Detail and explain the security aspect in full

Assignment Help Computer Engineering
Reference no: EM132195810

Assignment: Modern aircraft such as the Boeing 787 are full of technology including advanced avionics, a fiber optic data bus for networking, and high tech in-flight entertainment systems (IFE).

This assignment requires you to explore an aviation-related network security topic and report your findings using the PowerPoint presentation tool. To begin, select one of the topics below (in bold font) and review the sample materials to gather background information. Alternatively, you may opt to select a different topic related to aviation network security and will then need to research additional sources.
Example topics and useful sources to get you started. Be sure to research at least one additional reference.

• Wireless network security for customers using in-flight WiFi services
Gogo Business Aviation. (2017). Aircraft router basics: decoding 802.11 capabilities for in-cabin wi-fi. Retrieved from: https://business.gogoair.com/resource-center/gogo-iq/blog-posts/wireless-router-basics-decoding-802-11-capabilities

Kerner, S. (2017, January 3). Gogo inflight wifi boosts security with bug bounty program. eWeek.

LaPlante, A. (2017, January 24). In-flight wifi? Not so safe. Bright Ideas.

• Security of the on-board network used by the avionics, navigation and control systems

Biesecker, C. (2017, November 8). DHS led team demonstrates that commercial aircraft can be remotely hacked. Defense Daily.

Government Accountability Office.(2015, April). FAA needs a more comprehensive approach to address cybersecurity as agency transitions to NextGen.

Leyden, J. (2017, November 15). How can airlines stop hackerspwning planes over the air? And don't say 'regular patches'. The Register.

Create an original presentation using PowerPoint. The following bullets will help you get started.

• Define the issue(s). Provide background information.

• Detail and explain the security aspect in full. What are the risks and what safeguards are in place (or should be)?

• What does the future hold? What changes are needed?

Presentation Requirements:

1. Cover slide

• Presentation title and name of presenter.

• Include an image or interesting background image.

• Introduction typed out within slide notes. This includes a statement of what the presentation is to be about.

2. Four to five content slides

• Use slide design best practices

• Include a minimum of three images. Avoid use of grainy images or those with small text.

• Verbal content that is to be spoken needs to be written out within the slide notes on each slide.

3. Summary slide

• Key points are reinforced - this is similar to a conclusion.

• Avoid use of complete sentences on the slide - use the slide notes for these.

4. References slide

• Should appear similar to how the references are shown above.

• One of the references must be one you researched and be less than a year old.

The verbal content within the slide notes should be no less than 5 minutes (what you would say if you delivered it in person).

Reference no: EM132195810

Questions Cloud

What are the benefits and risks of cloud computing : What are the benefits and risks of cloud computing for a business? Does a company you do business with use cloud computing? How so?
Analyzing cognitive and educational evaluation : In a 500-750-word analysis, advocate for the appropriate educational decisions for this student based on the assessment results
Compute the average for the differences for exam 2 : Compute the average for the differences for Exam 2 -Exam 1 (New method and Old method).
Consumption of water per household : We conclude that the mean consumption of water per household has due to the campaign by the city council.
Detail and explain the security aspect in full : Detail and explain the security aspect in full. What are the risks and what safeguards are in place (or should be)? What does the future hold?
What is the probability that the person : Given that a person tests negative, what is the probability that the person actually is HIV positive?
Social media changed way you consume entertainment : How has social media changed the way you consume entertainment, play games, and learn about news?
Understand the relationship among several variables : How simple regression modeling can be extended to understand the relationship among several variables
What price you would offer to the seller and why : Suppose that you are considering purchasing a previously owned 2007 Camry that has been driven 60,000 miles. What price you would offer to the seller and why?

Reviews

Write a Review

 

Computer Engineering Questions & Answers

  How to do a search using google search engine

Exclude a search term by adding a hyphen before the word, especially useful when searching a word with several meanings.

  Question1 in a client or server system client transmits

question1. in a client or server system client transmits request to the server server executes processing operation and

  Write down an algorithm which using pseudo code

Write down an algorithm, using pseudo code, to perform one of the following tasks,* Given a string of numbers, identify all of the substrings that form numbers that are divisible by 3.

  Define an element with a name of measurement

Define an element with a name of "measurement". Within "measurement", define a complex type. Within this complex type, define a choice with minOccurs and maxOccurs both equal to "1".

  Implement compression and expansion procedures

Implement compression and expansion procedures for the run-length encoding method for a fixed alphabet described in the text, using Q as the escape character.

  Determine how many hours of video that a prototype

You're tasked to determine how many hours of video that a prototype SAMSUNG can stone on it's 16 GB flash memory

  Discuss what are the economic systems

What are the economic systems in and who are the trading partners of the countries you chose?

  What do you mean by search engine optimization and how is

what is search engine optimization and how is it achieved? your response should be at least 200 words in

  Identify two to three of the more common connections

Identify two to three of the more common connections and summarize their associated data rates, typical uses, and approximate costs.

  Analyzed and described whether the organization should

information technology evolves rapidly and businesses must stay abreast of that evolution in order to remain

  Create research proposal to present to a fictitious company

Take a chapter from the course textbook, IT Strategy Issues and Practice, to focus on for your Assignment. You will create a research proposal to present.

  Make a table in microsoft word

build a table in Microsoft Word or Excel that lists the strengths and challenges of each of the following four system development life cycles presented in the text.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd