Identify a non-compliant state using first order logic

Assignment Help Computer Engineering
Reference no: EM131765205

Assignment: Take Home Portion

Directions:

This part, i.e. the Problems section is ‘open internet' meaning that you can use any online source, physical book, slides from class, or personal notes on the take home portion. Doing so will result in a significant grade penalty (an F for the course). I will be employing a number of cheat detection mechanisms to ensure compliance.

You must submit all of your answers as typed text in-line in this test document. Graphs may be hand-drawn and scanned in or created digitally.

Problems

1. you are a security analyst that is consulting with an industrial factory called Fictional Terrible Company (FTC) that makes a special type of chemical called "Destructoviralbacteriumuraniumpostapocalypseicus" (DVBUP for short). FTC is regulated by the Environmental Protection Agency (EPA) and has to pay for each violation they have:

The EPA provides the following information about penalties:

Laws and regulations

Fine for each violation (per day per incident)

Hazardous Waste Disposal

$71,264

Clean Air Act

$95,284

Clean Water Act

$52,414

Safe Drinking Water Act

$54,789

FTC provides the following information about their industrial plant
Below is the table of the past problems we have had.

Problem

Incidents

Avg. Number of Days to mitigate

Sabotage Pipe breakages that have led to DVBUP release

16 times in the past 8 years

2

Insecure SCADA system that has led to DVBUP release

2 times in the past 8 years

15

FTC also states the following:

• 8 of thepipe breakages caused a Clean Air Act violation, 4 caused a Clean Water Act violation, and 4 lead to violations of both the Clean Air and Clean Water acts

• 1 of the times, when hackers breached our SCADA systems, they released materials into the air, the other led to a release that went into the water, but also got into the drinking water table causing us to pay penalties for the both the clean water act and the safe drinking water act

• We've not had any Hazardous Waste Disposal issues

a) State the two security problems as threats quantitatively using Expected Threat Impact (ETI) and Annual Threat Loss Expectancy (ATLE). Show all of the work.

b) Given your calculations in a) you confer with Bill Mahoney of the UNO Cybersecurity department to come up with a secure SCADA architecture. Bill says that, for $600,000 he can assemble a team of students at UNO that can mitigate the problem. Based on a look at the national numbers, you figure the solution will reduce the number of exploitations to once in 10 years - but wont change how long it takes to mitigate. You also confer with a physical security company to look into new fencing that will reduce the sabotage incident frequency by90% (i.e. to once every 5 years). The fencing will cost $500,000. Draw a single decision tree that showsALL of the different options available. Use the information above to estimate the probabilities and costs at each step.

c) Assuming a risk neutral approach, is it cheaper to mitigate one SCADA, sabotage, both problems, or to do nothing in a 1 year time interval? What about a 5 year time interval? Use the decision tree to justify your answer

2. You are given the following policy from the NIST SP 800-53.

IA-3: DEVICE IDENTIFICATION AND AUTHENTICATION

The information system uniquely identifies and authenticates [Assignment: organization-defined specific and/or types of devices] before establishing a [Selection (one or more): local; remote; network] connection.

Assume the organization in question - FTC from question 1, has instantiated the policy using the following selections as follows.

The information system uniquely identifies and authenticates mobile phones and IoT devices before establishing a network connection.

a) Write a first order logic statement that represents the control for FTC.

b) Identify a non-compliant state (i.e. scenario that is not acceptable by the policy) using first order logic.

c) Given your answers, draw a Venn diagram that visibly shows the "secure states" and "insecure states" for the information system. Assume a closed-world assumption is in place (i.e. only your logic statement defines what is secure and insecure.

Reference no: EM131765205

Questions Cloud

Operating leverage-business risk : What do the above results suggest with regard to the operating leverage vs. business risk?
What are the values underlying the policy objectives : What are the various theories about the causes of the problem/s? Based on this, what do you think is/are the most important causes/s of the problem/s?
How much overhead cost would be assigned to product : How much overhead cost would be assigned to Product J00A using the company's activity-based costing system? Show your work.
Consideration in conducting your assessment : what factors would you take into consideration in conducting your assessment, and what plan of action do you think would be most promising?
Identify a non-compliant state using first order logic : Write a first order logic statement that represents the control for FTC. Identify a non-compliant state using first order logic.
Face least trade-offs with their current responsibilities : Under what project management structure would these five employees face the least trade-offs with their current responsibilities?
Compute pension expense for the year : The following facts apply to the pension plan of Boudreau inc for the year 2010 - Using the preceding data, compute pension expense for the year 2010
Beta using hamada equation if the tax rate : Assume an all-equity firm starts to borrow with 30% debt ratio. If the unlevered beta=1.5, what will be the leveled beta.
What are austin''s total itemized deductions on schedule a : What are Austin's total itemized deductions on Schedule A, The amount of Austin's retirement savings contributions credit in the Tax and Credits

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd