Reference no: EM13981247 , Length:
Follow lab outline, as you go and use lab sample project that I have attached as a guideline. This project needs to be written just like lab sample project file. About 14-18 pages is required, I have included pictures that can be used in the paper as well.
Lab I - Descriptive/Persuasive Paper
Paper Requirements (Individual Assignment)
The goal of this assignment is to prepare a descriptive paper that communicates the characteristics of your team's CS 410 product to the stakeholders who could be a colleague, a customer, or anyone with interest in the associated societal problem. The paper should describe innovative aspects of your product and persuade the stakeholders of the intrinsic value of your product. This must be supported with reference material identified in CS 410 along with the results of any additional research performed.
The purpose, in your role as a designer of the prototype of the CS 410 project, is to inform the stakeholders of the differences that will exist in the laboratory prototype to be developed this semester. You need to communicate what elements will be modeled/simulated, what elements will be eliminated, and what will be added to facilitate testing.
You should not assume that any reader has knowledge about any of the salient topics of the product other than those that are commonly available in the current media. That media is the Internet, the local news, newspapers, and television and radio broadcasts.
Your paper should have a transparent connection with the descriptive material that was prepared during CS 410 and contains the technical characteristics of the project. Figures and/or tables may be incorporated in the paper, but these elements are not essential. You will be evaluated on your technical writing skills as well as on grammar and style.
Your paper should be double-spaced and submitted via Blackboard. You should use a font size that is no greater than 12 pts. Your paper's margins should be no greater than one inch right and left, top and bottom. APA guidelines must be adhered to. Guidance and course specific interpretations of the guidelines are provided in Blackboard.
The paper must follow APA style, and must include a cover page, table of contents, glossary, and references. Your paper must strictly adhere to the content defined below. The information within the brackets "<" and ">" describe the content to be written within each section. Replace "XXX" with the title of your product.
Following your submission of the paper, make sure to add your professional development reflections on your blog in Blackboard.
1 INTRODUCTION
<Introduce the CS 410 product and the approach to demonstrating its characteristics through prototyping (essentially an abstract). Should be approximately one page in length. Should summarize the societal problem with some reference/date support. Should outline problem and needed solution characteristics. Should introduce your product by name as the solution.>
2 XXX PRODUCT DESCRIPTION
<Top level description of CS 410 product for the average reader - summary of the solution - and its goals and objectives. This section should be one paragraph minimum.>
2.1 Key Product Features and Capabilities
<What does it do? What is significant/unique/innovative about it? What does it accomplish? Describe how this solves the problem.>
2.2 Major Components (Hardware/Software)
<Overview of the hardware needed to support the solution. Describe how it is structured based on CS 410 Major Functional Component Diagram (MFCD). Define and describe the software to be developed.>
3 IDENTIFICATION OF CASE STUDY
<Who is this product being developed for and why? Who else might use this in the future?>
4 XXX PRODUCT PROTOTYPE DESCRIPTION
<Top level description of the CS 411W prototype as it relates to the end product (410) - goal. Are capabilities reduced or eliminated? Simulated - modeled?>
Include a table of comparison between RWP and Prototype either in section 4.>
4.1 Prototype Architecture (Hardware/Software)
<How will the prototype be structured to demonstrate key features of the 410 product. Prototype MFCD provided and described.>
4.2 Prototype Features and Capabilities
<What does the prototype demonstrate - why is that significant in showing how the problem is solved - or why you have demonstrated success? How does the prototype address the 410 project risk mitigation? Describe the functional goals and objectives.>
4.3 Prototype Development Challenges
<Challenges expected while completing the objectives of the prototype - ie knowledge missing, capability missing, supporting technology issues.>
Lab 1 outline
1. Introduction
1. Introducing Sentinel Security
a. Team
b. Purpose/Goal
i. Secure Communication for all professionals/healthcare workers.
ii. Plug-and-play Hardware
1. Lightweight
2. Transportable
3. Fast Connection.
2. Problem Statement
a. Secure communication for mobile
b. Frequent and extensive updates
c. Security evaluation of mobile technologies
i. Slow
ii. Costly
iii. Incomplete
iv. Continuously evolving
3. Solution Statements
a. Using Raspberry Pi
i. Intercepts all data
ii. Encrypts data
iii. Routes to data center.
