Breadcrumb
- Home
- Capabilities
- Technologies
- Security
Comprehensive Protection Throughout the Product LifeCycle
Curtiss-Wright goes beyond standard approaches to Trusted Computing to provide truly secure solutions for air, ground, and sea platforms. By keeping cybersecurity and physical protection in mind, from design and testing to supply chain and manufacturing, we can provide a comprehensive, end-to-end approach that creates an effective mesh of protection layers that integrate to ensure the reliability of Curtiss-Wright products in the face of attempted compromise.
Our Trusted Computing solutions are designed and built around three major data protection domains:
- Technology protection safeguards how computing tasks are executed. It combines the hardware capabilities, software algorithms, and operations needed to protect functionality, such as how the algorithm in a radar application works.
- Data protection safeguards software algorithms, data-at-rest, and data-in-motion. It ensures that, for example, when data is sent from one system to another, it is not compromised.
- Parts protection safeguards the supply chain and manufacturing processes. This parts protection approach ensures customers can trust that all components on Curtiss-Wright products are authentic and all processes have met the strictest quality controls.
The Evolving State of Network Security
In a constantly evolving threat environment, where new attacks arrive virtually every day, system architects must design networks to be as secure as possible. Network security involves protecting all devices that are connected or have access to the network. Embedded networks are expanding to connect more devices and between systems that previously would not have been connected. Solutions are being continually developed to address emerging threats and challenges.
Data Protection Domains
Proven and certified COTS storage solutions that match data security requirements, from NSA Type 1, CSfC, CC, to FIPS 140-2.
Data-in-motion, also called data-in-transit, refers to digital information when transferring between network system nodes.
Our TrustedCOTS products provide confidence in the security and un-compromised protections.
Curtiss-Wright go the extra mile to protect supply chain and manufacturing processes.
TrustedCOTS and Enhanced TrustedCOTS for Trusted Computing
Explore DAR Encryption Approaches
Systems designers must employ the correct cryptography algorithms in their proper modes to secure secret or sensitive data in military trusted computing. Symmetric cryptography can provide confidentiality for data-at-rest and data-in-transit. In this approach, the same key encrypts and decrypts data to ensure the secrecy of that key, which is critical for ensuring the secrecy of the protected data. Systems designers choose different algorithms based on their performance requirements, their desired level of security, and necessary certifications.
Endorsed by the NSA for securing classified and sensitive U.S. Government information when appropriately keyed.
Strategy to deliver secure solutions that leverage commercial technologies and products.
An internationally recognized security certification standard for commercial cryptography.
Secure Wireless Solutions for Tactical, Expeditionary, and Deployable Communications
This whitepaper compares various CSfC network architectures, and proposes several approaches for CSfC solutions optimized for mobility use cases.
Secure Wireless Solutions for Tactical, Expeditionary, and Deployable Communications
This whitepaper compares various CSfC network architectures, and proposes several approaches for CSfC solutions optimized for mobility use cases.
The SOSA Technical Standard and Trusted Computing for Defense Systems
The SOSA Technical Standard combines MOSA principles with security to enable secure sensor processing systems to be quickly developed and deployed in a low-risk environment.
The SOSA Technical Standard and Trusted Computing for Defense Systems
The SOSA Technical Standard combines MOSA principles with security to enable secure sensor processing systems to be quickly developed and deployed in a low-risk environment.
Why Trusted Platform Modules are Critical to Deployed Network Attached Storage
Classified data-at-rest (DAR) in deployed applications faces both internal and external threats that can subject sensitive data to exploitation.
Why Trusted Platform Modules are Critical to Deployed Network Attached Storage
Classified data-at-rest (DAR) in deployed applications faces both internal and external threats that can subject sensitive data to exploitation.
Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions
Review the challenges for deploying QR encryption and how to implement DAR and data-in-transit QR encryption solutions using commercial FPGA devices and off-the-shelf hardware.
Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions
Review the challenges for deploying QR encryption and how to implement DAR and data-in-transit QR encryption solutions using commercial FPGA devices and off-the-shelf hardware.
Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption
The goal of post-quantum cryptography is to develop cryptographic systems that are secure and can interoperate with existing communications protocols and networks.
Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption
The goal of post-quantum cryptography is to develop cryptographic systems that are secure and can interoperate with existing communications protocols and networks.
What's New in CSfC Data-at-Rest Capability Package 5.0
This paper provides a review of the most recent changes from CP 4.0 to 5.0 with special emphasis on Unattended Operation Use Case and a HH solution.
What's New in CSfC Data-at-Rest Capability Package 5.0
This paper provides a review of the most recent changes from CP 4.0 to 5.0 with special emphasis on Unattended Operation Use Case and a HH solution.
DAR Series Part 1: Data Threats and Protection
Explore strategies for protecting classified data through encryption and considerations for choosing a data-at-rest encryption approach.
DAR Series Part 1: Data Threats and Protection
Explore strategies for protecting classified data through encryption and considerations for choosing a data-at-rest encryption approach.
DAR Series Part 2: Commercial Solutions for Classified (CSfC)
Learn about the innovative NSA CSfC program leveraging commercial encryption technologies in a layered approach for agile and cost-effective classified data protection.
DAR Series Part 2: Commercial Solutions for Classified (CSfC)
Learn about the innovative NSA CSfC program leveraging commercial encryption technologies in a layered approach for agile and cost-effective classified data protection.
DAR Series Part 3: NSA High Assurance Type 1 Encryption
Gain valuable insights into NSA High Assurance Type 1 encryption including device consideration factors, encryption algorithms, and certification processes.
DAR Series Part 3: NSA High Assurance Type 1 Encryption
Gain valuable insights into NSA High Assurance Type 1 encryption including device consideration factors, encryption algorithms, and certification processes.
DAR Series Part 4: NSA CSfC vs. High Assurance Type 1 Encryption
Compare NSA High Assurance Type 1 and CSfC encryption approaches across over a dozen factors, including procurement, risk, technology adoption, and exportability.
DAR Series Part 4: NSA CSfC vs. High Assurance Type 1 Encryption
Compare NSA High Assurance Type 1 and CSfC encryption approaches across over a dozen factors, including procurement, risk, technology adoption, and exportability.
Establishing a Trusted Supply Chain
This paper examines the best practices commercial off-the-shelf (COTS) hardware vendors must employ to establish a trusted supply chain, including managing obsolescence, counterfeit parts mitigation, secure manufacturing, and design integrity.
Establishing a Trusted Supply Chain
This paper examines the best practices commercial off-the-shelf (COTS) hardware vendors must employ to establish a trusted supply chain, including managing obsolescence, counterfeit parts mitigation, secure manufacturing, and design integrity.
Certification Authorities for Trusted Computing in Military and Avionics Products
This white paper provides an overview of certification authorities involved in Trusted Computing, explores which disciplines they oversee, and gives guidance on when to get these certification authorities involved.
Certification Authorities for Trusted Computing in Military and Avionics Products
This white paper provides an overview of certification authorities involved in Trusted Computing, explores which disciplines they oversee, and gives guidance on when to get these certification authorities involved.
Trends in Network Cybersecurity
We explore the ever-evolving domain of network security, a key segment of embedded systems that’s been under the microscope as cyber threats become more common.
Trends in Network Cybersecurity
We explore the ever-evolving domain of network security, a key segment of embedded systems that’s been under the microscope as cyber threats become more common.
Building a Truly Trusted Computing Solution with COTS Hardware and Intel Security Capabilities
A manufacturer of secure aerospace & defense systems sought a COTS SBC with a robust & proven security profile for its new Trusted Computing solution.
Building a Truly Trusted Computing Solution with COTS Hardware and Intel Security Capabilities
A manufacturer of secure aerospace & defense systems sought a COTS SBC with a robust & proven security profile for its new Trusted Computing solution.