Skip to content

Commit

Permalink
deploy: a5048df
Browse files Browse the repository at this point in the history
  • Loading branch information
audreyt committed Oct 28, 2023
1 parent 51b5cad commit 5d24ba2
Show file tree
Hide file tree
Showing 8 changed files with 63 additions and 108 deletions.
Binary file added assets/imgs/F8UiIPuaIAAcmr5.jpg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
2 changes: 1 addition & 1 deletion en/blog/T-Road-與零信任/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -270,7 +270,7 @@ <h1 class="post-title" itemprop="name headline">T-Road and Zero Trust</h1>
<a href="/en/blog/%E8%AE%93%E7%84%A1%E4%BA%BA%E6%A9%9F%E8%88%87%E4%BF%A1%E4%BB%BB%E9%BD%8A%E9%A3%9B/">
<div class="card-panel white-text dim" style="background: url('/assets/imgs/drone-ttc.jpg') center / cover">
<i class="left medium material-icons">navigate_before</i>
<h6>Let drones fly with trust</h6>
<h6>Drones and Trusted Tech Take Off Together</h6>
</div>
</a>

Expand Down
4 changes: 2 additions & 2 deletions en/blog/page2/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -193,10 +193,10 @@ <h1 class="center" style="font-size:2.8em;">Blogs</h1>
2023-03-16
</time>
</span>
<h5 class="title">Let drones fly with trust</h5>
<h5 class="title">Drones and Trusted Tech Take Off Together</h5>
<p class='content container'>

The joint testing laboratory has set an important milestone for "Trust Technology".
TTC partnered with domestic industry leaders to create this initiative, further solidifying the concept of Trusted Tech.

</p>
</a>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -293,7 +293,7 @@ <h6>Ten years of open data, opening up an infinite future</h6>
<a href="/en/blog/%E8%AE%93%E7%84%A1%E4%BA%BA%E6%A9%9F%E8%88%87%E4%BF%A1%E4%BB%BB%E9%BD%8A%E9%A3%9B/">
<div class="card-panel white-text dim" style="background: url('/assets/imgs/drone-ttc.jpg') center / cover">
<i class="right medium material-icons">navigate_next</i>
<h6>Let drones fly with trust</h6>
<h6>Drones and Trusted Tech Take Off Together</h6>
</div>
</a>

Expand Down
51 changes: 25 additions & 26 deletions en/blog/讓無人機與信任齊飛/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -3,27 +3,27 @@

<head>
<!-- Begin Jekyll SEO tag v2.8.0 -->
<title>Let drones fly with trust</title>
<title>Drones and Trusted Tech Take Off Together</title>
<meta name="generator" content="Jekyll v3.8.7" />
<meta property="og:title" content="Let drones fly with trust" />
<meta name="author" content="唐鳳、彭筱婷" />
<meta property="og:title" content="Drones and Trusted Tech Take Off Together" />
<meta name="author" content="Audrey Tang, Sheau-Tyng Peng" />
<meta property="og:locale" content="en" />
<meta name="description" content="The joint testing laboratory has set an important milestone for “Trust Technology”." />
<meta property="og:description" content="The joint testing laboratory has set an important milestone for “Trust Technology”." />
<meta name="description" content="TTC partnered with domestic industry leaders to create this initiative, further solidifying the concept of Trusted Tech." />
<meta property="og:description" content="TTC partnered with domestic industry leaders to create this initiative, further solidifying the concept of Trusted Tech." />
<link rel="canonical" href="https://pdis.nat.gov.tw/en/blog/%E8%AE%93%E7%84%A1%E4%BA%BA%E6%A9%9F%E8%88%87%E4%BF%A1%E4%BB%BB%E9%BD%8A%E9%A3%9B/" />
<meta property="og:url" content="https://pdis.nat.gov.tw/en/blog/%E8%AE%93%E7%84%A1%E4%BA%BA%E6%A9%9F%E8%88%87%E4%BF%A1%E4%BB%BB%E9%BD%8A%E9%A3%9B/" />
<meta property="og:image" content="https://pdis.nat.gov.tw/assets/imgs/drone-ttc.jpg" />
<meta property="og:type" content="article" />
<meta property="article:published_time" content="2023-03-16T00:00:00+00:00" />
<meta name="twitter:card" content="summary_large_image" />
<meta property="twitter:image" content="https://pdis.nat.gov.tw/assets/imgs/drone-ttc.jpg" />
<meta property="twitter:title" content="Let drones fly with trust" />
<meta property="twitter:title" content="Drones and Trusted Tech Take Off Together" />
<meta name="twitter:site" content="@TaiwanPDIS" />
<meta name="twitter:creator" content="@唐鳳、彭筱婷" />
<meta name="twitter:creator" content="@Audrey Tang, Sheau-Tyng Peng" />
<meta property="fb:admins" content="100014438376965" />
<meta name="google-site-verification" content="uxXHtWt7-XyZrPJb9BznXlKOOKklt1D_TAIv1UW8VhM" />
<script type="application/ld+json">
{"@context":"https://schema.org","@type":"BlogPosting","author":{"@type":"Person","name":"唐鳳、彭筱婷"},"dateModified":"2023-03-16T00:00:00+00:00","datePublished":"2023-03-16T00:00:00+00:00","description":"The joint testing laboratory has set an important milestone for “Trust Technology”.","headline":"Let drones fly with trust","image":"https://pdis.nat.gov.tw/assets/imgs/drone-ttc.jpg","mainEntityOfPage":{"@type":"WebPage","@id":"https://pdis.nat.gov.tw/en/blog/%E8%AE%93%E7%84%A1%E4%BA%BA%E6%A9%9F%E8%88%87%E4%BF%A1%E4%BB%BB%E9%BD%8A%E9%A3%9B/"},"publisher":{"@type":"Organization","logo":{"@type":"ImageObject","url":"https://pdis.nat.gov.tw/en/images/pdis-logo-final-inverse.png"},"name":"唐鳳、彭筱婷"},"url":"https://pdis.nat.gov.tw/en/blog/%E8%AE%93%E7%84%A1%E4%BA%BA%E6%A9%9F%E8%88%87%E4%BF%A1%E4%BB%BB%E9%BD%8A%E9%A3%9B/"}</script>
{"@context":"https://schema.org","@type":"BlogPosting","author":{"@type":"Person","name":"Audrey Tang, Sheau-Tyng Peng"},"dateModified":"2023-03-16T00:00:00+00:00","datePublished":"2023-03-16T00:00:00+00:00","description":"TTC partnered with domestic industry leaders to create this initiative, further solidifying the concept of Trusted Tech.","headline":"Drones and Trusted Tech Take Off Together","image":"https://pdis.nat.gov.tw/assets/imgs/drone-ttc.jpg","mainEntityOfPage":{"@type":"WebPage","@id":"https://pdis.nat.gov.tw/en/blog/%E8%AE%93%E7%84%A1%E4%BA%BA%E6%A9%9F%E8%88%87%E4%BF%A1%E4%BB%BB%E9%BD%8A%E9%A3%9B/"},"publisher":{"@type":"Organization","logo":{"@type":"ImageObject","url":"https://pdis.nat.gov.tw/en/images/pdis-logo-final-inverse.png"},"name":"Audrey Tang, Sheau-Tyng Peng"},"url":"https://pdis.nat.gov.tw/en/blog/%E8%AE%93%E7%84%A1%E4%BA%BA%E6%A9%9F%E8%88%87%E4%BF%A1%E4%BB%BB%E9%BD%8A%E9%A3%9B/"}</script>
<!-- End Jekyll SEO tag -->

<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
Expand Down Expand Up @@ -191,8 +191,8 @@
<div class="section">
<article class="post" itemscope itemtype="http://schema.org/BlogPosting">
<header class="post-header">
<h1 class="post-title" itemprop="name headline">Let drones fly with trust</h1>
<p class="post-desc section container">The joint testing laboratory has set an important milestone for "Trust Technology".</p>
<h1 class="post-title" itemprop="name headline">Drones and Trusted Tech Take Off Together</h1>
<p class="post-desc section container">TTC partnered with domestic industry leaders to create this initiative, further solidifying the concept of Trusted Tech.</p>
<div class="post-meta container">
<i class="material-icons tiny">event</i>
<time datetime="2023-03-16T00:00:00+00:00" itemprop="datePublished">
Expand All @@ -208,7 +208,7 @@ <h1 class="post-title" itemprop="name headline">Let drones fly with trust</h1>
<li itemprop="author" itemscope itemtype="http://schema.org/Person">
<a href="/contact" target="_blank" itemprop="name" class='chip'>
<img src="https://talk.pdis.nat.gov.tw/user_avatar/talk.pdis.nat.gov.tw/audreyt/800/574_1.png" alt="author">
唐鳳
Audrey Tang
</a>
</li>

Expand All @@ -217,44 +217,43 @@ <h1 class="post-title" itemprop="name headline">Let drones fly with trust</h1>
<li itemprop="author" itemscope itemtype="http://schema.org/Person">
<a href="/contact" target="_blank" itemprop="name" class='chip'>
<img src="https://talk.pdis.nat.gov.tw/user_avatar/talk.pdis.nat.gov.tw/stpeng/800/659_1.png" alt="author">
彭筱婷
Sheau-Tyng Peng
</a>
</li>

</ul>
<ul class="tags">

<li><a href="/en/tags/#%E9%9F%8C%E6%80%A7%E5%BB%BA%E8%A8%AD" class="tag">韌性建設</a></li>
<li><a href="/en/tags/#Communications+and+Cyber+Resilience" class="tag">Communications and Cyber Resilience</a></li>

<li><a href="/en/tags/#%E8%B3%87%E9%80%9A%E5%AE%89%E5%85%A8" class="tag">資通安全</a></li>
<li><a href="/en/tags/#Cyber+Security" class="tag">Cyber Security</a></li>

</ul>
</div>
</header>

<div class="post-content" itemprop="articleBody">
<p>A while ago, my colleagues in the Telecommunications Technology Center (TTC) and I began to discuss the direction of transformation. TTC, under the supervision of the Department of Digital Technology, has made great contributions to the development of telecommunications in the past two decades, from code-carrying services, testing technology to policy think tanks.</p>
<p>Recently, I engaged in discussions with colleagues at the Telecom Technology Center about the pace of organizational transformation. For two decades, TTC has been instrumental in key areas such as number portability services, testing technologies and related think tanks. It has also played a pivotal role in developing Taiwan’s telecommunications industry, making major contributions in a variety of fields.</p>

<p>In recent years, TTC has fully invested in the development of information security protection and achieved fruitful results. It also makes us think about expanding the “Telecom” in the English name to “Trusted Technology Center”. In line with its core business of helping to strengthen digital resilience.</p>
<p>In addition, TTC has dedicated itself to cybersecurity, achieving significant results. This success has led us to consider expanding the word “Telecom” in our name to “Trusted,” which more accurately represents TTC’s core mission of delivering digital resilience for all.</p>

<p>The “Drone Information Security Joint Test Laboratory” officially established on March 1st, assisted by the National Science Council and jointly built by TTC and industry partners, has set an important record for “Trust Tech” milestone.</p>
<p>A significant milestone was reached March 1 with the official establishment of the Drone Cybersecurity Joint Testing Laboratory. Assisted by the National Science Council, TTC partnered with domestic industry leaders to create this initiative, further solidifying the concept of Trusted Tech.</p>

