1、DRONES,CYBER SECURITY AND CRITICAL INFRASTRUCTUREFLIGHT CRITICAL:DISCLAIMER:THIS PUBLICATION IS DESIGNED TO PROVIDE ACCURATE AND AUTHORITATIVE INFORMATION IN RELATION TO THE SUBJECT MATTER COVERED.IT IS PROVIDED WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING ANY FORM OF PROFES
2、SIONAL OR OTHER ADVICE OR SERVICES.NO PERSON SHOULD RELY ON THE CONTENTS OF THIS PUBLICATION WITHOUT FIRST OBTAINING ADVICE FROM A QUALIFIED PROFESSIONAL.THIS PROJECT WAS A COLLABORATION BETWEEN THE CSCRC AND OMNIWITH THE SUPPORT OFCONTENTSWHATS THE PROBLEM?.4WHATS THE SOLUTION?.4INTRODUCTION.5WHAT
3、ARE UAVS?.6CRITICAL INFRASTRUCTURE SECTORS.8HOW ARE UAVS USED ACROSS AUSTRALIAN CRITICAL INFRASTRUCTURE?.9WHERE ARE UAVS MANUFACTURED?.10WHAT CYBER THREATS ARE RELATED TO UAVS?.12WHAT DOMESTIC REGULATIONS AND STANDARDS EXIST FOR UAVS IN AUSTRALIA?.14WHAT CYBER-RELATED REGULATIONS AND STANDARDS EXIST
4、 FOR UAVS GLOBALLY?.16CONCLUSION AND RECOMMENDATIONS.19CYBER SECURITY COOPERATIVE RESEARCH CENTRE3WHATS THE PROBLEM?Despite their rapid proliferation and increasing use in critical infrastructure applications,there are no regulations or standards related to the cyber security of unmanned aerial vehi
5、cles(UAVs)in Australia.WHATS THE SOLUTION?As the use of UAVs which are often internet connected devices-becomes ubiquitous across the economy,especially in relation to their use for critical infrastructure monitoring and operations,it is vital cyber security guidance or standards are considered and
6、implemented as a matter of priority.FLIGHT CRITICAL:DRONES,CYBER SECURITY AND CRITICAL INFRASTRUCTURE 4INTRODUCTIONAustralias geography is vast,presenting unique challenges in relation to the monitoring and oversight of national critical infrastructure assets,which are dotted coast to coast across t