8 May 2022

381

The probability of drone hijacking by hackers

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 248

Pages: 1

Downloads: 0

The fifth objective that focuses on the evaluation of the effectiveness of the mitigation and emergency plans and implementation of training activities need revision. The threats on the drones usually target their control systems which are mainly computers or computer-based systems. The vulnerability of the drones begins with the vulnerability of the computer systems or the operating systems used to control them. Most of the cyber-attacks are done on the operating system interfaces thus their importance in finding a solution to this serious world’s security challenge (Vattapparamban, 2016). 

A mitigation process and an emergency plan in case of cyber-attack must always be put in place. Cyber-attacks are hard to predict given the fact that they are always planned by people who operate from the confines of unknown locations. The best that can be done is to have plans that would best minimize the possibility of the attack. Mainly, this could be done by putting in place a protective measure. The protection or mitigation plan is put by having stringent security measures on the drones’ control towers. Moreover, a backup plan in case of an attack on the control is useful. Probably this could involve auto-lock systems or auto-system breakdown in case of access by any unauthorized people. Such a system could render the drones useless to the hackers (O'Connell, 2014). 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The additional objective would include reduction of the access of the control system to authorized individuals and institution of management protocols for the use of drones.

References

O'Connell, M. E. (2014). 21st Century Arms Control Challenges: Drones, Cyber Weapons, Killer Robots, and WMDs.  Wash. U. Global Stud. L. Rev. 13 , 515. http://scholarship.law.nd.edu/cgi/viewcontent.cgi?article=2150&context=law_faculty_scholarship

Vattapparamban, E., Güvenç, İ., Yurekli, A. İ., Akkaya, K., & Uluağaç, S. (2016, September). Drones for smart cities: Issues in cybersecurity, privacy, and public safety. In  Wireless Communications and Mobile Computing Conference (IWCMC), 2016 International  (pp. 216-221). IEEE. https://www.researchgate.net/profile/Ismail_Guvenc/publication/308826355_Drones_for_smart_cities_Issues_in_cybersecurity_privacy_and_public_safety/links/58a2729e45851598babaed97/Drones-for-smart-cities-Issues-in-cybersecurity-privacy-and-public-safety.pdf

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). The probability of drone hijacking by hackers.
https://studybounty.com/the-probability-of-drone-hijacking-by-hackers-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Technology

Implementation Roadmap

AT&T is a telecommunication company that has a platform for selling phones and provision of internet and other services. Implementation of big data analytics in the company requires the completion of a particular...

Words: 545

Pages: 2

Views: 70

17 Sep 2023
Technology

Big Data in Fraud Detection: How It is Used and What to Expect

Chameleon Carriers The replication of trucking companies and trucks under different business names has grown rampant, as the Federal Motor Carrier Safety Administration (FMCSA) program reports. A large...

Words: 508

Pages: 2

Views: 436

17 Sep 2023
Technology

The 5G Networks: How They Work, and What They Mean for the Future

The world of technology is rapidly developing with the reliance of the internet at its core. 4G has been the primary platform of the internet but based on the slow speed, and the high dependence of technology has led...

Words: 284

Pages: 1

Views: 111

17 Sep 2023
Technology

How to Write a Successful Business Case

A successful business case is based on a need. One of the most disturbing problems in the health sector is cybercrime. We intend to develop a strategy that will leverage IT-based techniques and measures to reduce...

Words: 263

Pages: 1

Views: 63

17 Sep 2023
Technology

The 5nm Transistor: The Future of Computing

The November 16th, 1904 invention of the vacuum tube was the humble beginning of the modern-day transistor. The first working transistors were developed at Bell Labs by William Shockley, John Bardeen, and Walter...

Words: 2221

Pages: 4

Views: 55

17 Sep 2023
Technology

Wireless Communication Technologies

Wireless communication taken analogically simply refers to the channel of telephony communication that does not apply the use of wires (Bose, 2010) . Such a channel makes use of electromagnetic waves available in the...

Words: 1046

Pages: 4

Views: 159

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration