Data Security and Privacy Concerns in Drone Operations DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 236 - 290

Published: Jan. 26, 2024

The widespread use of drones across various industries is leading to significant transformations. However, the resulting concerns about data security and privacy are quite significant. This section offers a thorough exploration these important issues, providing insights into challenges they pose potential ways address them. Starting with an overview increasing utility drones, this chapter highlights importance strong protocols for privacy. By examining complexities collection storage, it reveals different types that gather, delves storage techniques, vulnerabilities, setting stage effective countermeasures. At core discussion cybersecurity risks, which range from cyberattacks on drone systems unauthorized access tampering data. To sum up, serves as comprehensive guide understanding, addressing, mitigating related in operations.

Language: Английский

Data Security and Privacy Concerns in Drone Operations DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 236 - 290

Published: Jan. 26, 2024

The widespread use of drones across various industries is leading to significant transformations. However, the resulting concerns about data security and privacy are quite significant. This section offers a thorough exploration these important issues, providing insights into challenges they pose potential ways address them. Starting with an overview increasing utility drones, this chapter highlights importance strong protocols for privacy. By examining complexities collection storage, it reveals different types that gather, delves storage techniques, vulnerabilities, setting stage effective countermeasures. At core discussion cybersecurity risks, which range from cyberattacks on drone systems unauthorized access tampering data. To sum up, serves as comprehensive guide understanding, addressing, mitigating related in operations.

Language: Английский

Citations

19