Security Requirement Assessment for the drones
Order Description
My project is talking about the SECURITY REQUIREMENT ASSESSMENT for the drones
What I want to write about it is a good :
1- Abstract about the project in general
– What is the drone?
– What are the challenges lead us to do this assessment ( types of challenges like hacking, manipulating, etc�..) that affect the security of the drone itself and affect the communication link.
– Why I want to write about the level security requirement of drone ? (to have a good assessment to identify the level security requirement needed for each use-case.
– What kind of method I will use to do this assessment ?
2- Introduction ? write a good introduction about the drones and how to do assessment to assess the level of security requirement for the drones also write about interrater agreement that can be used for doing this assessment.
3- Aim and objectives of this thesis
4- Project overview
– Write more about what is interrater agreement and how it can be helpful in this thesis
– Also write the different between the Cohen�s Kappa and Fleiss�s Kappa and which one is more useful for doing this assessment for more raters which seems to me Fleiss�s Kappa more appropriate to do this kind of evaluation. And also write the equations of Fleiss�s Kappa which can be used in Microsoft Excel to do the assessment
5- Literature view ? in the Literature use more than 5-10 papers which related to the security requirement assessment and differentiate between them and what kind of method they used in their papers at the end of literature review write what I�m locking to do which is do assessment to assess the level of security requirement for the drones.
– At least from 5 � 10 referencing used in literature review.
6- In the main of this project you can write about the method will be used in this thesis and how can I do my evaluation based on it by collection people assessments and put in excel files then do some calculations or measurements to get the result of this assessment to reach to our goal.
– Talking about the CIA triad that will be used in this assessment which are Confidentiality, Integrity, and Availability.
– The document I have sent it to you can explain to you more and you can use it but don�t do any copy from it.
– This project talking about doing evaluation for two kind of information
o The first one is control data which comes from sending data from remote control to the done
o The second is information data which comes from drone to the ground station
– For these data which are control data and information data we want to do assessment and see the level of security requirement needed for each use case.
– Use appropriate method which could be Fleiss�s Kappa and sees how much this methodology will be useful in this thesis.
7- The summary of this project
8- References which are IEEE references 20 � 40 references
– I want these references as an IEEE standard
– Also I want all these references to be send it to me as a links or if the reference from the books just send to me the cover page of the books ( THIS IS THE MOST IMPORTANT POINT, PLEASE DO NOT FORGET THIS)