GUEST ESSAY: Where we stand on mitigating software risks associated with fly-by-wire jetliners
The Last Watchdog
AUGUST 29, 2023
So watch out for weak encryption protocols, insufficient network segregation, or insecure user authentication mechanisms. For example, as noted previously there’s the ED-202A guidelines in Europe and DO-326A in the U.S., However, onboard Wi-Fi networks, if not adequately secured, can provide a gateway for cyber attackers.
Let's personalize your content