Sentinel security product prototype description

Assignment Help C/C++ Programming
Reference no: EM13981247 , Length:

Follow lab outline, as you go and use lab sample project that I have attached as a guideline. This project needs to be written just like lab sample project file. About 14-18 pages is required, I have included pictures that can be used in the paper as well.

Lab I - Descriptive/Persuasive Paper

Paper Requirements (Individual Assignment)

The goal of this assignment is to prepare a descriptive paper that communicates the characteristics of your team's CS 410 product to the stakeholders who could be a colleague, a customer, or anyone with interest in the associated societal problem. The paper should describe innovative aspects of your product and persuade the stakeholders of the intrinsic value of your product. This must be supported with reference material identified in CS 410 along with the results of any additional research performed.

The purpose, in your role as a designer of the prototype of the CS 410 project, is to inform the stakeholders of the differences that will exist in the laboratory prototype to be developed this semester. You need to communicate what elements will be modeled/simulated, what elements will be eliminated, and what will be added to facilitate testing.

You should not assume that any reader has knowledge about any of the salient topics of the product other than those that are commonly available in the current media. That media is the Internet, the local news, newspapers, and television and radio broadcasts.

Your paper should have a transparent connection with the descriptive material that was prepared during CS 410 and contains the technical characteristics of the project. Figures and/or tables may be incorporated in the paper, but these elements are not essential. You will be evaluated on your technical writing skills as well as on grammar and style.

Your paper should be double-spaced and submitted via Blackboard. You should use a font size that is no greater than 12 pts. Your paper's margins should be no greater than one inch right and left, top and bottom. APA guidelines must be adhered to. Guidance and course specific interpretations of the guidelines are provided in Blackboard.

The paper must follow APA style, and must include a cover page, table of contents, glossary, and references. Your paper must strictly adhere to the content defined below. The information within the brackets "<" and ">" describe the content to be written within each section. Replace "XXX" with the title of your product.

Following your submission of the paper, make sure to add your professional development reflections on your blog in Blackboard.

1 INTRODUCTION
<Introduce the CS 410 product and the approach to demonstrating its characteristics through prototyping (essentially an abstract). Should be approximately one page in length. Should summarize the societal problem with some reference/date support. Should outline problem and needed solution characteristics. Should introduce your product by name as the solution.>

2 XXX PRODUCT DESCRIPTION
<Top level description of CS 410 product for the average reader - summary of the solution - and its goals and objectives. This section should be one paragraph minimum.>

2.1 Key Product Features and Capabilities
<What does it do? What is significant/unique/innovative about it? What does it accomplish? Describe how this solves the problem.>

2.2 Major Components (Hardware/Software)
<Overview of the hardware needed to support the solution. Describe how it is structured based on CS 410 Major Functional Component Diagram (MFCD). Define and describe the software to be developed.>

3 IDENTIFICATION OF CASE STUDY
<Who is this product being developed for and why? Who else might use this in the future?>

4 XXX PRODUCT PROTOTYPE DESCRIPTION
<Top level description of the CS 411W prototype as it relates to the end product (410) - goal. Are capabilities reduced or eliminated? Simulated - modeled?>
Include a table of comparison between RWP and Prototype either in section 4.>

4.1 Prototype Architecture (Hardware/Software)
<How will the prototype be structured to demonstrate key features of the 410 product. Prototype MFCD provided and described.>

4.2 Prototype Features and Capabilities
<What does the prototype demonstrate - why is that significant in showing how the problem is solved - or why you have demonstrated success? How does the prototype address the 410 project risk mitigation? Describe the functional goals and objectives.>

4.3 Prototype Development Challenges
<Challenges expected while completing the objectives of the prototype - ie knowledge missing, capability missing, supporting technology issues.>

Lab 1 outline

1. Introduction

1. Introducing Sentinel Security
a. Team
b. Purpose/Goal
i. Secure Communication for all professionals/healthcare workers.
ii. Plug-and-play Hardware
1. Lightweight
2. Transportable
3. Fast Connection.

