electronic Systems Security Isolation or Protection From Unauthorized Passenger Systems Access”

“OpSpec D301, Aircraft Network Security Program (ANSP), N 8900.189, 5/31/12”

“PS-AIR-21.16-02, Establishment of Special Conditions for Cyber Security, 3/6/14”

“Advisory Circular, AC-119-1, Airworthiness and Operational Authorization of Aircraft Network Security Program (ANSP), 9/30/2015, 3/6/14”

“Australian Civil Aviation Advisory Publication, CAAP 232A-1(0), Administration of Aircraft and Related Ground Support Network Security Programs, 9/30/2015, March 2013”