This example demonstrates another approach to the step-by-step performance
of sneak analysis. The technique illustrated here has been applied to numerous
military and commercial systems since 1967 and is continuously updated to keep
current with today's technology. The process consists of five phases: (1) Data
Preparation, (2) Data Conversion, (3) Computer Processing, (4) Network Tree
Construction, and (5) Clue Application.
This technique is illustrated using an Aircraft Weapons Controller system.
The block diagram of this system is shown in Figure A-6. The
microprocessor-based system controls three weapon stations, one on each wing
and one in the center of the aircraft. The inputs to the system include Master
Arm and Station Select switches; and pushbuttons for Weapon Release, Alternate
Weapon Release, and Emergency Jettison. The outputs of the system for each
weapon station are air- craft power to the weapon, weapon disable, and weapon
release. The system uses redundancy in both the hardware and