During this analyze, the author analyzed the drones’ vulnerabilities and apps as well as their interactions with issues that commonly come up in the cybersecurity area. They asserted that if a drone is hacked and abused by opponents, major hazards or implications may possibly crop up. Community Mapper (or NMAP https://www.gmdsoft.com/