Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Assignment

This assignment requires you to use presentation tools and allows you to be creative. The presentation subject is to be network security on the Boeing 787 Dreamliner. To begin, get familiar with the topic by reading over the articles. Then create an original presentation using PowerPoint to address the questions below.

The Boeing 787 is a fantastic aircraft with versions capable of seating up to 300 passengers with a range of up to 8,200 nautical miles. This aircraft is full of technology including a composite material skin, a fiber optic data bus for networking, and a high tech in-flight entertainment system (IFE). During the certification process the FAA issued a special condition that required Boeing to prove the aircraft's common network was secure against hacker intrusion. Some industry analysts have pointed out that the only reason for this special condition is because the technology used on the aircraft are beyond definitions and concepts contained within current certification rules.

Useful sources (feel free to research others):

Bellamy III, W. (2015, June 25). Network security program proposed to improve aircraft cyber security. Avionics Today. Retrieved from http://www.aviationtoday.com/av/commercial/Network-Security-Program-Proposed-to-Improve-Aircraft-Cyber-Security_85398.html#.VoaqYflsNhE (Links to an external site.)

Government Accountability Office. (2015, April). FAA needs a more comprehensive approach to address cybersecurity as agency transitions to NextGen. Retrieved from http://www.gao.gov/assets/670/669627.pdf (Links to an external site.)

McHale, J. (2005). AFDX technology to improve communications on Boeing 787. Military Aerospace. Retrieved from

http://www.militaryaerospace.com/articles/print/volume-16/issue-4/news/afdx-technology-to-improve-communications-on-boeing-787.html (Links to an external site.)

Schneier, B. (2015, April). Could you plane be hacked? CNN. Retrieved from http://edition.cnn.com/2015/04/16/opinions/schneier-hacking-airplanes/ (Links to an external site.) or https://www.schneier.com/blog/archives/2015/04/hacking_airplan.html (Links to an external site.)

TTTech. (n.d.). Advanced control systems for Boeing 787 Dreamliner: Hamilton Sundstrand's TTP-based communication platform. Retrieved from http://www.tttech.com/markets/aerospace/projects-references/boeing-787/ (Links to an external site.)

Zetter, K. (2015). Hackers could commandeer new placed through passenger Wi-Fi. Wired. Retrieved from http://www.wired.com/2015/04/hackers-commandeer-new-planes-passenger-wi-fi/ (Links to an external site.)

Questions the presentation must address:

• What benefits are derived from the using a common network for all onboard systems? That is, what motivated adoption of the common core fiber optic network?

• Detail and explain the security aspect in full. When doing so address both sides of the story: the concern about hackers and the counterargument(s) which state the aircraft is secure.

Presentation Requirements:

• Follow slide design best practices:

o Top Ten Slide Tips (Links to an external site.), GarrRenolds.com Website
o PowerPoint Training Videos (Links to an external site.)

• Cover slide, 4-5 content slides, summary, and sources slide
• Minimum of four images
• Verbal content of presentation should be no less than 5 minutes (what you would say if you delivered it in person) and entered into the slide notes.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92076754
  • Price:- $65

Priced at Now at $65, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Security risk assessment executive summarya detailed

SECURITY RISK ASSESSMENT Executive Summary A detailed Information security risk assessment was carried out on Fiji Directories Limited (FDL) during October 15th 2018 to October 24th 2018. FDL, an ATH group company, is a ...

Nbspfor the remaining questions consider a 4-bit block

For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 2 f 1 You c ...

Cybersecurity policy design issues describe cybersecurity

Cybersecurity Policy Design Issues Describe cybersecurity policy features that are needed to protect against the Insider Threat, Operations Security, Access Control and Biometric Authentication What features can be added ...

How would you explain the concept of a quality adjusted

How would you explain the concept of a quality adjusted life year? When is it appropriate to use "QALYs" instead of simply improved life expectancy as the outcome measure in an economic evaluation?

Suppose that third national bank has reserves of 20000 and

Suppose that Third National Bank has reserves of $20,000 and check able deposits of $200,000. The reserve ratio is 10 percent. The bank sells $20,000 in securities to the Federal Reserve Bank in its district, receiving a ...

Question explain the meaning of computer networkingexplain

Question: Explain the meaning of computer networking. Explain the meaning of Information and give at least three examples of it. The response must be typed, single spaced, must be in times new roman font (size 12) and mu ...

Assignment descriptionproject scope a typical

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: What is the network mask used by the router? (in dotted decim ...

You need to prepare packet tracer fileattached pdf contains

You need to prepare packet tracer file attached pdf contains topology and required configurations and assigned ip address. In packet tacer file you need to include banner, router and switches. 1. VLSM Design a) As first ...

What comparison of means test was used to answer the

What comparison of means test was used to answer the question I need it now is there a relationship between parents highest level of education and socioeconomic status\need the entire script

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As