Security

Trusted Computing for Defense & Aerospace
Security

Trusted Computing for Defense & Aerospace

Comprehensive protection throughout the product lifecycle

Curtiss-Wright goes well beyond standard approaches to Trusted Computing to provide truly secure solutions for air, ground, and sea platforms. We keep cybersecurity and physical protection in mind, from design and testing to supply chain and manufacturing. This comprehensive, end-to-end approach creates an effective mesh of protection layers that integrate to ensure reliability of Curtiss-Wright products in the face of attempted compromise.

Our Trusted Computing solutions are designed and built around three major data protection domains:

  • Technology protection safeguards how computing tasks are executed. It combines the hardware capabilities, software algorithms, and operations needed to protect functionality, such as how the algorithm in a radar application works.
  • Data protection safeguards software algorithms, data-at-rest, and data-in-motion. It ensures that, for example, when data is sent from one system to another, it is not compromised.
  • Parts protection safeguards the supply chain and manufacturing processes. This ensures customers can trust that all components on Curtiss-Wright products are authentic and all processes have met the strictest quality controls.

Data Protection Domains

Data-at-Rest-Encryption  
Data-at-Rest Encryption

Curtiss-Wright offers proven and certified COTS storage solutions that match data security requirements, including NSA Type 1, CSfC, CC and FIPS 140-2.

Data-In-Motion Encryption  
Data-In-Motion Encryption

Data-in-motion, also called data-in-transit, refers to digital information when transferring between network system nodes.

TrustedCOTS Processing Solutions  
TrustedCOTS Processing Solutions

Our TrustedCOTS products provide confidence in the security and un-compromised protections.

Trusted Supply Chain  
Trusted Supply Chain

We go the extra mile to protect our supply chain and manufacturing processes.

Secure Wireless Solutions for Tactical, Expeditionary, and Deployable Communications

This whitepaper compares various Commercial Solutions for Classified network architectures and proposes several approaches for CSfC solutions optimized for mobility use cases. Download the whitepaper to learn more about:

  • CSfC architecture and process
  • CSfC program overview
  • CSfC capabilities packages
  • WLAN encryption
  • Tactical CSfC solutions
 

Trusted Computing for Defense & Aerospace Article eBook

This collection of articles, originally published by Military & Aerospace Electronics, covers a variety of Trusted Computing topics with a specific focus on the defense and aerospace industries.

Read the eBook

Explore DAR Encryption Approaches

Systems designers must employ the correct cryptography algorithms in their proper modes to secure secret or sensitive data in military trusted computing. Symmetric cryptography can provide confidentiality for data-at-rest and data-in-transit. In this approach, the same key encrypts and decrypts data to ensure the secrecy of that key, which is critical for ensuring the secrecy of the protected data. Systems designers choose different algorithms based on their performance requirements, their desired level of security, and necessary certifications.

NSA TYpe 1 Encryption  
NSA Type 1 Encryption

Endorsed by the NSA for securing classified and sensitive U.S. Government information when appropriately keyed.

NIST FIPS 140-2 Cryptography  
NIST FIPS 140-2 Cryptography

An internationally recognized security certification standard for commercial cryptography.

NSA CSfC and Common Criteria  
NSA CSfC and Common Criteria

Strategy to deliver secure solutions that leverage commercial technologies and products.

CSfC Data-at-Rest Capability Package 5.0 Review

This paper reviews the most recent changes from CP 4.0 to 5.0. Particular emphasis will be given to the more significant new topics: Unattended Operation Use Case and a hardware full-disk encryption (HWFDE) + HWFDE solution.

The Evolving State of Network Security

In a constantly evolving threat environment, where new attacks arrive virtually every day, system architects must design networks to be as secure as possible. Network security involves providing protections against all devices that are connected, or might potentially have access, to the network. Embedded networks are expanding to connect more devices and between systems that previously would not have been connected. Solutions are being continually developed to address emerging threats and challenges.

Trends in Network Cybersecurity

Learn about the evolving state of network security, the standards developed to preserve your system’s integrity with layers of encryption, and how investing in qualified and expert professionals in the field can be a critical advantage in keeping up with the challenges of designing secure networks.