This paper presented an exhaustive survey on the security and privacy issues of drones. These security concerns were thoroughly dissected, particularly the aspect of cybersecurity, which was classified into nine levels. These levels include emerging issues, communication-based attacks, sensors, hardware, hardware-based attacks, software attacks, and physical attacks on the drone itself. Furthermore, we discussed the other non-cybersecurity challenges of drones, such as terrorism, mid-air collisions, illegal surveillance, smuggling, electronic snooping, and reconnaissance, alongside proffering possible solutions. Many of the discovered aspects of drone cybersecurity issues were then quantitatively analyzed using a multi-criteria decision-making problem-solving technique. The questionnaire responses from the general public, experts, and stakeholders in the aviation industry were analyzed. The findings revealed variations in cyber-attack techniques such as distributed denial-of-service (DDoS), denial-of-service (DoS), hacking, jamming, spoofing, electronic snooping, eavesdropping, advanced persistent threat (APT), reconnaissance, hijacking, man-in-the-middle attack, and so on. However, the majority of the participants in the survey, which constitute 70%, were unaware of the existing drone cybersecurity challenges. The remaining 30% were aware of the current drone security issues. Meanwhile, both parties are looking for an immediate solution that will fully provide an atmosphere of prospects in the drone industry. Following that, we presented our experience with drone security and privacy, as well as potential future research directions. This paper is unique in that it discusses the various types of drone cyber-attacks and non-cyber-attack scenarios that threaten the socio-economic system, aviation industry, national security, as well as public security and privacy concerns. It also offers solutions to the cyber-attack and non-cyber-attack cases that have been investigated. As a result, the findings of this study could be used to create, develop, and implement more secure cloud systems to safeguard drones from cyber and non-cyber-attacks.