2. Problem Statement
a. Secure communication for mobile
b. Frequent and extensive updates
c. Security evaluation of mobile technologies
i. Slow
ii. Costly
iii. Incomplete
iv. Continuously evolving

3. Solution Statements
a. Using Raspberry Pi
i. Intercepts all data
ii. Encrypts data
iii. Routes to data center.
b. Using Data Center
i. Receives data
ii. Decrypts data
iii. Analyzes for malicious pattern
iv. Forwards to intended recipient

2.0 Sentinel Security Product Description

1. Encrypt and forward traffic
2. Gather traffic data
3. Analyze traffic
4. Predict persistent threats

2.1 Product features and capabilities (end goal)

1. User access management
a. Adding user
2. Removing user
3. Plug and Play
a. Wifi-implemented
4. Android devices
a. download app
5. Traffic
a. Monitoring
b. Analyzing
c. Blocking/Permitting
6. Traffic database
a. IP origin
b. IP destination
7. Recognize persistent threats

2.2 Major Components (Hardware/Software)

1. Hardware (what equipment I as a user and I as a admin need to have)
a. Android Device
b. Raspberry Pi 2
c. Datacenter

2. Software (what software do I need as a developer)
a. MySQL
b. WireShark
c. OpenVPN
d. Sentinel Security Android App

3. Software developments (what software am I writing as a team to create the solution)
a. Wireshark to Database Conversion
b. Traffic Analysis
c. app (UI)
d. reporting mechanism
i. scheduled (maintenance)
ii. non-scheduled (alerts)

3.0 Identification of Case Study

1. Product is developed for MITRE with potential customer industries
a. Medical
b. Financial
c. Legal
d. Defense
e. Governmental

2. Prototype is developed as a test-bed

3. Simulation
a. Proof of concept
i. 4 files
1. permitted or denied IP
2. Push or pull request
b. Traffic stress
i. 100 files
1. permitted and denied IP
2. Push and pull request
c. Risk mitigation
i. only valid users send and receive
d. Plug and Play
i. Connect hardware for recognition
ii. Disconnect and reconnect recognition
e. Add and remove employees

4.0 Sentinel Security Product Prototype Description

1. Sentinel Security App
a. Downloadable
b. Simple to use
c. One-click authentication

2. Raspberry Pi
a. No interface
b. Connects phone to datacenter

3. Datacenter
a. Gather traffic data
b. Data flow
i. Permit
ii. Deny

4.1 Prototype Architecture (Hardware/Software)

1. Hardware
a. Android Device
b. Raspberry Pi 2
c. Virtual Machine provided by ODU CS dept

2. Software to be used
a. MySQL
b. WireShark
c. OpenVPN
d. Sentinel Security Android App

3. Prototype software to be developed
a. Algorithms
i. Manage traffic data
ii. Store traffic data
b. Testing suit
i. Collection of tests
ii. Simulation tests in 3.0.3
c. Report generation

4.2 Prototype Features and Capabilities

1. File access
a. Grant or deny
2. Gather traffic data
3. Encrypts data before transmission
4. Decrypts data upon arrival
5. Android app activates connection

4.3Prototype Development Challenges

1. Limitations of hardware
2. Lack of skills
3. Connecting product chain
4. Proving ease of use

5.0 Glossary

1. Sentinel Security - encryption and communication evaluation for mobile devices

2. Plug-and-Play Hardware - denoting or relating to a devices that are intended to work perfectly when first used or connected, without reconfiguration or adjustment by the user.

3. Raspberry Pi - is a low-cost, basic computer that runs entirely on open-source software.

4. Datacenter - a large group of networked computer servers typically used for the remote storage, processing, or distribution of large amounts of data.

5. Encryption - the conversion of electronic data into another form, called ciphertext.

6. Decryption - the conversion of encrypted data back to it's original form.

6.0 References

Sentinel Security

Encryption and Communication Evaluation for Mobile DevicesProblem Statement

Migration to the use of evolving mobile technologies for secure communication in highly regulated industries is arduous.

