Inside Unmanned Systems

AUG-SEP 2017

Inside Unmanned Systems provides actionable business intelligence to decision-makers and influencers operating within the global UAS community. Features include analysis of key technologies, policy/regulatory developments and new product design.

Issue link:

Contents of this Issue


Page 44 of 67

45 unmanned systems inside August/September 2017 ENGINEERING. PRACTICE. POLICY. "If you're trying to build a new UAV business and you're rushing to put code out there that works and gives new features, you may not pay as much attention to good security practices. Security isn't a profit center. It's a cost center. It's difficult to convince shareholders or people who control the budget to invest in security." But security breaches can be very costly. To develop your cybersecurity program, have an open discussion in your company about what you're doing to safeguard data and be willing to use tried and true solutions that are already available, Kovar said. Do research to make sure your cybersecurity program is as robust as possible. Read articles and attend conferences that focus on cybersecurity. Perform audits— on both your company and any service provid- ers you use. Make sure cybersecurity policies are implemented and expert advice followed. Part of this effort involves staying on top of the latest news and determining what developments mean for your business, Kovar said. If a system you're using was recently compromised, you want to know about it as soon as possible. Hold vendors and service providers accountable and find out what they're doing to correct a hacking problem. Bottom line: Understand the value of the data your drones collect to your company and others, recognize the source of threats and how thieves might gain access and then take the necessary steps to protect your valuable property. "No matter what you're trying to defend or what conversation you're having about data security, you need to know who your attacker is," Finisterre said. "It really helps to be able to visualize what your attacker's motives could be and what the extent of damage or exposure they might cause by accessing the data." 0.1° Roll & Pitch 0.2° Heading 2 cm RTK » Immune to magnetic disturbances » L1/L2 GNSS receiver Ellipse-D Dual GNSS/INS Inertial Navigation System » Accurate heading even under low dynamics » Post-processing

Articles in this issue

Links on this page

Archives of this issue

view archives of Inside Unmanned Systems - AUG-SEP 2017