Within this research, the creator analyzed the drones’ vulnerabilities and applications as well as their associations with difficulties that frequently crop up while in the cybersecurity area. They asserted that if a drone is hacked and abused by opponents, significant threats or penalties may arise. Network Mapper (or NMAP for https://www.gmdsoft.com/