ES Design June 2023

DESIGN

A&D: CYBERSECURITY

Best practice to improve aerospace and defence cybersecurity

Right now, we are in an era of some incredible electronic healthcare and medical advances and innovation enabled by the Internet of Medical Things (IoMT), machine learning (ML) and artificial intelligence (AI).

for compliance purposes, firms involved in these markets must provide evidence that they have adopted best-practice security techniques. And there is growing awareness of the need for security. Perforce’s State of Aerospace survey in

W ith software becoming applications, cybersecurity has become an even greater priority than ever before. And one of the main ways security vulnerabilities are created is during the software development stage, through errors when source code is written. For instance, when an SQL statement is created using unvalidated input, an attacker can craft the input in a form allowing the attacker to execute arbitrary SQL statements. With this sort of opportunity, an attacker could read confidential data, modify data, or execute arbitrary commands such as deleting all the information in the database. increasingly integral to electronic systems in military and aerospace This is why ensuring that software development processes in aerospace and defence are rigorously managed and as secure as possible is essential. Furthermore,

2020 found that security was the number one priority of respondents. However, the growing complexity of software and the fact that there are often multiple organisations involved in creating an electronic system can make security a challenge. That said, there are some steps that organisations can take to improve safety within software development. See the bigger picture First, looking at the bigger picture is essential, examining all software sources, both internally and across the supply chain. Legacy code can present issues, especially in the absence of prior testing or lack of current technical support. Open-source software has significant benefits, but its easy accessibility makes it a target for malicious attacks. Similarly, unless commercial off-the-shelf software (COTS) is supported with

By Gordon Saladino, Senior Sales Engineer, Perforce

38 ELECTRONICSPECIFIER.COM

Powered by