Problem with Devices

Popularity of mobile devices

Updates are frequent and extensive

11 versions in under 10 years1

Security is asserted by evaluation of mobile technologies

Slow

Costly

Incomplete

Continuously evolving

Attachment:- CS project.rar

Verified Expert

Reference no: EM13981247

Questions Cloud

Prepare a report showing the customer margin on sales : The company just completed a single order from SkateCo for 3,200 entry-level skateboards. The order was produced in 27 batches. Each skateboard required 0.7 direct labour-hours. The selling price was $125 per skateboard, the direct materials cost ..
Basis of the tornado diagram : On the basis of the tornado diagram, advise your friend regarding either (1) whether to invest or (2) what to do next in the analysis.
Find the speed of the water flow : A pipe tapers out from an initial area A1 = 6.6x10-2 m2 to a final area A2 that is nine times as large over a distance d = 0.4 m. Water enters from the left in a steady volumetric flow of 300 liters/second and initial gauge pressure 17 kPa . Find ..
Various possible loss scenarios : Compare the grower's expected values for the three alternatives he has, considering the various possible loss scenarios for the burners and the sprinklers. Which alternative would you suggest the grower take? Why?
Sentinel security product prototype description : Sentinel Security Product Prototype Description - The paper should describe innovative aspects of your product and persuade the stakeholders of the intrinsic value of your product.
Describe three features or tenets of the chosen religion : Choose from one of the following religions: Ancient Egyptian belief, Hinduism, Greek or Roman Polytheism, Native American Religion, Buddhism, Taoism, Judaism, Christianity, or Islam. You must choose a religion that is not your own.
How long were the bat and ball in contact : A pitcher throws a 0.140-kg baseball with a speed of The batter strikes it with an average force of which results in the ball traveling with an initial speed of toward the pitcher. For how long were the bat and ball in contact?
Explore the importance of issues : Describe how he might use sensitivity analysis to explore the importance of these issues.
Describe the major opportunities and challenges : Describe the major opportunities and challenges retailers and wholesalers can expect to encounter in the coming year

Reviews

Write a Review

C/C++ Programming Questions & Answers

  Write program that takes number show number in power of 3

Write a program that takes a number between -121 and 121 and output that number in the format of power of 3 (1,3,9,27)

  Implement a rotate function

Write and test the following function: void rotate(int a[], int n, int k); The function "rotates" the first n elements of the array a, k positions to the right.

  Declare and initialize an appropriate variable

Show the source code for a C# console application names ‘Sibs' that prints your frist name on the first line, your last name on the second line, and the number of siblings you have on the third line Declare and initialize an appropriate variable fo..

  Write a function to compute the volume of a cone

write a function to compute the volume of a cone by using the base radius r and the height h of the cone as the parameters of the function Vcone = xr^2h/3

  What program design tools are available

What program design tools are available? Discuss in details by studying at least three program design tools and how they can help in better program design and C code?

  Pointer variables to demonstrate shallow and deep copy

Using C++, write a program that uses pointer variables to demonstrate shallow and deep copy. The program should give the user the choice to do the following:

  The george zimmerman case has gained national attention

The George Zimmerman case has gained national attention, focusing on the Florida Statute, "Stand your Ground" law. Included in the Power point is the specific stand your ground law existing in Florida. review the statute and the news story, an..

  Develop data structures - chord system

Develop data structures which are suitable to hold required information for each peer in a CHORD system. Note that index nodes can hold local information only

  Creates a macro to calculate the area

Build a program that creates a macro to calculate the area of a circle using the formula area = pie x radius x radius. In the same program, prompt the user to enter a circle's radius. Use the macro to calculate the circle's area and display the re..

  Draw a network diagram for the tasks

Assume you have a project with seven activities Labeled A-G, as shown below. Derive the earliest completion time (or early finish time - EF), the latest completion time (or late finish - LF) and slack for each of the following tasks (begin at time..

  Write a program to perform statistics calculation

The results should add the sums, the lengths and determine which of the two are the largest and the smallest of the new statisticians form the two inputs. ex statistician3 largest is the

  Write a program that allows users to enter a dollar amount

Write a program that allows users to enter a dollar amount for their bank account balance at the beginning of the month. Then ask the user to enter a dollar amount for any number of checks written in a month, up to 50. Include an approriate sentinel ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd