G2TT
来源类型Report
规范类型报告
DOIhttps://doi.org/10.7249/RR2972
来源IDRR-2972-RC
How to Analyze the Cyber Threat from Drones: Background, Analysis Frameworks, and Analysis Tools
Katharina Ley Best; Jon Schmid; Shane Tierney; Jalal Awan; Nahom M. Beyene; Maynard A. Holliday; Raza Khan; Karen Lee
发表日期2020-03-05
出版年2020
语种英语
结论

The cybersecurity threat landscape introduced by a wider range of UAS use is not well understood

  • A combination of "blue" and "red" team approaches to enumerating, understanding, and categorizing cyber threats related to UAS as targets and UAS as weapons can help stakeholders better understand the space.
  • Emerging trends such as autonomous flight, UAS traffic management, swarming, AI, and blockchain will continue to add complexity to this space.

Compromised drones can have real impacts on security for the Department of Homeland Security

  • If faced with compromised drones, Customs and Border Protection might lose intelligence, surveillance, and reconnaissance (ISR) capabilities, creating visual blind spots in detection of smuggling or other nefarious activities at borders and ports.
  • Compromised Federal Emergency Management Agency (FEMA) drones might reduce the agency's capability to identify, reach, or supply individuals in peril or medical distress in disaster zones.
  • Compromised Cybersecurity and Infrastructure Security Agency (CISA) drones would degrade the ability of CISA to conduct critical infrastructure inspections in some cases, and could be used in a cyberphysical attack to damage the critical infrastructure it was meant to survey.
  • Compromised Immigrations and Customs Enforcement drones will reduce overall capability, require fallback to less-familiar concepts of operation, and increase risk for the agents in the field.
摘要

This work explores approaches for understanding, inventorying, and modeling cybersecurity implications of the rapid growth in unmanned aerial systems (UAS), focusing specifically on current vulnerabilities and future trends. The authors propose conceptual approaches meant to enable the enumeration and categorization of UAS-related cyber threats and explore some of the potential benefits and challenges of modeling the commercial UAS threat. These approaches are applied to real-world threat scenarios to test their validity and illustrate the types of attacks that are currently feasible. Industry trends and the implications of these trends for cybersecurity are presented. Finally, the authors consider the UAS-related cybersecurity threat from the perspective of the Department of Homeland Security (DHS). Specifically, the authors describe the vulnerability of particular DHS components to the threats described in this report and suggest possible means of threat mitigation.

目录
  • Chapter One

    Introduction

  • Chapter Two

    Understanding the UAS Threat Space

  • Chapter Three

    The UAS and Cybersecurity Threat Space Today

  • Chapter Four

    Industry Trends and the Future of UAS Cybersecurity

  • Chapter Five

    UAS, Cybersecurity, and the Department of Homeland Security

  • Chapter Six

    Conclusion and Recommendations

  • Appendix A

    Attack Categorization

主题Civilian and Commercial Drones ; Cybersecurity ; Law Enforcement
URLhttps://www.rand.org/pubs/research_reports/RR2972.html
来源智库RAND Corporation (United States)
引用统计
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/524023
推荐引用方式
GB/T 7714
Katharina Ley Best,Jon Schmid,Shane Tierney,et al. How to Analyze the Cyber Threat from Drones: Background, Analysis Frameworks, and Analysis Tools. 2020.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
RAND_RR2972.pdf(4505KB)智库出版物 限制开放CC BY-NC-SA浏览
x1652297772794.jpg.p(3KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Katharina Ley Best]的文章
[Jon Schmid]的文章
[Shane Tierney]的文章
百度学术
百度学术中相似的文章
[Katharina Ley Best]的文章
[Jon Schmid]的文章
[Shane Tierney]的文章
必应学术
必应学术中相似的文章
[Katharina Ley Best]的文章
[Jon Schmid]的文章
[Shane Tierney]的文章
相关权益政策
暂无数据
收藏/分享
文件名: RAND_RR2972.pdf
格式: Adobe PDF
文件名: x1652297772794.jpg.pagespeed.ic.-T3ZirJxY9.jpg
格式: JPEG

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。