CYBER SECURITY
Cybersecurity is the activity of preventing unauthorised access to, use of, disclosure of, interruption of, alteration of, or destruction of computer systems, networks, and data. It entails putting in place a variety of safeguards and technology to defend information and stop cyber threats.
Here are some crucial cybersecurity elements:
Keeping sensitive information private by limiting access to just those who have been given permission to view it. Access restrictions and encryption mechanisms are used in this.
Integrity: Preventing unauthorised modifications to ensure the accuracy and dependability of data. Data integrity is maintained via methods like data validation and checksums.
Availability: Making sure that data and computer systems are available to authorised users when they need them. To reduce downtime, strategies including redundancy, backups, and disaster recovery plans are used.
Verifying the identification of people or systems trying to access resources is known as authentication. Passwords, biometrics, and two-factor authentication (2FA) are frequently used authentication techniques.
Authorization is the process of granting people the proper access levels and permissions in accordance with their respective jobs and responsibilities. To enforce authorization, access restrictions and user management systems are used.
Network security: Defending networks against risks like viruses and unauthorised access. Network security techniques that are frequently utilised include firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs).
Making sure that software programmes are created and maintained with security in mind is known as application security. Secure coding procedures, vulnerability analyses, and penetration testing are required.
Establishing plans and procedures for an effective response to cybersecurity issues is known as incident response. Teams that respond to incidents look into potential dangers, try to limit damage, and recover systems and data.
Security education and training: Informing users on security guidelines, rules, and threats. Regular training and awareness campaigns aid in lowering human error and encourage a culture that values security.
To proactively identify and address new cyber threats, threat intelligence is the collection and analysis of data on prospective threats and vulnerabilities.
It's crucial to remember that cybersecurity is a continuous activity since threats change quickly. In order to defend against new and emerging threats, organisations and individuals must remain vigilant, maintain systems current, and continually upgrade security measures.
Control System: Traffic Management
Inception
Trains are an essential part of their transportation networks; tens of thousands of kilometers of track carry people and goods daily, both within cities and across national borders. We begin our analysis of the fictitious Train Traffic Management System (TTMS) by specifying its requirements and the system use cases that further describe the required functionality.
Requirements for the Train Traffic
Management System
This is a very large and highly complex system that in reality would not be specified by simple requirements.
The Train Traffic Management System has two primary functions: train routing and train systems monitoring. Related functions include traffic planning, failure prediction, train location tracking, traffic monitoring, collision avoidance, and maintenance logging.
Functional Requirements
From these functions, we define eight use cases, as shown in the following list.
Route Train: Establish a train plan that defines the travel route for a particular train.
Plan Traffic: Establish a traffic plan that provides guidance in the development of train plans for a time frame and geographic region.
Monitor Train Systems: Monitor the onboard train systems for proper functioning.
Predict Failure: Perform an analysis of train systems’ condition to predict probabilities of failure relative to the train plan.
Track Train Location: Monitor the location of trains using TTMS resources and the Navstar Global Positioning System (GPS).
Monitor Traffic: Monitor all train traffic within a geographic region.
Avoid Collision: Provide the means, both automatic and manual, to avoid train collisions.
Log Maintenance: Provide the means to log maintenance performed on trains.
These use cases establish the basic functional requirements for the Train Traffic Management System, that is, they tell us what the system must do for its users.
Nonfunctional requirements:
Safely transport passengers and cargo
Support train speeds up to 250 miles per hour
Interoperate with the traffic management systems of operators at the TTMS boundary
Ensure maximum reuse of and compatibility with existing equipment
Provide a system availability level of 99.99%
Provide complete functional redundancy of TTMS capabilities
Provide accuracy of train position within 10.0 yards
Provide accuracy of train speed within 1.5 miles per hour
Respond to operator inputs within 1.0 seconds
System Architecture: Satellite-Based Navigation
Inception
The first steps in the development of the system architecture are really systems engineering
steps, rather than software engineering, even for purely or mostly software systems.
Requirements for the Satellite Navigation System
An Introduction to the Global Positioning System
The Global Positioning System provides anyone possessing a GPS receiver with the ability to
know his or her position on the earth regardless of the location, the time of day, or the
weather. The GPS architecture consists of three segments: Control, User, and Space. The
Control Segment is comprised of six ground stations, with the master control station located
at Shriver Air Force Base in Colorado. The receivers that assist many of us in our navigation
efforts constitute the User Segment, which receives position information from the 24
satellites that comprise the constellation of the Space Segment. The Global Positioning
System has numerous uses, both military and civilian.
Vision:
Provide effective and affordable Satellite Navigation System services for our
customers.
Functional requirements:
Provide SNS services
Operate the SNS
Maintain the SNS
Nonfunctional requirements:
Level of reliability to ensure adequate service guarantees
Sufficient accuracy to support current and future user needs
Functional redundancy in critical system capabilities
Extensive automation to minimize operational costs
Easily maintained to minimize maintenance costs
Extensible to support enhancement of system functionality
Long service life, especially for space-based elements
Constraints:
Compatibility with international standards
Maximal use of commercial-off-the-shelf (COTS) hardware and software
Defining the Boundaries of the Problem
The requirements and constraints do permit us to take an important first step in the design
of the system architecture for the Satellite Navigation System—the definition of its context.
This context diagram provides us with a clear understanding of the environment within
which the SNS must function. Actors, representing the external entities that interact with
the system, include people, other systems that provide services, and the actual environment

Comments