Software vulnerabilities, security threats and mitigation strategies
Example of simple GPS jamming technique.