<p>UAVs can break through terrain restrictions, and have become an important auxiliary tool from agricultural and forestry surveys to disaster relief. Therefore, the government continues to develop plans for the development of the UAV industry, and combines the energy of industry, government, academia and research to establish the Taiwan UAV Alliance.</p>
<p>Drones have become essential tools, with uses ranging from agricultural surveys to disaster relief. Consequently, the government continues to develop plans for the drone industry, harnessing the combined expertise of industry, academia and research institutions to form the Taiwan Drone Alliance.</p>

<p>However, cases of unmanned aerial vehicles being used for attacks and surveillance by some interested people have been heard so far. It has not only become a new information security challenge, but also an important national security issue.</p>
<p>But there have been instances where drones were misused. This presents a new challenge in cybersecurity, as well as raises significant national security concerns.</p>

<p>In January of this year, the Joint Test Laboratory, which is still in the preparatory stage, announced the “UAV Security Specifications” based on the opinions of experts and industry representatives from all walks of life. The content covers the three core testing items of the laboratory, including Manufacturer information security maturity, product information security, and site information security.</p>
<p>In January, during the preliminary stages of the joint testing laboratory’s establishment, experts and industry representatives collaborated to announce the Drone Cybersecurity Standards. These standards encompass the core testing areas of manufacturer cybersecurity maturity, product cybersecurity and operational cybersecurity.</p>

<p>Taking the first item of manufacturer information security maturity as an example, it is like providing a “security design blueprint” so that the industry can follow clear requirements. The laboratory will check the development process, supply chain, and software and hardware bill of materials management security to ensure the security of the drone development environment and correctly introduce security into product functions.</p>
<p>For instance, the manufacturer cybersecurity maturity serves as a security design blueprint, providing businesses with clear guidelines. The laboratory guarantees the safe development environment for drones by checking the development processes, supply chains, and software and hardware inventory management, ensuring safety is integrated into product features.</p>

<p>The second product information security can be regarded as a health check for drones. The laboratory is like a health examination center, like providing health examination packages with different safety levels for drones. The higher the number of detection levels that can pass, the more complete the security protection will be. In addition to providing health checks for drones, the laboratory will also analyze problems and produce a complete report for industry reference.</p>
<p>Product cybersecurity can be likened to a health check for drones. The laboratory acts as a center of well-being, offering varying levels of security assessments for drones. A higher level of successful testing indicates more comprehensive security measures. Apart from performing these checks, the lab also analyzes issues, providing detailed reports for businesses.</p>

<p>In addition, the third field information security is to strengthen the protection of the UAV activity field to avoid being affected by the environment and other equipment, such as interference during data transmission. Just like in addition to excellent health checkups, we must also pay attention to external risk factors. Only by maintaining a good living environment and diet can we truly ensure our health.</p>
<p>Operational cybersecurity focuses on enhancing the protection of drone operational environments. This makes sure they are not influenced by external factors, such as data transmission interference. It is akin to emphasizing thorough health checks and considering external risk factors. Maintaining a good living environment and healthy routines is essential for true well-being.</p>

<p>Therefore, the laboratory will also follow the “Guidelines for the Evaluation of Internet of Things Field Information Security Protection” announced by the Taiwan Information and Communications Industry Standards Association, through the processes of threat modeling, vulnerability detection, penetration testing, and impact analysis. Suggestions for improving field information security.</p>

<p>We hope that TTC will not only assist the competent authority, the Ministry of Communications, to jointly establish domestic detection capabilities, but also be in line with international information security standards, and help the industry become a new force in the global drone industry. The Department of Digital Technology and TTC will continue to uphold the spirit of trust in technology to ensure information security that is “easy to defend, hard to attack, tough and reliable”.</p>
<p>The lab also follows guidelines announced by the Taiwan Information and Communication Standards Association, employing processes like threat modeling, vulnerability detection, penetration testing and impact analysis. It further offers recommendations for improving operational cybersecurity.</p>

<p>Our goal is for TTC to assist the Ministry of Transportation and Communications in establishing domestic testing capabilities, as well as aligning with international cybersecurity standards. We aim to support businesses in becoming a formidable force in the global drone industry. Both the Ministry of Digital Affairs and TTC will continue to uphold the spirit of Trusted Tech, ensuring a secure and robust information and communications environment.</p>

</div>

Expand Down
2 changes: 1 addition & 1 deletion en/feed.xml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en"><generator uri="https://jekyllrb.com/" version="3.8.7">Jekyll</generator><link href="https://pdis.nat.gov.tw/en/feed.xml" rel="self" type="application/atom+xml" /><link href="https://pdis.nat.gov.tw/en/" rel="alternate" type="text/html" hreflang="en" /><updated>2023-10-28T01:24:36+00:00</updated><id>https://pdis.nat.gov.tw/en/feed.xml</id><author><name>PDIS</name></author><entry><title type="html">Per aspera ad astra</title><link href="https://pdis.nat.gov.tw/en/blog/%E7%A9%BF%E8%B6%8A%E6%8C%91%E6%88%B0-%E4%BB%A5%E9%81%94%E6%98%9F%E8%BE%B0/" rel="alternate" type="text/html" title="Per aspera ad astra" /><published>2023-09-28T00:00:00+00:00</published><updated>2023-09-28T00:00:00+00:00</updated><id>https://pdis.nat.gov.tw/en/blog/%E7%A9%BF%E8%B6%8A%E6%8C%91%E6%88%B0%EF%BC%8C%E4%BB%A5%E9%81%94%E6%98%9F%E8%BE%B0</id><content type="html" xml:base="https://pdis.nat.gov.tw/en/blog/%E7%A9%BF%E8%B6%8A%E6%8C%91%E6%88%B0-%E4%BB%A5%E9%81%94%E6%98%9F%E8%BE%B0/"><![CDATA[<p>A few days ago, I had a video conversation with Meredith Whittaker, President of Signal Foundation, on Taiwan Plus, the Ministry of Culture’s English audio-visual platform, an experience I found deeply insightful.</p>
<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en"><generator uri="https://jekyllrb.com/" version="3.8.7">Jekyll</generator><link href="https://pdis.nat.gov.tw/en/feed.xml" rel="self" type="application/atom+xml" /><link href="https://pdis.nat.gov.tw/en/" rel="alternate" type="text/html" hreflang="en" /><updated>2023-10-28T08:50:59+00:00</updated><id>https://pdis.nat.gov.tw/en/feed.xml</id><author><name>PDIS</name></author><entry><title type="html">Per aspera ad astra</title><link href="https://pdis.nat.gov.tw/en/blog/%E7%A9%BF%E8%B6%8A%E6%8C%91%E6%88%B0-%E4%BB%A5%E9%81%94%E6%98%9F%E8%BE%B0/" rel="alternate" type="text/html" title="Per aspera ad astra" /><published>2023-09-28T00:00:00+00:00</published><updated>2023-09-28T00:00:00+00:00</updated><id>https://pdis.nat.gov.tw/en/blog/%E7%A9%BF%E8%B6%8A%E6%8C%91%E6%88%B0%EF%BC%8C%E4%BB%A5%E9%81%94%E6%98%9F%E8%BE%B0</id><content type="html" xml:base="https://pdis.nat.gov.tw/en/blog/%E7%A9%BF%E8%B6%8A%E6%8C%91%E6%88%B0-%E4%BB%A5%E9%81%94%E6%98%9F%E8%BE%B0/"><![CDATA[<p>A few days ago, I had a video conversation with Meredith Whittaker, President of Signal Foundation, on Taiwan Plus, the Ministry of Culture’s English audio-visual platform, an experience I found deeply insightful.</p>

<p>Signal is an open source communication software that uses end-to-end encryption technology. Whittaker specifically pointed out that not only is the app safeguarded against eavesdropping, the encryption extends to “metadata”, which is content that can indirectly identify personal information. In other words, the Signal Foundation cannot obtain any personal information. If anyone has concerns, they can verify and fix the source code together.</p>

Expand Down
Loading

0 comments on commit 5d24ba2

Please sign in to comment.