CSCI 397 ICSCIS paper on Advantech – WebAccess (SCADA)

TOPIC- Advantech – WebAccess (SCADA)

OVERVIEW

A key objective of any academic program is the refinement and reinforcement of strong communication skills. 

The same ability of a cyber security professional to compile information and present findings, observations, and recommendations in a clear, 

concise, and understandable manner is equally important. 

It is for these reasons that a requirement exists for the successful completion of this course to perform research centering on a 

specific automation vendor and their industrial solution offering and compile a paper summarizing the findings in a form of security assessment.

The paper will focus on selecting a company and one of their industrial control system offerings. 

Solutions are often aligned to specific industry sectors and customer bases. These solutions should be understood to then look at vulnerabilities

that have been disclosed targeting these systems. Equally important is the impact to the business operations of the end-user or asset owner should 

any of these vulnerabilities be exploiting – either intentionally or accidentally.

It is essential to evaluate the unmitigated risks associated with these vulnerabilities and develop a recommended list of actions that would help the asset 

owner in mitigating some of these risk in order to improve the operational integrity of their cyber-physical systems.

1-The paper shall be at least five (6) and no more than ten (10) pages in length excluding figures, tables, and references. 

2-The paper shall be formatted using an 11-point font of either Arial, Helvetica, or Times Roman type using 1″ margins on the sides and double-spacing between 

3-lines with 0.5″ indentation on first line of paragraphs. 

4-The paper shall be written using the APA style guide seventh edition published in October 2019. Online guidance can be viewed at https://apastyle.apa.org.

5-All tables and figures shall be captioned and specifically referenced in the body of the document. 

6-All references shall be stated and included as endnotes in this paper. Citations must meet the following requirements:

7-No more than two (2) citations shall be from Wikipedia

8-At least two (2) references shall be from United States government sites (e.g. CISA, NIST)

9-At least two (2) references from vendor web (html) or printed (pdf) material

10-At least two (2) references shall be from independent sources including but not limited to

   News Media Outlets (e.g. Reuters, Washington Post, Wired, CSOOnline)

   Industry Publications (e.g. Automation, ISSSource, Control)

   Trade Sources (e.g. Oil and Gas Journal, ChemWeek, PharmaTimes)

   Security Solution Providers (e.g. McAfee, Trend Micro, Dragos, Claroty) to name several.

 Grading for term research paper and associated presentation will be based on the following metrics:

     20% = Ideas and Analysis

     20% = Organization

     20% = Development and Support

     10% = Style

     20% = Mechanics

     10% = miselaneous

 

The term research paper should be logically divided into sections that follow sound research paper style and address each of the following areas. 

You are free to organization the paper and presentation as appropriate,

 however a template has been provided for both the paper and presentation to help start the initial paper structure.

The section titles (paper) and slide titles (presentation) in the templates are for reference only.

Your paper shall address and develop each of the following items:

1-System overview (textual) and architecture (graphical) covering devices and network topology explaining the function of each of the key assets

2-Communication protocols used by the system

3-Industry sectors that use the system

4-Vulnerabilities publicly disclosed for the system and the publication of any exploitation packages

5-Potential or actual impact of the vulnerabilities discovered to the industry sectors served

5-Cyber security measures taken by the vendor to secure the system

7-Additional cyber security measures that could be taken by the end-user user if the vendor recommendations are not feasible (e.g. an upgrade could not be performed in a timely manner)

Reference links

https://icscsi.org/library/#osint

https://us-cert.cisa.gov/ncas

https://icscsi.org/library/#news

https://training.icscsi.org/mod/resource/view.php?id=2568

c++

solve the h.w and tutorial questions by writing the code and the flowchart

KPIs

  

300 words minimum, word document

Assignment Instructions:

Explain KPIs what are they, as they apply to web analytics.

Explain your position if you agree or disagree with their relevance in web analytics.

Explain your position.

Use the following links for references:

https://www.kaushik.net/avinash/insights-web-analytics-kpi-measurement-techniques/

https://www.kaushik.net/avinash/web-analytics-101-definitions-goals-metrics-kpis-dimensions-targets/

https://www.kaushik.net/avinash/best-web-metrics-kpis-small-medium-large-business/

https://www.kaushik.net/avinash/measure-choose-smarter-kpis-incentives/

https://www.datapine.com/kpi-examples-and-templates/google-analytics

CC W 5 A

Write a 3-5 page double space paper about how this course is relevant  to your current or future job.

Course – Cloud Computing

Job – Salesforce Developer / Software Developer / Software Programmer

3 – 5 pages are mandatory

Project Management Team Deliverable 1

Topic:

The three project potential selections are home addition, garage conversions to an apartment, and a flash mob projects.

Work with the project team to identify and discuss three (3) potential projects.  Discuss which of the available projects are suitable based on the team’s composition.

Review the following article on SMART Projects. 

Haughey, D. (2016). Smart goals. Retrieved from https://www.projectsmart.co.uk/smart-goals.php 

Draft:

Project managers are responsible for every aspect of a project, from its start date until project completion. A project is something that is intended to have short shelf life and is an activity of manufacturing something that is useful and different in nature (Management Study Guide, 2021 para. 1). This paper will describe and detail the reason for selection of the groups top project, predicated on the project’s anticipated goals, benefits, and key success criteria. The group selected the home addition as their top project. This paper will also describe the three potential projects the team discussed, analyzed, and selected. 

The three project potential selections are home addition, garage conversions to an apartment, and a flash mob projects.

Potential Projects

Project Selection

Summary Paragraph

IA 4

In 250-300 words.  

Describe each of the elements of a Business Continuity Plan (BCP).

COMPLEXITY AND INFORMATION SYSTEMS RESEARCH IN THE EMERGING DIGITAL WORLD

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 

Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Project 1: Block Encryption in CBC Using 3DES

 

For this project you will solve the problem presented using Figure 7.17 located in our text and write a 2-3 page report that includes the following: 

  • 2-3 pages of content minimum (does not include cover, abstract or references pages)
  • Paper must conform to full APA guidelines to include a cover page, abstract, headers, introduction, body paragraphs with appropriate headings/subheadings, conclusion, and a reference page.
  • All sources must be cited and references. Remember, unless the statement is common knowledge, you must cite and reference your sources.
  • You must use at least one peer-reviewed source 
  • Ensure you follow academic integrity policies.  

Problem:  You want to build a hardware device to do block encryption in the cipher block chaining (CBC) mode using an algorithm stronger than DES. 3DES is a good candidate. Figure 7.17 shows two possibilities, both of which follow from the definition of CBC. Which of the two would you choose and why: 

  1. For security?
  2. For performance? 

You must fully explain your justification and reasoning.

Emerging Technologies Paper

 

Write an essay of at least 500 words discussing discussing how a blockchain implementation would improve data security in a military, education, or other context. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.