b. Using Data Center
i. Receives data
ii. Decrypts data
iii. Analyzes for malicious pattern
iv. Forwards to intended recipient
2.0 Sentinel Security Product Description
1. Encrypt and forward traffic
2. Gather traffic data
3. Analyze traffic
4. Predict persistent threats
2.1 Product features and capabilities (end goal)
1. User access management
a. Adding user
2. Removing user
3. Plug and Play
a. Wifi-implemented
4. Android devices
a. download app
5. Traffic
a. Monitoring
b. Analyzing
c. Blocking/Permitting
6. Traffic database
a. IP origin
b. IP destination
7. Recognize persistent threats
2.2 Major Components (Hardware/Software)
1. Hardware (what equipment I as a user and I as a admin need to have)
a. Android Device
b. Raspberry Pi 2
c. Datacenter
2. Software (what software do I need as a developer)
a. MySQL
b. WireShark
c. OpenVPN
d. Sentinel Security Android App
3. Software developments (what software am I writing as a team to create the solution)
a. Wireshark to Database Conversion
b. Traffic Analysis
c. app (UI)
d. reporting mechanism
i. scheduled (maintenance)
ii. non-scheduled (alerts)
3.0 Identification of Case Study
1. Product is developed for MITRE with potential customer industries
a. Medical
b. Financial
c. Legal
d. Defense
e. Governmental
2. Prototype is developed as a test-bed
3. Simulation
a. Proof of concept
i. 4 files
1. permitted or denied IP
2. Push or pull request
b. Traffic stress
i. 100 files
1. permitted and denied IP
2. Push and pull request
c. Risk mitigation
i. only valid users send and receive
d. Plug and Play
i. Connect hardware for recognition
ii. Disconnect and reconnect recognition
e. Add and remove employees
4.0 Sentinel Security Product Prototype Description
1. Sentinel Security App
a. Downloadable
b. Simple to use
c. One-click authentication
2. Raspberry Pi
a. No interface
b. Connects phone to datacenter
3. Datacenter
a. Gather traffic data
b. Data flow
i. Permit
ii. Deny
4.1 Prototype Architecture (Hardware/Software)
1. Hardware
a. Android Device
b. Raspberry Pi 2
c. Virtual Machine provided by ODU CS dept
2. Software to be used
a. MySQL
b. WireShark
c. OpenVPN
d. Sentinel Security Android App
3. Prototype software to be developed
a. Algorithms
i. Manage traffic data
ii. Store traffic data
b. Testing suit
i. Collection of tests
ii. Simulation tests in 3.0.3
c. Report generation
4.2 Prototype Features and Capabilities
1. File access
a. Grant or deny
2. Gather traffic data
3. Encrypts data before transmission
4. Decrypts data upon arrival
5. Android app activates connection
4.3Prototype Development Challenges
1. Limitations of hardware
2. Lack of skills
3. Connecting product chain
4. Proving ease of use
5.0 Glossary
1. Sentinel Security - encryption and communication evaluation for mobile devices
2. Plug-and-Play Hardware - denoting or relating to a devices that are intended to work perfectly when first used or connected, without reconfiguration or adjustment by the user.
3. Raspberry Pi - is a low-cost, basic computer that runs entirely on open-source software.
4. Datacenter - a large group of networked computer servers typically used for the remote storage, processing, or distribution of large amounts of data.
5. Encryption - the conversion of electronic data into another form, called ciphertext.
6. Decryption - the conversion of encrypted data back to it's original form.
6.0 References
Sentinel Security
Encryption and Communication Evaluation for Mobile DevicesProblem Statement
Migration to the use of evolving mobile technologies for secure communication in highly regulated industries is arduous.
Problem with Devices
Popularity of mobile devices
Updates are frequent and extensive
11 versions in under 10 years1
Security is asserted by evaluation of mobile technologies
Slow
Costly
Incomplete
Continuously evolving
Attachment:- CS project.rar