The objective that needs revision is that of hazard identification and quantification. Such is because vulnerability of the drones is highly based on the technology that is used to develop and control the drones. As such, terrorist may have an access to such a technology, which will give them room to control and manage the drones for their benefit to attack native and other citizens (Bentley, 2011). Hence, the component of technology and its important in improving the security level of the drones has to be involved in the illustration of this objective.
The proposed objective is the evaluation of the technology level for the system maintenance and continuous monitoring of the drones to detect instances of technical impairment or tampering of the