Detail and explain the security aspect in full

Assignment Help Computer Engineering
Reference no: EM132195810

Assignment: Modern aircraft such as the Boeing 787 are full of technology including advanced avionics, a fiber optic data bus for networking, and high tech in-flight entertainment systems (IFE).

This assignment requires you to explore an aviation-related network security topic and report your findings using the PowerPoint presentation tool. To begin, select one of the topics below (in bold font) and review the sample materials to gather background information. Alternatively, you may opt to select a different topic related to aviation network security and will then need to research additional sources.
Example topics and useful sources to get you started. Be sure to research at least one additional reference.

• Wireless network security for customers using in-flight WiFi services
Gogo Business Aviation. (2017). Aircraft router basics: decoding 802.11 capabilities for in-cabin wi-fi. Retrieved from: https://business.gogoair.com/resource-center/gogo-iq/blog-posts/wireless-router-basics-decoding-802-11-capabilities

Kerner, S. (2017, January 3). Gogo inflight wifi boosts security with bug bounty program. eWeek.

LaPlante, A. (2017, January 24). In-flight wifi? Not so safe. Bright Ideas.

• Security of the on-board network used by the avionics, navigation and control systems

Biesecker, C. (2017, November 8). DHS led team demonstrates that commercial aircraft can be remotely hacked. Defense Daily.

Government Accountability Office.(2015, April). FAA needs a more comprehensive approach to address cybersecurity as agency transitions to NextGen.

Leyden, J. (2017, November 15). How can airlines stop hackerspwning planes over the air? And don't say 'regular patches'. The Register.

Create an original presentation using PowerPoint. The following bullets will help you get started.

• Define the issue(s). Provide background information.

• Detail and explain the security aspect in full. What are the risks and what safeguards are in place (or should be)?

• What does the future hold? What changes are needed?

Presentation Requirements:

1. Cover slide

• Presentation title and name of presenter.

• Include an image or interesting background image.

• Introduction typed out within slide notes. This includes a statement of what the presentation is to be about.

2. Four to five content slides

• Use slide design best practices

• Include a minimum of three images. Avoid use of grainy images or those with small text.

• Verbal content that is to be spoken needs to be written out within the slide notes on each slide.

3. Summary slide

• Key points are reinforced - this is similar to a conclusion.

• Avoid use of complete sentences on the slide - use the slide notes for these.

4. References slide

• Should appear similar to how the references are shown above.

• One of the references must be one you researched and be less than a year old.

The verbal content within the slide notes should be no less than 5 minutes (what you would say if you delivered it in person).

Reference no: EM132195810

Questions Cloud

What are the benefits and risks of cloud computing : What are the benefits and risks of cloud computing for a business? Does a company you do business with use cloud computing? How so?
Analyzing cognitive and educational evaluation : In a 500-750-word analysis, advocate for the appropriate educational decisions for this student based on the assessment results
Compute the average for the differences for exam 2 : Compute the average for the differences for Exam 2 -Exam 1 (New method and Old method).
Consumption of water per household : We conclude that the mean consumption of water per household has due to the campaign by the city council.
Detail and explain the security aspect in full : Detail and explain the security aspect in full. What are the risks and what safeguards are in place (or should be)? What does the future hold?
What is the probability that the person : Given that a person tests negative, what is the probability that the person actually is HIV positive?
Social media changed way you consume entertainment : How has social media changed the way you consume entertainment, play games, and learn about news?
Understand the relationship among several variables : How simple regression modeling can be extended to understand the relationship among several variables
What price you would offer to the seller and why : Suppose that you are considering purchasing a previously owned 2007 Camry that has been driven 60,000 miles. What price you would offer to the seller and why?

Reviews

Write a Review

Computer Engineering Questions & Answers

  For the three common methods of system interaction

for the three common methods of system interaction --command language menus and objects-- recall a software package

  Review the ccpm approach and explanations

"Why, if there is a tendency to overestimate activity durations, and add safety to the end of a project, do so many projects come in behind schedule?"

  Identify reasonable entities for the system

Identify relationships one-to-one, one-to-many, or many-to-many using the crow's foot notation described

  Examples of suitable values for each of subsequent type

Give examples of suitable values for each of the subsequent type expressions. Do not use the empty list as the value for any list component.

  Why the computer storage is getting bigger

as it is true that computer storage is getting bigger and faster, how does that help us? As we start saving more and more information, it is really possible for the average person to keep all of the information organized? For large companies sure,..

  How to illustrate a memory map for a system

Illustrate a memory map for a system with a memory capability of 512MB. Each memory location in system is 8 bits.

  Based on the kramer 2013 article in the electronic reserve

write a 200- to 300-word short-answer response to the followingbased on the kramer 2013 article in the electronic

  What is the relationship between treesort and quicksort?

What is the relationship between treesort and quicksort? What causes removal from a search tree to be more difficult than insertion into a search tree.

  Explain methods whereby training materials can be delivered

Describe the methods whereby training materials can be delivered to the users of the software system. Explain the ways in which software can be supported after it is implemented/released.

  Find which one of the fourteen binary search trees

Find which one of the 14 binary search trees corresponds to each of the 24 possible ordered sequences of 1, 2, 3, 4.

  Perform a use case analysis for the scenario provided

Perform a use case analysis for the scenario provided. You are required to produce an appropriate Use Case Diagram of the whole system with all the use case relationship along with Use Case Specification for the Use Cases identified.

  What information about the geographic locations

What information about the geographic locations of the routers can you infer from the trace? What was the longest mean delay on any one hop along the way?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd