Home' RTCA Documents for Review : DO-230H FRAC Contents 278
© 2017, RTCA, Inc.
The conversion of the radio bands or modulation format (digital or analog) is transparent to the remote PC
user and the mobile/portable user. It is also possible with proper options and software to cause unlike
stations to be interconnected, thereby letting a digital portable communicate to analog portable. In its
simplest configuration the dispatcher at the remote PC can communicate to any of the connected base
stations (and thereby the portable units) regardless of band or modulation format.
RoIP implementation should enable end users, such as p law enforcement officers, each to have an IP
address, and while this may complicate system control and administration it solves a critical interoperability
problem and also provides for better control of network resources.
RoIP systems should provide the same reliability levels as other network assets including the ability to be
backed up, either on site or at a geographically redundant site. The RoIP packet switches also should be
capable of being distributed throughout the network at key locations to improve traffic flow and to provide
Privacy and Data Security Considerations
Privacy is a complex matter in the law and in practice. General privacy laws have an overall bearing on the
personal information of individuals and affect the policies that govern many different areas of information.
Some examples include:
Health privacy laws, i.e., the Health Insurance Portability and Accountability Act, or HIPAA.
Financial transaction laws, e.g., the Sarbanes–Oxley Act (PL. 107-204), also known as the “Public
Company Accounting Act” and informally as SOX.
Online privacy laws
Communication privacy laws
Information privacy laws
Privacy in one’s home
For airport security systems, privacy issues are more operational and legal in nature than technical.
Awareness of such issues, and how then might impact the structuring and design of airport security systems,
should begin during develop of the ConOps.
Network Security Standards and Guidelines
SP 800-76-2, Biometric Data Specification for Personal Identity Verification
Transmission and Data Security
The preferred method of protecting information transmitted over a wired or wireless network is by
encrypting it. There are many encryption protocols available, but the NIST-developed Advanced Encryption
Standard (AES) is now widely established, proven, and has become the de facto U.S. encryption standard.
AES is an iterative, symmetric-key block cipher that can use keys of 128, 192, and 256 bits, and encrypts
and decrypts data in blocks of 128 bits (16 bytes). Unlike public-key ciphers, which use a pair of keys,
symmetric-key ciphers use the same key to encrypt and decrypt data. Encrypted data returned by block
ciphers have the same number of bits that the input data had. Iterative ciphers use a loop structure that
repeatedly performs permutations and substitutions of the input data.
AES is the successor to the older Data Encryption Standard (DES). DES was approved as a federal standard
in 1977 and is now considered past its useful lifetime.
Links Archive Navigation Previous Page Next Page