The fifth objective that focuses on the evaluation of the effectiveness of the mitigation and emergency plans and implementation of training activities need revision. The threats on the drones usually target their control systems which are mainly computers or computer-based systems. The vulnerability of the drones begins with the vulnerability of the computer systems or the operating systems used to control them. Most of the cyber-attacks are done on the operating system interfaces thus their importance in finding a solution to this serious world’s security challenge (Vattapparamban, 2016).
A mitigation process and an emergency plan in case of cyber-attack must always be put in place. Cyber-attacks are hard to predict given the fact that they are always planned by people who operate from the confines of unknown locations. The best that can be done is to have plans that would best minimize the possibility of the attack. Mainly, this could be done by putting in place a protective measure. The protection or mitigation plan is put by having stringent security measures on the drones’ control towers. Moreover, a backup plan in case of an attack on the control is useful. Probably this could involve auto-lock systems or auto-system breakdown in case of access by any unauthorized people. Such a system could render the drones useless to the hackers (O'Connell, 2014).
Delegate your assignment to our experts and they will do the rest.
The additional objective would include reduction of the access of the control system to authorized individuals and institution of management protocols for the use of drones.
References
O'Connell, M. E. (2014). 21st Century Arms Control Challenges: Drones, Cyber Weapons, Killer Robots, and WMDs. Wash. U. Global Stud. L. Rev. , 13 , 515. http://scholarship.law.nd.edu/cgi/viewcontent.cgi?article=2150&context=law_faculty_scholarship
Vattapparamban, E., Güvenç, İ., Yurekli, A. İ., Akkaya, K., & Uluağaç, S. (2016, September). Drones for smart cities: Issues in cybersecurity, privacy, and public safety. In Wireless Communications and Mobile Computing Conference (IWCMC), 2016 International (pp. 216-221). IEEE. https://www.researchgate.net/profile/Ismail_Guvenc/publication/308826355_Drones_for_smart_cities_Issues_in_cybersecurity_privacy_and_public_safety/links/58a2729e45851598babaed97/Drones-for-smart-cities-Issues-in-cybersecurity-privacy-and-public-safety.pdf