0% found this document useful (0 votes)
19 views1 page

Drone Security Outline For Research

The document discusses security and social concerns related to drone hacking, including past university studies on drone vulnerabilities and common hacking methods like WiFi attacks and GPS spoofing, as well as social issues around drone privacy and their impact in news stories.

Uploaded by

John M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views1 page

Drone Security Outline For Research

The document discusses security and social concerns related to drone hacking, including past university studies on drone vulnerabilities and common hacking methods like WiFi attacks and GPS spoofing, as well as social issues around drone privacy and their impact in news stories.

Uploaded by

John M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

I.

Security Concerns
a. Background to Drone Hacking
b. Past Studies done to analyze drone
i. University of Texas
ii. John Hopkins University
iii. Other research by university – find more
c. Drone Vulnerabilities
i. Technology weaknesses
1. WiFi weakness
2. RF weakness
3. Etc.? – find more
ii. Common/Known Drone hacks
1. WiFi attack
2. GPS Spoofing
3. Etc.? – find more
iii. Drone Hacking Tools
1. ?? -find more
II. Social Concerns
i. Privacy
1. ACLU Recommendations
2. -please add more
ii. Drone in the News and Social Impact
1. Drones used by terrorist
2. Drone aids in prison escape
3. Drone interferes with forest fire extinguish
4. -please find more thes are just suggestions

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy