Professional Documents
Culture Documents
1
security for the early detection of errors, doors of access no
controlled and other potentially sensitive agents to turn
into malware [7].
The proofs of vulnerability are prediseadas according to
the technical specifications that possess the systems to
invade, taking into account this, and the evident need that
these devices are handled by protocols related with the
remote connections (WIFI and Bluetooth) is unavoidable to
conceive the possibility that if there is a door of access, of
this type, is easier to consider a remote manipulation.
2
Taking into account the importance that loan the
companies and the current developments to the attacks of
UAV corrupt [10], is necessary to spread a suitable
pedagogy to the niel that can face the university youngsters
and emprendedores so that they can be more realistic on
the dimensionalidad that purchases the handle of the
responsible technology.
3
that arise regarding the interception of data, since all
information is objective main of plagiarism, manipulation
and unauthorised treatment, giving asi step to results no
wished.
6. REFERENCES
[5] BBC Plough the drones the next target for hackers?
http://www.bbc.com/future/story/20140206-can-drones-be-
hacked