Condottiere said:
Exploits can be found all over the place, but it requires some dedication or luck to locate them.
So either you've spent time examining any possible vulnerability, or arranging to have a backdoor introduced, let's say during maintenance, or you bought the exploit from an information broker.
Or seduce the lead designer of the next navigational software upgrade, so you can introduce a killswitch virus into every computer in the fleet....(I'm Looking at you Gaius Baltar)
A couple of things that might allow a hacker to defeat Drone security would be.
A dedicated hacker, or cyber warfare specialist would be doing nothing with his time but looking for the one thing a security programmer forgot, overlooked, or messed up. which gives him an edge if the security team has multiple projects they are working on, and have to split their time up between securing drones, and writing code for the ships sanitation processors. once the exploit is discovered the hacker can share that information with operators in the field who can use it.
also time between updates favors the intruder, if the updates have to be written, formatted to a universal standard for military hardware,, and dispersed to thousands of drones sectors away from their manufacturer they can only move as as fast as an x-boat. sooner or latter an update packet will be missed, and an exploit, or vulnerability will remain un-patched.
Military hardware/software would be standardized, every drone of a certain type would have the same software, same processors/hardware, and the same vulnerabilities. while commercial drone might have all sorts of custom upgrades and rewritten code that would make hijacking harder/easier Military grade drones would be almost identical depending on how remote the unit operating them is, and when it received its last updated software.