Question: In the readings for Module 2 , you learned about protocol stacks. In this discussion activity, it is your task to identify and evaluate risks

In the readings for Module 2, you learned about protocol stacks. In this discussion activity, it is your task to identify and evaluate risks to data links.
Consider the following scenario:
A drone system uses an unencrypted radio link. This unencrypted data link transports MAVLink data between a ground control station and the unmanned system.
Imagine you are a malicious attacker targeting the data link.
In this discussion, you are obliged to make an initial post in the discussion that contains:
Description of a matching threat and vulnerability pair and of the resulting risk with respect to the above scenario.
Examples of security objectives that have been violated by your chosen scenario.
Make a suggestion on how to reduce the risk.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!