Security Requirement Assessment

  • Sulaiman AlDhanhani

Student thesis: Master's Thesis


A drone is basically a remotely controlled aircraft. It is also commonly referred to as unmanned aerial vehicle (UAV) or Unmanned Aerial system (UAS). Initially used for military purposes, drones are used for diverse applications and this has greatly raised security concerns. Some of the examples and attacks that targets drones include hacking, spoofing, and jamming, among others which related to the cyber-security where drone suffering from it. Due to the challenges faced the drone while it is using, these attacks affect the drone itself and also their communication links. Unfortunately, there are no universal security measures for all drones. This means that there is need to assess security level requirements for various drone use cases. Therefore, this essay focuses on examining the various CIA (confidentiality, integrity, availability) levels used in drones for both control and information data. The method of assessment used is Fleiss kappa. This method has been used in getting inter-rater agreement for thirty raters. Fifteen of these raters assessed civilian drone use cases while the remaining fifteen raters assessed military drone use cases. Fleiss kappa results indicated that there was slight agreement between raters. The study concludes that CIA requirements differ from on drone from another based on application.
Date of AwardDec 2016
Original languageAmerican English
SupervisorAbdulhadi Shoufan (Supervisor)


  • Drones; CIA triad; Interrater Agreement; Fleiss Kappa; Assessment.

Cite this