Sentinel security product prototype description

Assignment Help C/C++ Programming
Reference no: EM13981247 , Length:

Follow lab outline, as you go and use lab sample project that I have attached as a guideline. This project needs to be written just like lab sample project file. About 14-18 pages is required, I have included pictures that can be used in the paper as well.

Lab I - Descriptive/Persuasive Paper

Paper Requirements (Individual Assignment)

The goal of this assignment is to prepare a descriptive paper that communicates the characteristics of your team's CS 410 product to the stakeholders who could be a colleague, a customer, or anyone with interest in the associated societal problem. The paper should describe innovative aspects of your product and persuade the stakeholders of the intrinsic value of your product. This must be supported with reference material identified in CS 410 along with the results of any additional research performed.

The purpose, in your role as a designer of the prototype of the CS 410 project, is to inform the stakeholders of the differences that will exist in the laboratory prototype to be developed this semester. You need to communicate what elements will be modeled/simulated, what elements will be eliminated, and what will be added to facilitate testing.

You should not assume that any reader has knowledge about any of the salient topics of the product other than those that are commonly available in the current media. That media is the Internet, the local news, newspapers, and television and radio broadcasts.

Your paper should have a transparent connection with the descriptive material that was prepared during CS 410 and contains the technical characteristics of the project. Figures and/or tables may be incorporated in the paper, but these elements are not essential. You will be evaluated on your technical writing skills as well as on grammar and style.

Your paper should be double-spaced and submitted via Blackboard. You should use a font size that is no greater than 12 pts. Your paper's margins should be no greater than one inch right and left, top and bottom. APA guidelines must be adhered to. Guidance and course specific interpretations of the guidelines are provided in Blackboard.

The paper must follow APA style, and must include a cover page, table of contents, glossary, and references. Your paper must strictly adhere to the content defined below. The information within the brackets "<" and ">" describe the content to be written within each section. Replace "XXX" with the title of your product.

Following your submission of the paper, make sure to add your professional development reflections on your blog in Blackboard.

1 INTRODUCTION
<Introduce the CS 410 product and the approach to demonstrating its characteristics through prototyping (essentially an abstract). Should be approximately one page in length. Should summarize the societal problem with some reference/date support. Should outline problem and needed solution characteristics. Should introduce your product by name as the solution.>

2 XXX PRODUCT DESCRIPTION
<Top level description of CS 410 product for the average reader - summary of the solution - and its goals and objectives. This section should be one paragraph minimum.>

2.1 Key Product Features and Capabilities
<What does it do? What is significant/unique/innovative about it? What does it accomplish? Describe how this solves the problem.>

2.2 Major Components (Hardware/Software)
<Overview of the hardware needed to support the solution. Describe how it is structured based on CS 410 Major Functional Component Diagram (MFCD). Define and describe the software to be developed.>

3 IDENTIFICATION OF CASE STUDY
<Who is this product being developed for and why? Who else might use this in the future?>

4 XXX PRODUCT PROTOTYPE DESCRIPTION
<Top level description of the CS 411W prototype as it relates to the end product (410) - goal. Are capabilities reduced or eliminated? Simulated - modeled?>
Include a table of comparison between RWP and Prototype either in section 4.>

4.1 Prototype Architecture (Hardware/Software)
<How will the prototype be structured to demonstrate key features of the 410 product. Prototype MFCD provided and described.>

4.2 Prototype Features and Capabilities
<What does the prototype demonstrate - why is that significant in showing how the problem is solved - or why you have demonstrated success? How does the prototype address the 410 project risk mitigation? Describe the functional goals and objectives.>

4.3 Prototype Development Challenges
<Challenges expected while completing the objectives of the prototype - ie knowledge missing, capability missing, supporting technology issues.>

Lab 1 outline

1. Introduction

1. Introducing Sentinel Security
a. Team
b. Purpose/Goal
i. Secure Communication for all professionals/healthcare workers.
ii. Plug-and-play Hardware
1. Lightweight
2. Transportable
3. Fast Connection.

2. Problem Statement
a. Secure communication for mobile
b. Frequent and extensive updates
c. Security evaluation of mobile technologies
i. Slow
ii. Costly
iii. Incomplete
iv. Continuously evolving

3. Solution Statements
a. Using Raspberry Pi
i. Intercepts all data
ii. Encrypts data
iii. Routes to data center.
b. Using Data Center
i. Receives data
ii. Decrypts data
iii. Analyzes for malicious pattern
iv. Forwards to intended recipient

2.0 Sentinel Security Product Description

1. Encrypt and forward traffic
2. Gather traffic data
3. Analyze traffic
4. Predict persistent threats

2.1 Product features and capabilities (end goal)

1. User access management
a. Adding user
2. Removing user
3. Plug and Play
a. Wifi-implemented
4. Android devices
a. download app
5. Traffic
a. Monitoring
b. Analyzing
c. Blocking/Permitting
6. Traffic database
a. IP origin
b. IP destination
7. Recognize persistent threats

2.2 Major Components (Hardware/Software)

1. Hardware (what equipment I as a user and I as a admin need to have)
a. Android Device
b. Raspberry Pi 2
c. Datacenter

2. Software (what software do I need as a developer)
a. MySQL
b. WireShark
c. OpenVPN
d. Sentinel Security Android App

3. Software developments (what software am I writing as a team to create the solution)
a. Wireshark to Database Conversion
b. Traffic Analysis
c. app (UI)
d. reporting mechanism
i. scheduled (maintenance)
ii. non-scheduled (alerts)

3.0 Identification of Case Study

1. Product is developed for MITRE with potential customer industries
a. Medical
b. Financial
c. Legal
d. Defense
e. Governmental

