CSCI 397 ICSCIS paper on Advantech – WebAccess (SCADA)

TOPIC- Advantech – WebAccess (SCADA)

OVERVIEW

A key objective of any academic program is the refinement and reinforcement of strong communication skills. 

The same ability of a cyber security professional to compile information and present findings, observations, and recommendations in a clear, 

concise, and understandable manner is equally important. 

It is for these reasons that a requirement exists for the successful completion of this course to perform research centering on a 

specific automation vendor and their industrial solution offering and compile a paper summarizing the findings in a form of security assessment.

The paper will focus on selecting a company and one of their industrial control system offerings. 

Solutions are often aligned to specific industry sectors and customer bases. These solutions should be understood to then look at vulnerabilities

that have been disclosed targeting these systems. Equally important is the impact to the business operations of the end-user or asset owner should 

any of these vulnerabilities be exploiting – either intentionally or accidentally.

It is essential to evaluate the unmitigated risks associated with these vulnerabilities and develop a recommended list of actions that would help the asset 

owner in mitigating some of these risk in order to improve the operational integrity of their cyber-physical systems.

1-The paper shall be at least five (6) and no more than ten (10) pages in length excluding figures, tables, and references. 

2-The paper shall be formatted using an 11-point font of either Arial, Helvetica, or Times Roman type using 1″ margins on the sides and double-spacing between 

3-lines with 0.5″ indentation on first line of paragraphs. 

4-The paper shall be written using the APA style guide seventh edition published in October 2019. Online guidance can be viewed at https://apastyle.apa.org.

5-All tables and figures shall be captioned and specifically referenced in the body of the document. 

6-All references shall be stated and included as endnotes in this paper. Citations must meet the following requirements:

7-No more than two (2) citations shall be from Wikipedia

8-At least two (2) references shall be from United States government sites (e.g. CISA, NIST)

9-At least two (2) references from vendor web (html) or printed (pdf) material

10-At least two (2) references shall be from independent sources including but not limited to

   News Media Outlets (e.g. Reuters, Washington Post, Wired, CSOOnline)

   Industry Publications (e.g. Automation, ISSSource, Control)

   Trade Sources (e.g. Oil and Gas Journal, ChemWeek, PharmaTimes)

   Security Solution Providers (e.g. McAfee, Trend Micro, Dragos, Claroty) to name several.

 Grading for term research paper and associated presentation will be based on the following metrics:

     20% = Ideas and Analysis

     20% = Organization

     20% = Development and Support

     10% = Style

     20% = Mechanics

     10% = miselaneous

 

The term research paper should be logically divided into sections that follow sound research paper style and address each of the following areas. 

You are free to organization the paper and presentation as appropriate,

 however a template has been provided for both the paper and presentation to help start the initial paper structure.

The section titles (paper) and slide titles (presentation) in the templates are for reference only.

Your paper shall address and develop each of the following items:

1-System overview (textual) and architecture (graphical) covering devices and network topology explaining the function of each of the key assets

2-Communication protocols used by the system

3-Industry sectors that use the system

4-Vulnerabilities publicly disclosed for the system and the publication of any exploitation packages

5-Potential or actual impact of the vulnerabilities discovered to the industry sectors served

5-Cyber security measures taken by the vendor to secure the system

7-Additional cyber security measures that could be taken by the end-user user if the vendor recommendations are not feasible (e.g. an upgrade could not be performed in a timely manner)

Reference links

https://icscsi.org/library/#osint

https://us-cert.cisa.gov/ncas

https://icscsi.org/library/#news

https://training.icscsi.org/mod/resource/view.php?id=2568

Module 9 Assignment – CyberLaw

Please run a Google search of the term, “United States Supreme Court Carpenter v. United States 2018.” 

Please write an essay of 500 words, summarizing the court’s decision. 

1. Please add references in APA format

2.  use Correct legal citation  

3.  accurately summarizes the effects of this Court decision 

Cyber security mini project proposal and materials needed

Topic: Home Automation Security and Vulnerabilities (need 3 word copies)

1) Submit mini project Topic with brief explanation. ( Home Automation Security and Vulnerabilities ) due today

2) Submit a brief abstract describing your mini project. (2nd copy) 

3) Subit minsi project materials.(3rd copy)

600-800 words, double spaced, written in APA format, showing sources and a biblography

Business Intelligence

Why is the IoT considered a disruptive technology?

Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities

1-3 Final Project Review and Topic Submission

 The final project for this course is the creation of an information technology incident report. The rubric (Topic) attached covers the topic, while the “Final Rubric” covers the actual final project broken down in modules. The project is broken down into 3 modules.  The person chosen will come up with a topic for this specific question and I will work with them throughout the remaining modules.  Willing to pay $10 just to come up with a topic that will be used for the remaining modules and final.

Create summary tables that address relevant factors related to COVID-19(Must need knowledge on visualizing tools like Tableau or R datasets)

Academic Research Team Project Paper

COVID-19 Open Research Dataset Challenge (CORD-19)

An AI challenge with AI2, CZI, MSR, Georgetown, NIH & The White House

(1) FULL-LENGTH PROJECT

Dataset Description

In response to the COVID-19 pandemic, the White House and a coalition of leading research groups have prepared the COVID-19 Open Research Dataset (CORD-19). CORD-19 is a resource of over 44,000 scholarly articles, including over 29,000 with full text, about COVID-19, SARS-CoV-2, and related corona viruses. This freely available dataset is provided to the global research community to apply recent advances in natural language processing and other AI techniques to generate new insights in support of the ongoing fight against this infectious disease. There is a growing urgency for these approaches because of the rapid acceleration in new coronavirus literature, making it difficult for the medical research community to keep up.

Call to Action

We are issuing a call to action to the world’s artificial intelligence experts to develop text and data mining tools that can help the medical community develop answers to high priority scientific questions. The CORD-19 dataset represents the most extensive machine-readable coronavirus literature collection available for data mining to date. This allows the worldwide AI research community the opportunity to apply text and data mining approaches to find answers to questions within, and connect insights across, this content in support of the ongoing COVID-19 response efforts worldwide. There is a growing urgency for these approaches because of the rapid increase in coronavirus literature, making it difficult for the medical community to keep up.

A list of our initial key questions can be found under the Tasks section of this dataset. These key scientific questions are drawn from the NASEM’s SCIED (National Academies of Sciences, Engineering, and Medicine’s Standing Committee on Emerging Infectious Diseases and 21st Century Health Threats) research topics and the World Health Organization’s R&D Blueprint for COVID-19.

Many of these questions are suitable for text mining, and we encourage researchers to develop text mining tools to provide insights on these questions.

In this project, you will follow your own interests to create a portfolio worthy single-frame viz or multi-frame data story that will be shared in your presentation. You will use all the skills taught in this course to complete this project step-by-step, with guidance from your instructors along the way. You will first create a project proposal to identify your goals for the project, including the question you wish to answer or explore with data. You will then find data that will provide the information you are seeking. You will then import that data into Tableau and prepare it for analysis. Next you will create a dashboard that will allow you to explore the data in depth and identify meaningful insights. You will then give structure to your data story by writing the story arc in narrative form. Finally, you will consult your design checklist to craft the final viz or data story in Tableau. This is your opportunity to show the world what you’re capable of – so think big, and have confidence in your skills!

Kaggle Website:

https://www.kaggle.com/allen-institute-for-ai/CORD-19-research-challenge

Assignment Length (word count): at least 15 pages.

References: At least 10 peer-reviewed, scholarly journal references.

PRACTICAL COONECTION ASSIGNMENT ON DATA MINING

For this project, you will write a 2-3 page APA formatted paper on a how your job/occupation or school major connects to Data Mining. You will select a particular industry you may be associated with and describe how you personally connect with that industry and Data Mining. You should provide discussion, references, and so on, in sufficient details. 

The paper should include the following sections each called out with a Headers. 

· Introduction: Overview of the Discussion.

· Background: The section should include history and background of organization’s name, and the industry associated with the organization.

· References: Please include a separate reference page any necessary references.

The paper must adhere to APA guidelines including Title and Reference pages. There should be at least two scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.

2 and half page

I want to demo chat web application with technology Angular 8 or above (frontend) and Spring (backend) with mysql databse
1. user can signup and login and chat with each other (one to one chat for example facebook)
2. web page design is not needed.
4. all chat should be store in database. if user have some chat and when it logout then after login all previous chat should be present in chat history.
3. it should be work in windows 10.