IT paper
"Week #2 Assignment"
‘Cyber Security Threat Analysis and Modeling of an Unmanned Aerial Vehicle System’
{Student Name]
[Course Number]
[Date]
Contents
Introduction4
Overview of Paper4
Key Points of the Paper4
Contribution of the paper5
Validity of the research5
Weak Areas of the paper5
Conclusion5
Reference6
Introduction
The progress in technologies for the small electronic military tools and systems has led to the coming out of unmanned aerial vehicle (UAV) as the innovative tool of war and tool used for several other areas. These equipments can be controlled from a remote location and can be used for vital operations. Such as, odiousness, inspection, exploration and other inhabitant works [ CITATION Jav12 \l 1033 ]. This paper discusses about the key points of the research paper, its contribution, its validity as well as weaknesses. At the end, the conclusion of the paper is provided.
Overview of Paper
Key Points of the Paper
It is very important to protect the channels in the unmanned aerial vehicle systems since all the data which is vital to the mission is passed through wireless communication channels. And any intruder can access this information [ CITATION Jav12 \l 1033 ].
One of the major uses of UAV is in the ballistic missile protection network. In which the unmanned aerial vehicles are tasked to guard the intermediate area between the ballistic missile launching location and the desirable goal of the missile[ CITATION Jav12 \l 1033 ]. The main things discussed in the cyber security threat model may include confidentiality attacks, integrity attacks, and availability attacks and risk evaluations[ CITATION Jav12 \l 1033 ].
Contribution of the paper
The research conducted in this paper with the evaluation of a model describes that this model may assists the designers and users of unmanned aerial vehicle system for understanding the risk drawn out from the system[ CITATION Jav12 \l 1033 ]. In order to permit them to deal with several system vulnerabilities with the identification of higher preference risk. It also evaluates the threats as well as selecting alleviation methods for the reduction of these threats [ CITATION Jav12 \l 1033 ].
Validity of the research
The research study is valid since all the information provided in the research paper is completely authentic and well referenced. It is to check that from where the information is coming, while, visual authentication in the form of graphs and charts of the results also provided. It increases the validity of the results and findings. They have followed all the rules and regulations of IEEE that increases the validity of the paper[ CITATION Daw16 \l 1033 ].
Weak Areas of the paper
It is observed that more research should have been conducted in such area as less research is conducted about this topic in the past. So, researchers and other readers such as scientists may have an interest to know more about this topic from authentic research papers. Moreover, less information is provided regarding the results and findings[ CITATION Daw16 \l 1033 ]. Moreover, more information of authentic research papers and reports as well as authentic websites should be included to increase the validity of the research paper. Although most of the information of the systems and model is confidential but it is still difficult to know that which threats can badly influence the UAV systems[ CITATION Daw16 \l 1033 ].
Conclusion
The research paper discusses about the security threat analysis of unmanned aerial system. It also has given details about the users of the UAVs system that they should be well informed about the overall UAV and its all positives and negatives. The future work from the researchers may include the work on the threats and mission information in order to identify and model the threat more precisely.
Reference
Dawson, C. (2016). 100 Activities for Teaching Research Methods. SAGE.
Javaid, A. Y., Sun, W., Devabhaktuni, V. K., & Alam, M. (2012). Cyber Security Threat Analysis and Modeling of an. IEEE , 585-590.
https://www.researchgate.net/profile/Ahmad_Javaid/publication/-_Cyber_security_threat_analysis_and_modeling_of_an_unmanned_aerial_vehicle_system/links/57c6db2908ae9d64047e4d5c.pdf