Security

Comprehensive Protection Throughout the Product LifeCycle

Curtiss-Wright goes beyond standard approaches to Trusted Computing to provide truly secure solutions for air, ground, and sea platforms. By keeping cybersecurity and physical protection in mind, from design and testing to supply chain and manufacturing, we can provide a comprehensive, end-to-end approach that creates an effective mesh of protection layers that integrate to ensure the reliability of Curtiss-Wright products in the face of attempted compromise.

Our Trusted Computing solutions are designed and built around three major data protection domains:

  • Technology protection safeguards how computing tasks are executed. It combines the hardware capabilities, software algorithms, and operations needed to protect functionality, such as how the algorithm in a radar application works.
  • Data protection safeguards software algorithms, data-at-rest, and data-in-motion. It ensures that, for example, when data is sent from one system to another, it is not compromised.
  • Parts protection safeguards the supply chain and manufacturing processes. This parts protection approach ensures customers can trust that all components on Curtiss-Wright products are authentic and all processes have met the strictest quality controls.

The Evolving State of Network Security

In a constantly evolving threat environment, where new attacks arrive virtually every day, system architects must design networks to be as secure as possible. Network security involves protecting all devices that are connected or have access to the network. Embedded networks are expanding to connect more devices and between systems that previously would not have been connected. Solutions are being continually developed to address emerging threats and challenges.

 

Data Protection Domains

Padlock of Cybersecurity
Data-at-Rest Encryption

Proven and certified COTS storage solutions that match data security requirements, from NSA Type 1, CSfC, CC, to FIPS 140-2.

Cyber Security
Data-In-Motion Encryption

Data-in-motion, also called data-in-transit, refers to digital information when transferring between network system nodes.

Cyber Security
TrustedCOTS Processing Solutions

Our TrustedCOTS products provide confidence in the security and un-compromised protections.

Cyber Security
Trusted Supply Chain

Curtiss-Wright go the extra mile to protect supply chain and manufacturing processes.

Explore DAR Encryption Approaches

Systems designers must employ the correct cryptography algorithms in their proper modes to secure secret or sensitive data in military trusted computing. Symmetric cryptography can provide confidentiality for data-at-rest and data-in-transit. In this approach, the same key encrypts and decrypts data to ensure the secrecy of that key, which is critical for ensuring the secrecy of the protected data. Systems designers choose different algorithms based on their performance requirements, their desired level of security, and necessary certifications.

Cyber Security
NSA Type 1 Encryption

Endorsed by the NSA for securing classified and sensitive U.S. Government information when appropriately keyed.

NSA CSfC and Common Criteria

Strategy to deliver secure solutions that leverage commercial technologies and products.

Cyber Security
NIST FIPS 140-2 Cryptography

An internationally recognized security certification standard for commercial cryptography.