Name | |
Course Number | CSCI 497.1SW (Commerce) and 497.6SW (RELLIS) |
Course Time | Monday: 1700 – 1930h |
Semester | Fall 2021 |
Submission | Assignment 7 |
Due Date | November 22, 2021 |
Instructor | |
Phone | |
Office Hours |
The assignment for this week consists of you completing the following:
- Ensure that you have selected a topic under the “Term Paper Topic Selection” activity under the Term Paper section of the course
- Review the “Term Paper Requirements” activity “Contents and Structure” chapter under the Term Paper section of the course
- Complete the outline as directed in this Assignment Submittal on the following pages
ORDER A PLAGIARISM FREE PAPER NOW
Please be sure and complete the cover page with your name as it appears on your university identification card, your corresponding email address, and whether you are attending the Commerce or RELLIS campus course prior to submission. Do not forget to submit your work when you have completed this assignment.
(Note: problems may to occur if using Google Chrome as a browser where it tries to open links in Google Docs. The “Docs PDF/PowerPoint Viewer (by Google)” extension must be disabled or removed.)Computer Science homework help
The term research paper and associated presentation should be logically divided into sections that follow sound research paper style and address each of the areas defined by the “Term Paper Requirements”. You are free to organization the paper and presentation as appropriate, however a template has been provided for both the paper and presentation to help start the initial paper structure.
This Assignment requires that you provide the high-level organization and key factual items that will form the basis of the paper. Please supply as indicated below. Information presented should be summarized and demonstrate that the foundation for completion of the paper by the required Due Date has been collected and is understood.
The topics presented in this Assignment are provided to assist in data collection, and do not necessarily need to be covered in the paper in their entirety.
Company Overview
Company Name:
Company Headquarters:
Major Geographical Regions Served:
System Name:
System First Released:
Sales Website URL:
Service and Support Website URL:
System Overview Brochure URL:
System Overview
Please attach a System Overview graphic (copy/paste from brochure):
Names and Functions of Key System Components:
Names of System Communication Networks:
What vendor-supplied security components are available?
Does the vendor offer any other systems as part of their portfolio? If so, please provide system names.
Communications and Protocols
Describe the primary protocols and methods used between the key system asset types. This must address communication to/from field-connected controllers, communication to/from human-machine interfaces, and communication to/from historical data repositories as a minimum.
Are any of these protocols proprietary? If so, please describe.
Industry Sectors using this System
Please provide the primary markets the system is targeted. You can either use U.S. defined Critical Infrastructure and Key Resources (CIKR), or Standard Industry Classification (SIC) for industry identification.
(hint: https://en.wikipedia.org/wiki/Standard_Industrial_Classification)
Vulnerabilities Disclosed for this System
Please provide any vulnerabilities that have been publicly disclosed that target the system under consideration. Include source, year, and disclosure reference identifier. Computer Science homework help
(hint: useful links are provided under the Week 9 Vulnerability and Exploit References provided on the Moodle LMS)
Were publicly available exploit packages made available that target the identified vulnerabilities?
(hint: useful links are provided under the Week 9 Vulnerability and Exploit References provided on the Moodle LMS)
Impact and Consequences to Industry Sectors Served (Risk Identification)
For the top 2-3 vulnerabilities discussed above, please provide a brief scenario (1-2 sentences) of how the successful exploitation of the vulnerability would impact the operating of the system and how it delivered its essential services to the industry it is deployed.
Mitigation (Risk Reduction)
Though NOT required for this Assignment, please be prepared in the term paper to discuss the vendor’s recommendations to mitigate the risk introduced from these vulnerabilities, and AT LEAST one compensating control that could be used to reduce risk in the absence of applying the vendor’s recommended corrective action. Attention should focus on minimizing the severity of the Consequence/Impact and not that of the vulnerability alone in isolation. Computer Science homework help