2. Prototype is developed as a test-bed

3. Simulation
a. Proof of concept
i. 4 files
1. permitted or denied IP
2. Push or pull request
b. Traffic stress
i. 100 files
1. permitted and denied IP
2. Push and pull request
c. Risk mitigation
i. only valid users send and receive
d. Plug and Play
i. Connect hardware for recognition
ii. Disconnect and reconnect recognition
e. Add and remove employees

4.0 Sentinel Security Product Prototype Description

1. Sentinel Security App
a. Downloadable
b. Simple to use
c. One-click authentication

2. Raspberry Pi
a. No interface
b. Connects phone to datacenter

3. Datacenter
a. Gather traffic data
b. Data flow
i. Permit
ii. Deny

4.1 Prototype Architecture (Hardware/Software)

1. Hardware
a. Android Device
b. Raspberry Pi 2
c. Virtual Machine provided by ODU CS dept

2. Software to be used
a. MySQL
b. WireShark
c. OpenVPN
d. Sentinel Security Android App

3. Prototype software to be developed
a. Algorithms
i. Manage traffic data
ii. Store traffic data
b. Testing suit
i. Collection of tests
ii. Simulation tests in 3.0.3
c. Report generation

4.2 Prototype Features and Capabilities

1. File access
a. Grant or deny
2. Gather traffic data
3. Encrypts data before transmission
4. Decrypts data upon arrival
5. Android app activates connection

4.3Prototype Development Challenges

1. Limitations of hardware
2. Lack of skills
3. Connecting product chain
4. Proving ease of use

5.0 Glossary

1. Sentinel Security - encryption and communication evaluation for mobile devices

2. Plug-and-Play Hardware - denoting or relating to a devices that are intended to work perfectly when first used or connected, without reconfiguration or adjustment by the user.

3. Raspberry Pi - is a low-cost, basic computer that runs entirely on open-source software.

4. Datacenter - a large group of networked computer servers typically used for the remote storage, processing, or distribution of large amounts of data.

5. Encryption - the conversion of electronic data into another form, called ciphertext.

6. Decryption - the conversion of encrypted data back to it's original form.

6.0 References

Sentinel Security

Encryption and Communication Evaluation for Mobile DevicesProblem Statement

Migration to the use of evolving mobile technologies for secure communication in highly regulated industries is arduous.

Problem with Devices

Popularity of mobile devices

Updates are frequent and extensive

11 versions in under 10 years1

Security is asserted by evaluation of mobile technologies

Slow

Costly

Incomplete

Continuously evolving

Attachment:- CS project.rar

Verified Expert

Reference no: EM13981247

Questions Cloud

Prepare a report showing the customer margin on sales : The company just completed a single order from SkateCo for 3,200 entry-level skateboards. The order was produced in 27 batches. Each skateboard required 0.7 direct labour-hours. The selling price was $125 per skateboard, the direct materials cost ..
Basis of the tornado diagram : On the basis of the tornado diagram, advise your friend regarding either (1) whether to invest or (2) what to do next in the analysis.
Find the speed of the water flow : A pipe tapers out from an initial area A1 = 6.6x10-2 m2 to a final area A2 that is nine times as large over a distance d = 0.4 m. Water enters from the left in a steady volumetric flow of 300 liters/second and initial gauge pressure 17 kPa . Find ..
Various possible loss scenarios : Compare the grower's expected values for the three alternatives he has, considering the various possible loss scenarios for the burners and the sprinklers. Which alternative would you suggest the grower take? Why?
Sentinel security product prototype description : Sentinel Security Product Prototype Description - The paper should describe innovative aspects of your product and persuade the stakeholders of the intrinsic value of your product.
Describe three features or tenets of the chosen religion : Choose from one of the following religions: Ancient Egyptian belief, Hinduism, Greek or Roman Polytheism, Native American Religion, Buddhism, Taoism, Judaism, Christianity, or Islam. You must choose a religion that is not your own.
How long were the bat and ball in contact : A pitcher throws a 0.140-kg baseball with a speed of The batter strikes it with an average force of which results in the ball traveling with an initial speed of toward the pitcher. For how long were the bat and ball in contact?
Explore the importance of issues : Describe how he might use sensitivity analysis to explore the importance of these issues.
Describe the major opportunities and challenges : Describe the major opportunities and challenges retailers and wholesalers can expect to encounter in the coming year

Reviews

Write a Review

C/C++ Programming Questions & Answers

  Create program that uses functions and reference parameters

Create program that uses functions and reference parameters, and asks user for the outside temperature.

  Write a program using vectors and iterators

Write a program using vectors and iterators that allows a user to maintain a personal list of DVD titles

  Write the code required to analyse and display the data

Calculate and store the average for each row and column. Determine and store the values for the Average Map.

  Write a webservices application

Write a webservices application that does a simple four function calculator

  Iimplement a client-server of the game

Iimplement a client-server version of the rock-paper-scissors-lizard-Spock game.

  Model-view-controller

Explain Model-View-Controller paradigm

  Design a nested program

How many levels of nesting are there in this design?

  Convert celsius temperatures to fahrenheit temperatures

Write a C++ program that converts Celsius Temperatures to Fahrenheit Temperatures.

  Evaluate and output the value in the given base

Write C program that will input two values from the user that are a Value and a Base with which you will evaluate and output the Value in the given Base.

  Design a base class shape with virtual functions

Design a base class shape with virtual functions

  Implementation of classes

Implementation of classes Chart and BarChart. Class barChart chould display a simple textual representation of the data

  Technical paper: memory management

Technical Paper: Memory Management, The intent of this paper is to provide you with an in depth knowledge of how memory is used in executing, your programs and its critical support for applications.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd