Identifying sUAS Vulnerabilities (2 of 3)
This video, from the National Cybersecurity Training and Education (NCyTE) Center, is the first in a series of three videos that discuss small unmanned aerial system (sUAS or drone) cybersecurity. These videos are meant to demonstrate that many types of computing devices are vulnerable to cybersecurity threats. This video discusses the methodology to gather intelligence for a forthcoming cyber attack, current research conducted using a COTS drone, and the vulnerabilities of a drone. This video runs 19:06 minutes in length. The other two videos of this series are available to view separately.
About this Resource
Creator
Publisher
Date Issued
June 5th, 2020
Audience
Education Level
Language
Subject
GEM Subject
Relation
Is Related To
ATE Contributor
Associated Files
Archived
Rights
Access Rights
Comments