This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Certification

UAV Security System

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

UAV Security System

For a long period, the corporate world has utilized the concept of drones in automating sales and marketing as well as other promotional services. No doubt, the commercial utilization of unmanned aircraft systems (UAS)stems from the realization of the multiple benefits that the move would have on the corporate world. It is believed that the use of drones in the commercial sector has grown in leaps and bounds over the past few years, and the trajectory is believed to continue in an upward trend.  At present, the global market for UAS stands at approximately $2 billion, with the possibility of the figures skyrocketing to at least $127 billion by the end of 2020. Reports from the Federal Aviation Administration (FAA) indicated in 2017 that the commercial drones would continue increase in numbers from the 80,000 units that were registered in August 2017 to over 420,000 units by 2021 (Ludwig, 2018).  Besides, the FAA has also expanded its certification programs to increase access to the devices by entrepreneurs. The unprecedented progress in the corporate world under the utilization of UAVs has presented a new challenge to the security sector.

Consequently, this move has created a fundamental paradigm shift in the security sector. Most institutions have resorted to the utilization of UAV for security purposes for both domestic security surveillance and general security control. However, there are concerns about the limitations and weaknesses associated with this system of security. The following paper seeks to discuss how UAV can be used in offering security as well as the inherent risks and challenges associated with it.

Don't use plagiarised sources.Get your custom essay just from $11/page

 

How Drones Can Help in Security Provision

Ludwig, (2018) posit that security companies are currently utilizing the UAV (drones) in the provision of a more comprehensive security surveillance system for industrial, commercial, and residential properties. It is believed that through the use of UAV, the system can repeatedly monitor key security areas within the areas assigned and immediately raise the alarm in the event an anomaly is detected. Thus, it is believed to enhance rapid response in any case a security breach is detected. Furthermore, it also records and documents the key footage of the potential security breach, thereby enhancing the quality of investigation since it provides tangible pieces of evidence. Hill & Rogers (2014) on their part posit that UAV enhance assist security firms in risk assessment. They argue that security personnel can use the drones to identify the gaps and vulnerable areas that would predispose a security company or security guards to some sort of danger. Thus, it is apparent that UAV helps in identifying areas of security lapse by those involved in the provision of security matters and consequently making the necessary adjustments in good time. UAV offers security personnel with a 3D security surveillance, thereby enhancing watertight security to unscrupulous individuals who would otherwise breach the security system.

UAV is also very important in providing perimeter control to a business corporation as well as a nation against external aggression. In the corporate world, they can be used to monitor the perimeters of a business and the parking areas. Besides, they can also be used in monitoring the peripheral boundaries of universities and other institutions of higher learning, stadiums, as well as other outdoor venues. At national levels, the drones can assist the department of homeland security in offering a 24/7 border point patrols (Hill & Rogers, 2014). In the case of the USA, the drones are used to monitor and safeguard the cases of external aggression from the extremist groups and associated activities of terror. The security personnel can detect any aggressor through the use of thermal imaging cameras. Faust, (2015) concludes that the UAV is very instrumental in ensuring that any security breach is detected in good time before escalating to advanced levels and consequently helps in reducing the risks associated with a security breach.

Through the utilization of drones, the quality of inspection has also been improved. Since the UAVs can move up and down, they assist the security teams in monitoring cases of insecurity in skyscrapers more easily. Further, drones also have the potential of safeguarding the welfare if investigative officers as well as security officers such as the law enforcement officers, the FBI and the CIA. The drones can be used to perform forward observation the security teams while on a mission. The forward observation would help the team in identifying the potential issues on their routes hence allowing them to make contingency plans to overcome any challenges detected in good time.

Additionally, the use of drones has made it easier to secure a remote asset. The wildlife department, for example, can use this approach to monitor the wild animals and secure them against poachers. Lastly, Faust (2015) posits that the use of UAV has enhanced safety to the security personnel since it is faster and responds in real-time. Thus when a distress call is made, the drones can analyze the problem and respond in real-time.

It is believed that through the utilization of UAV, a fast establishment of temporal communication infrastructures is created that would be very important in cases of emergency responses. In this regard, UAV is seen as being efficient in addressing cases of emergency. Since it uses artificial intelligence, it is believed that it would help in enhancing the speed of addressing the challenges that arise from sporadic attacks.  Additionally, it enhances end-to-end communication between the two security interfaces: the administration in the office and the surveillance units in the field. Consequently, it facilitates timely communication through the creation of cost-efficient and uninterrupted communications (Bernardo & Dodds, 2016). Additionally, UAV is very flexible and can adjust as, and when needed depending on the nature of duty, it is required to perform. This flexibility provides the security personnel with some degree of freedom in manipulating it to fit the prevailing circumstances.

Despite the various benefits and ways through which drones can be used in offering security, the system is marred with some challenges. One of the greatest challenges facing the UAV security system is that it is prone to data theft and insecurity. Drones are vulnerable to hackers and security vulnerabilities just as any other IoT device. Therefore, the opponents would cleverly hack the drones and even use it as a weapon of war (Griffin, 2017). Additionally, research indicates that as the drones move, they signal out vital information that would be used by opposing forces in launching a deadly attack. According to the report by Allianz Global Corporate & Specialty, the fact that drones are susceptible to hacking, they may be taken over by the hacker. In such cases, the security system shall lose control over it.

Additionally, when there is system failure or interference with the frequency of the system, then the drones would go out of control and consequently present a bigger risk in case the drones are used for malicious activities. Another challenge is the fact that some of the operators may lack the prerequisite training and the skills to monitor and control the UAVs. This would result in poor coordination. Further, the drones are limited in terms of geographical coverage because of battery life. The geographical limitation makes it difficult for the UAV to be used to carry out extensive surveillance. Alternatively, it implies that more drones are needed for comprehensive security surveillance, thereby making the approach expensive. Another challenge to the use of drones in the provision of security is the fact that they do not send data instantly due to lack of internal Wi-Fi or cellular connections. This may result in delays in transmission of data for actions to be taken since the drones have to move to locations with strong signals to be able to transmit the data and other valuable information.

Conclusion

Drones remain the latest developments in security enhancement. They are swift and flexible, thereby making them relatively better than the traditional approaches to security. However, they have some weaknesses. For effective utilization, the personnel handling the gadgets need to have the proper training to understand them better.

Additionally, the personnel need to understand the limitations of the drones in so far as security matters are concerned. Lastly, there is a need for a contingent arrangement to ensure that data contained in the drones are protected from falling into unscrupulous hands. Management needs to ensure that the drones are protected from hacking by having a motor drone for every drone sent out for a mission.

References

Faust, D. R. (2015). Police Drones (1 ed.). New York: The Rosen Publishing Group, Inc. Garcia-Bernardo, S. & Dodds, F. J (2016). Quantitative patterns in drone wars. Science direct. Griffin, R. (May 10, 2017). Benefits and Risks of Unmanned Aerial Systems. Science and Technology

Hill, J., & Rogers, A. (2014). The rise of the drones: From the Great War to GazaVancouver Island University Arts & Humanities Colloquium Series.

Ludwig, S (March 9, 2018). Drones: A Security Tool, Threat and Challenge: Benefits, risks, challenges and advice for drones in enterprises in 2018. Security

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask