White Papers

Using Software Full Disk Encryption and Disk Partitioning to Protect and Isolate Network Attached Storage Functions

February 26, 2019 | BY: Elisabeth O'Brien, Paul Davis

Download PDF

Unmanned vehicles are ideal for intelligence, surveillance, and reconnaissance (ISR) missions due to the amount of data a vehicle can gather without the risk to human life. As they are increasingly being used to gather large amounts of different types of data, the need for data storage versatility and data security rises. However, the risk of data loss or corruption grows as the number of systems using different protocols connecting to the device rises. Additionally, as the use of unmanned vehicles for deployed applications increases, so does the risk of highly sensitive data being lost or captured in hostile territory. Through disk partitioning and commercial off-the-shelf (COTS) data-at-rest (DAR) encryption, this paper proposes a solution that reduces risk of data loss, corruption, and accessibility if intercepted.

DTS1 Network attached storage protocol support

Most modern unmanned vehicles, ISR aircraft, and ground vehicles are built around a network centric architecture that facilitates communication between  the onboard, connected, network attached storage (NAS), and other onboard systems. This Ethernet-based communication enables the NAS to do more than just collect data; for example, the networked architecture enables the device to serve files, such as mission maps, mission plans, or boot files, to any network client. By supporting a number of industry standard protocols such as file serving (NFS, CIFS, FTP, HTTP), block (iSCSI), recording (PCAP), and boot (PXE, DHCP), a modern NAS can provide a range of functionality beyond simple storage, but this added functionality increases the risk of data loss or corruption. To meet the challenging needs of todays platforms, NAS systems must provide robust, reliable data storage with minimal loss or corruption in addition to secure encryption, preventing access in the event of system loss or capture.

Download the 'Using Software Full Disk Encryption and Disk Partioning to Protect and Isolate Network Attached Storage Functions' white paper to learn more about:

  • Network attached storage
  • NAS protocols
  • Block data – iSCSI
  • Packet Capture (PCAP)
  • Net-booting
  • Disk partitioning
  • Full disk encryption
  • LUKS
  • AES-256

Author’s Biography

Elisabeth O'Brien

Manager of Portfolio Marketing

Elisabeth manages a group of Marketing Portfolio Managers as well as provides marketing for multiple product portfolios. Having worked for Curtiss-Wright since 2009, she has over 15 years of experience in the aerospace and defense industry as both an engineer and marketing manager and completed a B.S. in Electrical Engineering at the University of Minnesota and a Masters of Business Administration at University College Dublin, Michael Smurfit Business School.

Author’s Biography

Paul Davis

Director, Product Management - Data Solutions

Paul Davis began his career for Curtiss-Wright as a Research Manager for the Dayton, OH facility in 1997. Paul has held positions including: Director of Engineering managing a staff of 40+ engineers, managers, technicians, and co-op students; Product Manager for the switches, recorders, and various board level products; and now Director of Product Management. Prior to joining Curtiss-Wright, Paul worked in engineering and engineering management positions for 19 years.

Share This Article

  • Share on Linkedin
  • Share on Twitter
  • Share on Facebook
  • Share on Google+
Connect With Curtiss-Wright Connect With Curtiss-Wright Connect With Curtiss-Wright
Sales

CONTACT SALES

Contact our sales team today to learn more about our products and services.

YOUR LOCATION

PRODUCT INFORMATION

Support

GET SUPPORT

Our support team can help answer your questions - contact us today.

REQUEST TYPE

SELECT BY

SELECT Topic