Developing a Secure COTS-Based Trusted Computing System
System-level security is more than simply the sum of its parts. Read about key protections that must be considered when developing a secure COTS-based Trusted Computing system.
In this white paper, Mike Southworth examines the pros and cons of both fiber optic and copper networking technology for today’s military and aerospace applications.
Read the white paper by Curtiss-Wright TCOTS experts and learn about our holistic approach to Trusted Computing that applies rigorous protection standards at every stage of the development process.
A Matter of Trust: Reducing Program Risk with Dependable Solutions
Tactical advantage on the battlefield of the future will be based on trust and personnel will need a higher level of trust that all systems will work as needed in any situation.
This white paper looks at Trusted Boot, a key strategy for ensuring that the trustworthiness of an embedded system begins with the very first software instruction at system startup in order to protect against attacks.
This white paper looks at the use of open standards-based commercial-off-the-shelf (COTS) technologies to address Trusted Computing requirements in deployable embedded systems for aerospace and defense applications.