How do we integrate privacy and security into cps design

Assignment Help Computer Engineering
Reference no: EM131054408

DQ 1

Read the NSF Program Solicitation for research and development proposals for cyber-physical systems before attempting to answer this question.

In the solicitation, NSF asks technology researchers to address the following questions:

1. "How do we design CPS to be safe, secure, and resilient in a variety of unanticipated and rapidly evolving environments and disturbances?"

2. "How do we integrate privacy and security into CPS design?"

Pick one of these questions and discuss why finding answers to the question is important to the development of technologies for cyber-physical systems.

Post a 250+ word response to this message. Include APA format citations and references as appropriate to the information used and the sources from which you obtained that information.

DQ2

Read the DHS Transition to practice (TTP) technology guide (FY 2015) (posted under Week 5 > Content). Choose one of the emerging applications of technology that was selected for testing by DHS.

Identify the critical infrastructure sector (https://www.dhs.gov/critical-infrastructure-sectors) that would best benefit from the adoption of this emerging application of technology. Then, explain how this application of technology could be used to build a resilient or attack resistant national infrastructure that has 24x7x365 availability.

Post your analysis as 250+ word response to this message. Include APA format citations and references as appropriate to the information used and the sources from which you obtained that information.

Reference no: EM131054408

Questions Cloud

Encrytion should be specified to be wpa or wpa2 : Many companies have concerns about security when using wireless. The encrytion should be specified to be WPA or WPA2 and some companies insist on also using VPN over the local wireless? WHY?
How much ?fencing is needed to enclose the lot : An airport parking lot is a rectangle of a mile wide and of a mile long. How much ?fencing is needed to enclose the lot? Show work using fraction arithmetic, and include units with your answer
Vapor pressure of the resulting solution : If 0.340 mol of a nonvolatile nonelectrolyte are dissolved in 3.00 mol of water, what is the vapor pressure of the resulting solution? (The vapor pressure of pure water is 23.8 torr at 25.0 °C.)
What do you prefer a cloud -based or an on premise solution : After thinking about your project and the aforementioned questions, do you prefer an off-the-shelf system, or a custom-built solution in your organization and what about for this current (scenario project)? Which option and why or do you have no ..
How do we integrate privacy and security into cps design : How do we design CPS to be safe, secure, and resilient in a variety of unanticipated and rapidly evolving environments and disturbances? How do we integrate privacy and security into CPS design?
What is the book value at the end of year : A truck costing $25,000 with a residual value of $5,000 was purchased. The truck's estimated life is 10 years. What is the book value at the end of year 2 using the declining balance method
Solvent for extraction of organic compounds : Diethyl ether, used as a solvent for extraction of organic compounds from aqueous solutions, has a high vapor pressure which makes it a potential fire hazard in laboratories in which it is used. How much energy is released when 100.0 g is cooled f..
Ground state of electron : Which monatomic ion has a charge of 1+ and the electron configuration [Kr] 4d10 5s2. Write the element and the charge. How many unpaired electrons are there in the ground state of this electron?
What is the lowest mark that a student can have : The scores on a university examination are normally distributed with a mean of 62 and a standard deviation of 11. If the top 15% of students are given A's, what is the lowest mark that a student can have and still be awarded an A

Reviews

Write a Review

Computer Engineering Questions & Answers

  Computer instruction format

In the computer instruction format, the instruction length is 11 bits and size of an address field is 4 bits? Is it possible to have the 5 2-address instructions 45 1-address instructions 32 0-address instructions utilizing the format.

  Describe the significance of diagramming tools for process

discuss the importance of diagramming tools for process modeling. without such tools what would analysts do to model

  Program to experiment various sort algorithms

Develop a program which enables you to experiment along with the various sort algorithms. This program must allow you to easily plug-in the new sort algorithms and provide comparison between them.

  Select one phase of the database life cycle and describe

per the text the database life cycle includes the database initial study database design implementation and loading

  Implementing the soubly linked list adt

Develop, implement, and test the soubly linked list ADT, utilizing the DLLNode objects as the nodes. Additionally to our standard list operations, your class must offer for backward iteration through the list.

  Build a word document listing the software

The scenario is that you do volunteer work for the small, self-funded community support group. With very little money available, the group has been unable to computerize its operations.

  Write down java application to accomplish

Ask users for the past 5 years of federal taxes they have paid, save this data to an array, search for largest and the smallest amount of tax, and display it to screen.

  Decision making systems

How we may leverage business intelligent to generate meaningful information and decision making systems in order to help the keep cost and the profits.

  A brief explanation of how the game was integrated

A brief explanation of how the game was integrated with the concepts of computing, if the game already exists. Three scenarios of game play including

  What is big-o running time of following code fragment

What is the Big-O running time of the given code fragment and If an ArrayList is passed for lst. Describe your answer.

  Write down a paper comprising of 500-1000 words

write a paper consisting of 500-1000 words double-spaced on the security effects of cryptographic tunneling based on an

  You have been asked to be the project manager for the

you have been asked to be the project manager for the development of an information technology project. the system to

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd