Detail and explain the security aspect in full

Assignment Help Computer Engineering
Reference no: EM132195810

Assignment: Modern aircraft such as the Boeing 787 are full of technology including advanced avionics, a fiber optic data bus for networking, and high tech in-flight entertainment systems (IFE).

This assignment requires you to explore an aviation-related network security topic and report your findings using the PowerPoint presentation tool. To begin, select one of the topics below (in bold font) and review the sample materials to gather background information. Alternatively, you may opt to select a different topic related to aviation network security and will then need to research additional sources.
Example topics and useful sources to get you started. Be sure to research at least one additional reference.

• Wireless network security for customers using in-flight WiFi services
Gogo Business Aviation. (2017). Aircraft router basics: decoding 802.11 capabilities for in-cabin wi-fi. Retrieved from: https://business.gogoair.com/resource-center/gogo-iq/blog-posts/wireless-router-basics-decoding-802-11-capabilities

Kerner, S. (2017, January 3). Gogo inflight wifi boosts security with bug bounty program. eWeek.

LaPlante, A. (2017, January 24). In-flight wifi? Not so safe. Bright Ideas.

• Security of the on-board network used by the avionics, navigation and control systems

Biesecker, C. (2017, November 8). DHS led team demonstrates that commercial aircraft can be remotely hacked. Defense Daily.

Government Accountability Office.(2015, April). FAA needs a more comprehensive approach to address cybersecurity as agency transitions to NextGen.

Leyden, J. (2017, November 15). How can airlines stop hackerspwning planes over the air? And don't say 'regular patches'. The Register.

Create an original presentation using PowerPoint. The following bullets will help you get started.

• Define the issue(s). Provide background information.

• Detail and explain the security aspect in full. What are the risks and what safeguards are in place (or should be)?

• What does the future hold? What changes are needed?

Presentation Requirements:

1. Cover slide

• Presentation title and name of presenter.

• Include an image or interesting background image.

• Introduction typed out within slide notes. This includes a statement of what the presentation is to be about.

2. Four to five content slides

• Use slide design best practices

• Include a minimum of three images. Avoid use of grainy images or those with small text.

• Verbal content that is to be spoken needs to be written out within the slide notes on each slide.

3. Summary slide

• Key points are reinforced - this is similar to a conclusion.

• Avoid use of complete sentences on the slide - use the slide notes for these.

4. References slide

• Should appear similar to how the references are shown above.

• One of the references must be one you researched and be less than a year old.

The verbal content within the slide notes should be no less than 5 minutes (what you would say if you delivered it in person).

Reference no: EM132195810

Questions Cloud

What are the benefits and risks of cloud computing : What are the benefits and risks of cloud computing for a business? Does a company you do business with use cloud computing? How so?
Analyzing cognitive and educational evaluation : In a 500-750-word analysis, advocate for the appropriate educational decisions for this student based on the assessment results
Compute the average for the differences for exam 2 : Compute the average for the differences for Exam 2 -Exam 1 (New method and Old method).
Consumption of water per household : We conclude that the mean consumption of water per household has due to the campaign by the city council.
Detail and explain the security aspect in full : Detail and explain the security aspect in full. What are the risks and what safeguards are in place (or should be)? What does the future hold?
What is the probability that the person : Given that a person tests negative, what is the probability that the person actually is HIV positive?
Social media changed way you consume entertainment : How has social media changed the way you consume entertainment, play games, and learn about news?
Understand the relationship among several variables : How simple regression modeling can be extended to understand the relationship among several variables
What price you would offer to the seller and why : Suppose that you are considering purchasing a previously owned 2007 Camry that has been driven 60,000 miles. What price you would offer to the seller and why?

Reviews

Write a Review

Computer Engineering Questions & Answers

  How various cells can be in a computer''s main memory

How several cells can be in a computer's main memory if each cell's address can be represented by two hexadecimal digits? What if four hexadecimal digits are used? Explain your answer.

  How a bitcoin transaction works

How a Bitcoin Transaction works: What's a Transaction in Bitcoin? UTXOs Unspent Transaction Outputs are the fundamental building block of a transaction output.

  Show the sum of these two numbers as an int

Using C++ to write this simple code. Say "Hello User" to the user when the program is created.

  Evaluate effectiveness of prefer program planning technique

Evaluate effectiveness of your preferred program planning technique, based on its success in real world. Provide one example of a real-life application of your preferred program planning technique to support your response.

  How should manley make the case for soa to ensure

What new internal IT capabilities will have to be developed in order to create an IT department to support AgCredits future business architecture?

  Distinguish the most important users for this product

Distinguish the most important users for this product from those who are less important to satisfy.

  Explain the importance of having a test coupled

Many will argue that it is considered a good practice to acknowledge the limitation of your research/project. Could you defend this argument.

  Question1 in a client or server system client transmits

question1. in a client or server system client transmits request to the server server executes processing operation and

  Find albums by genre released after a given year

Find albums by genre released after a given year. Order results by year (DESC). Display all information about each album.

  Compute the income tax according to this schedule

Write a function name tax_1913 that compute the income tax according to this schedule and show your output for an income of $89,000 and $278,000.

  Write program that prompts user to provide single character

Write a program that prompts the user to provide a single character from the alphabet. Print Vowel or Consonant, depending on the user input.

  What is the content of the register after each shift

The content of a 4-bit register is initially 1101. The register is shifted six times to the right with the serial input being 101101. What is the content of the register after each shift?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd