Detail and explain the security aspect in full

Assignment Help Computer Engineering
Reference no: EM132195810

Assignment: Modern aircraft such as the Boeing 787 are full of technology including advanced avionics, a fiber optic data bus for networking, and high tech in-flight entertainment systems (IFE).

This assignment requires you to explore an aviation-related network security topic and report your findings using the PowerPoint presentation tool. To begin, select one of the topics below (in bold font) and review the sample materials to gather background information. Alternatively, you may opt to select a different topic related to aviation network security and will then need to research additional sources.
Example topics and useful sources to get you started. Be sure to research at least one additional reference.

• Wireless network security for customers using in-flight WiFi services
Gogo Business Aviation. (2017). Aircraft router basics: decoding 802.11 capabilities for in-cabin wi-fi. Retrieved from: https://business.gogoair.com/resource-center/gogo-iq/blog-posts/wireless-router-basics-decoding-802-11-capabilities

Kerner, S. (2017, January 3). Gogo inflight wifi boosts security with bug bounty program. eWeek.

LaPlante, A. (2017, January 24). In-flight wifi? Not so safe. Bright Ideas.

• Security of the on-board network used by the avionics, navigation and control systems

Biesecker, C. (2017, November 8). DHS led team demonstrates that commercial aircraft can be remotely hacked. Defense Daily.

Government Accountability Office.(2015, April). FAA needs a more comprehensive approach to address cybersecurity as agency transitions to NextGen.

Leyden, J. (2017, November 15). How can airlines stop hackerspwning planes over the air? And don't say 'regular patches'. The Register.

Create an original presentation using PowerPoint. The following bullets will help you get started.

• Define the issue(s). Provide background information.

• Detail and explain the security aspect in full. What are the risks and what safeguards are in place (or should be)?

• What does the future hold? What changes are needed?

Presentation Requirements:

1. Cover slide

• Presentation title and name of presenter.

• Include an image or interesting background image.

• Introduction typed out within slide notes. This includes a statement of what the presentation is to be about.

2. Four to five content slides

• Use slide design best practices

• Include a minimum of three images. Avoid use of grainy images or those with small text.

• Verbal content that is to be spoken needs to be written out within the slide notes on each slide.

3. Summary slide

• Key points are reinforced - this is similar to a conclusion.

• Avoid use of complete sentences on the slide - use the slide notes for these.

4. References slide

• Should appear similar to how the references are shown above.

• One of the references must be one you researched and be less than a year old.

The verbal content within the slide notes should be no less than 5 minutes (what you would say if you delivered it in person).

Reference no: EM132195810

Questions Cloud

What are the benefits and risks of cloud computing : What are the benefits and risks of cloud computing for a business? Does a company you do business with use cloud computing? How so?
Analyzing cognitive and educational evaluation : In a 500-750-word analysis, advocate for the appropriate educational decisions for this student based on the assessment results
Compute the average for the differences for exam 2 : Compute the average for the differences for Exam 2 -Exam 1 (New method and Old method).
Consumption of water per household : We conclude that the mean consumption of water per household has due to the campaign by the city council.
Detail and explain the security aspect in full : Detail and explain the security aspect in full. What are the risks and what safeguards are in place (or should be)? What does the future hold?
What is the probability that the person : Given that a person tests negative, what is the probability that the person actually is HIV positive?
Social media changed way you consume entertainment : How has social media changed the way you consume entertainment, play games, and learn about news?
Understand the relationship among several variables : How simple regression modeling can be extended to understand the relationship among several variables
What price you would offer to the seller and why : Suppose that you are considering purchasing a previously owned 2007 Camry that has been driven 60,000 miles. What price you would offer to the seller and why?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd