IF1200A Pilot Operating Handbook Appendix
Security Risks and Mitigation
This section describes steps that can be taken to protect sensitive information in the IF1200A
aircraft.
Each security issue listed below is followed by one or more remedies.
Issue: Physical Access to the Aircraft
● Store the aircraft and the hand controller in a secure area accessible only by authorized
personnel. Issue: Unauthorized Access to Flight Logs
● If logs are required, transfer them from the aircraft after flight, then delete them from the
aircraft.
● If logs are not required by the user, disable logging. Note: If you disable logging a full
analysis will NOT be able to be completed in the event of an accident.
● Do not physically remove the SD card from the aircraft. If it is necessary to remove the
SD card from the aircraft, store it in a secure area accessible only by authorized
personnel.
Issue: Automated Transfer of Mission Plan to Unauthorized Client
Applications
● Promptly deleting mission plans after each flight reduces the window of vulnerability.
● Missions can also be deleted during flight, while the aircraft is connected to the ground
station.
Issue: Data Encryption
● Enable AES Encryption and change the Encryption keys often. Refer to the following
document, available from Inspired Flight Technologies:
● Long Range Telemetry Modem Configuration Supplement: Go to this link:
https://inspiredflight.freshdesk.com/support/solutions/articles/67000705237
IFT Doc Num 102094, Rev 1.02 Page 60