Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Assignment: Take Home Portion

Directions:

This part, i.e. the Problems section is ‘open internet' meaning that you can use any online source, physical book, slides from class, or personal notes on the take home portion. Doing so will result in a significant grade penalty (an F for the course). I will be employing a number of cheat detection mechanisms to ensure compliance.

You must submit all of your answers as typed text in-line in this test document. Graphs may be hand-drawn and scanned in or created digitally.

Problems

1. you are a security analyst that is consulting with an industrial factory called Fictional Terrible Company (FTC) that makes a special type of chemical called "Destructoviralbacteriumuraniumpostapocalypseicus" (DVBUP for short). FTC is regulated by the Environmental Protection Agency (EPA) and has to pay for each violation they have:

The EPA provides the following information about penalties:

Laws and regulations

Fine for each violation (per day per incident)

Hazardous Waste Disposal

$71,264

Clean Air Act

$95,284

Clean Water Act

$52,414

Safe Drinking Water Act

$54,789

FTC provides the following information about their industrial plant
Below is the table of the past problems we have had.

Problem

Incidents

Avg. Number of Days to mitigate

Sabotage Pipe breakages that have led to DVBUP release

16 times in the past 8 years

2

Insecure SCADA system that has led to DVBUP release

2 times in the past 8 years

15

FTC also states the following:

• 8 of thepipe breakages caused a Clean Air Act violation, 4 caused a Clean Water Act violation, and 4 lead to violations of both the Clean Air and Clean Water acts

• 1 of the times, when hackers breached our SCADA systems, they released materials into the air, the other led to a release that went into the water, but also got into the drinking water table causing us to pay penalties for the both the clean water act and the safe drinking water act

• We've not had any Hazardous Waste Disposal issues

a) State the two security problems as threats quantitatively using Expected Threat Impact (ETI) and Annual Threat Loss Expectancy (ATLE). Show all of the work.

b) Given your calculations in a) you confer with Bill Mahoney of the UNO Cybersecurity department to come up with a secure SCADA architecture. Bill says that, for $600,000 he can assemble a team of students at UNO that can mitigate the problem. Based on a look at the national numbers, you figure the solution will reduce the number of exploitations to once in 10 years - but wont change how long it takes to mitigate. You also confer with a physical security company to look into new fencing that will reduce the sabotage incident frequency by90% (i.e. to once every 5 years). The fencing will cost $500,000. Draw a single decision tree that showsALL of the different options available. Use the information above to estimate the probabilities and costs at each step.

c) Assuming a risk neutral approach, is it cheaper to mitigate one SCADA, sabotage, both problems, or to do nothing in a 1 year time interval? What about a 5 year time interval? Use the decision tree to justify your answer

2. You are given the following policy from the NIST SP 800-53.

IA-3: DEVICE IDENTIFICATION AND AUTHENTICATION

The information system uniquely identifies and authenticates [Assignment: organization-defined specific and/or types of devices] before establishing a [Selection (one or more): local; remote; network] connection.

Assume the organization in question - FTC from question 1, has instantiated the policy using the following selections as follows.

The information system uniquely identifies and authenticates mobile phones and IoT devices before establishing a network connection.

a) Write a first order logic statement that represents the control for FTC.

b) Identify a non-compliant state (i.e. scenario that is not acceptable by the policy) using first order logic.

c) Given your answers, draw a Venn diagram that visibly shows the "secure states" and "insecure states" for the information system. Assume a closed-world assumption is in place (i.e. only your logic statement defines what is secure and insecure.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92573888

Have any Question?


Related Questions in Computer Engineering

A for which hypervisors does kali linux offer custom

a. For which hypervisors does Kali Linux offer custom images? What tools must be added to a VirtualBox Kali Linux VM to provide proper integration with the host machine? b. What hypervisor comes already installed in Kali ...

To determine in a born-haber cycle how exothermic the

To determine, in a Born-Haber cycle, how exothermic the formation of KCl from potassium metal and chlorine gas is, we need to know the heat of atomization (vaporization) of potassium, the heat of atomization of chlorine ...

Suppose you have two sorted arrays of n integers x01n and

Suppose you have two sorted arrays of n integers: X0[1..n] and X1[1..n]. Devise and analyze an efficient algorithm for finding the median of all numbers in arrays X0 and X1. Now, suppose you have not two, but three such ...

Joe works at a grocery store he found that weights of

Joe works at a grocery store. He found that weights of potatoes in sacks are normally distributed with mean = 150 grams and standard deviation of 2 grams. When he randomly chooses four potatoes and measures the weight, w ...

Suppose that we need to send four packets a b c d from a

Suppose that we need to send four packets (A, B, C, D) from a sender to a receiver. Consider two cases. 1) packet B is lost. 2) acknowledgement for packet B is lost. When there is a packet loss, always assume that only t ...

Qestion what is your understanding of the term computer

Question: What is your understanding of the term "computer"? Why do we call it computer? Is that what it does? The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the APA ...

Sunland industries has a three-year bond outstanding that

Sunland Industries has a three-year bond outstanding that pays a 7.80 percent coupon rate and is currently priced at $938.80. What is the yield to maturity of this bond? Assume annual coupon payments.  (Round answer to 2 ...

One of the 5 halogens which are diatomic has the fastest

One of the 5 halogens (which are diatomic) has the fastest root mean square velocity at STP. Calculate this velocity in meters per second.

Sunshine health corporation has investment interests in

Sunshine Health Corporation has investment interests in Australia, Japan, Germany, and Brazil among other nations. Discuss concerns regarding adapting telecommunication needs to those of different nations. What are some ...

Reduce setup timehammond inc has analyzed the setup time on

Reduce Setup Time Hammond Inc. has analyzed the setup time on its computer-controlled lathe. The setup requires changing the type of fixture that holds a part. The average setup time has been 135 minutes, consisting of t ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As