Computer Science homework help


Course Number CSCI 497.1SW (Commerce) and 497.6SW (RELLIS)
Course Time Monday: 1700 – 1930h
Semester Fall 2021
Submission Assignment 7
Due Date November 22, 2021
Office Hours  






The assignment for this week consists of you completing the following:


  • Ensure that you have selected a topic under the “Term Paper Topic Selection” activity under the Term Paper section of the course
  • Review the “Term Paper Requirements” activity “Contents and Structure” chapter under the Term Paper section of the course
  • Complete the outline as directed in this Assignment Submittal on the following pages


Please be sure and complete the cover page with your name as it appears on your university identification card, your corresponding email address, and whether you are attending the Commerce or RELLIS campus course prior to submission. Do not forget to submit your work when you have completed this assignment.


(Note: problems may to occur if using Google Chrome as a browser where it tries to open links in Google Docs. The “Docs PDF/PowerPoint Viewer (by Google)” extension must be disabled or removed.)Computer Science homework help

The term research paper and associated presentation should be logically divided into sections that follow sound research paper style and address each of the areas defined by the “Term Paper Requirements”. You are free to organization the paper and presentation as appropriate, however a template has been provided for both the paper and presentation to help start the initial paper structure.


This Assignment requires that you provide the high-level organization and key factual items that will form the basis of the paper. Please supply as indicated below. Information presented should be summarized and demonstrate that the foundation for completion of the paper by the required Due Date has been collected and is understood.


The topics presented in this Assignment are provided to assist in data collection, and do not necessarily need to be covered in the paper in their entirety.



Company Overview


Company Name:



Company Headquarters:



Major Geographical Regions Served:



System Name:



System First Released:



Sales Website URL:



Service and Support Website URL:



System Overview Brochure URL:




System Overview


Please attach a System Overview graphic (copy/paste from brochure):



Names and Functions of Key System Components:



Names of System Communication Networks:



What vendor-supplied security components are available?



Does the vendor offer any other systems as part of their portfolio? If so, please provide system names.




Communications and Protocols


Describe the primary protocols and methods used between the key system asset types. This must address communication to/from field-connected controllers, communication to/from human-machine interfaces, and communication to/from historical data repositories as a minimum.



Are any of these protocols proprietary? If so, please describe.




Industry Sectors using this System


Please provide the primary markets the system is targeted. You can either use U.S. defined Critical Infrastructure and Key Resources (CIKR), or Standard Industry Classification (SIC) for industry identification.





Vulnerabilities Disclosed for this System


Please provide any vulnerabilities that have been publicly disclosed that target the system under consideration.  Include source, year, and disclosure reference identifier. Computer Science homework help

(hint: useful links are provided under the Week 9 Vulnerability and Exploit References provided on the Moodle LMS)



Were publicly available exploit packages made available that target the identified vulnerabilities?

(hint: useful links are provided under the Week 9 Vulnerability and Exploit References provided on the Moodle LMS)




Impact and Consequences to Industry Sectors Served (Risk Identification)


For the top 2-3 vulnerabilities discussed above, please provide a brief scenario (1-2 sentences) of how the successful exploitation of the vulnerability would impact the operating of the system and how it delivered its essential services to the industry it is deployed.




Mitigation (Risk Reduction)


Though NOT required for this Assignment, please be prepared in the term paper to discuss the vendor’s recommendations to mitigate the risk introduced from these vulnerabilities, and AT LEAST one compensating control that could be used to reduce risk in the absence of applying the vendor’s recommended corrective action.  Attention should focus on minimizing the severity of the Consequence/Impact and not that of the vulnerability alone in isolation. Computer Science homework help




15% off for this assignment.

Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!

Why US?

100% Confidentiality

Information about customers is confidential and never disclosed to third parties.

Timely Delivery

No missed deadlines – 97% of assignments are completed in time.

Original Writing

We complete all papers from scratch. You can get a plagiarism report.

Money Back

If you are convinced that our writer has not followed your requirements, feel free to ask for a refund.

Scan the code