Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask C/C++ Expert


Home >> C/C++

Follow lab outline, as you go and use lab sample project that I have attached as a guideline. This project needs to be written just like lab sample project file. About 14-18 pages is required, I have included pictures that can be used in the paper as well.

Lab I - Descriptive/Persuasive Paper

Paper Requirements (Individual Assignment)

The goal of this assignment is to prepare a descriptive paper that communicates the characteristics of your team's CS 410 product to the stakeholders who could be a colleague, a customer, or anyone with interest in the associated societal problem. The paper should describe innovative aspects of your product and persuade the stakeholders of the intrinsic value of your product. This must be supported with reference material identified in CS 410 along with the results of any additional research performed.

The purpose, in your role as a designer of the prototype of the CS 410 project, is to inform the stakeholders of the differences that will exist in the laboratory prototype to be developed this semester. You need to communicate what elements will be modeled/simulated, what elements will be eliminated, and what will be added to facilitate testing.

You should not assume that any reader has knowledge about any of the salient topics of the product other than those that are commonly available in the current media. That media is the Internet, the local news, newspapers, and television and radio broadcasts.

Your paper should have a transparent connection with the descriptive material that was prepared during CS 410 and contains the technical characteristics of the project. Figures and/or tables may be incorporated in the paper, but these elements are not essential. You will be evaluated on your technical writing skills as well as on grammar and style.

Your paper should be double-spaced and submitted via Blackboard. You should use a font size that is no greater than 12 pts. Your paper's margins should be no greater than one inch right and left, top and bottom. APA guidelines must be adhered to. Guidance and course specific interpretations of the guidelines are provided in Blackboard.

The paper must follow APA style, and must include a cover page, table of contents, glossary, and references. Your paper must strictly adhere to the content defined below. The information within the brackets "<" and ">" describe the content to be written within each section. Replace "XXX" with the title of your product.

Following your submission of the paper, make sure to add your professional development reflections on your blog in Blackboard.

1 INTRODUCTION

2 XXX PRODUCT DESCRIPTION

2.1 Key Product Features and Capabilities

2.2 Major Components (Hardware/Software)

3 IDENTIFICATION OF CASE STUDY

4 XXX PRODUCT PROTOTYPE DESCRIPTION

Include a table of comparison between RWP and Prototype either in section 4.>

4.1 Prototype Architecture (Hardware/Software)

4.2 Prototype Features and Capabilities

4.3 Prototype Development Challenges

Lab 1 outline

1. Introduction

1. Introducing Sentinel Security
a. Team
b. Purpose/Goal
i. Secure Communication for all professionals/healthcare workers.
ii. Plug-and-play Hardware
1. Lightweight
2. Transportable
3. Fast Connection.

2. Problem Statement
a. Secure communication for mobile
b. Frequent and extensive updates
c. Security evaluation of mobile technologies
i. Slow
ii. Costly
iii. Incomplete
iv. Continuously evolving

3. Solution Statements
a. Using Raspberry Pi
i. Intercepts all data
ii. Encrypts data
iii. Routes to data center.
b. Using Data Center
i. Receives data
ii. Decrypts data
iii. Analyzes for malicious pattern
iv. Forwards to intended recipient

2.0 Sentinel Security Product Description

1. Encrypt and forward traffic
2. Gather traffic data
3. Analyze traffic
4. Predict persistent threats

2.1 Product features and capabilities (end goal)

1. User access management
a. Adding user
2. Removing user
3. Plug and Play
a. Wifi-implemented
4. Android devices
a. download app
5. Traffic
a. Monitoring
b. Analyzing
c. Blocking/Permitting
6. Traffic database
a. IP origin
b. IP destination
7. Recognize persistent threats

2.2 Major Components (Hardware/Software)

1. Hardware (what equipment I as a user and I as a admin need to have)
a. Android Device
b. Raspberry Pi 2
c. Datacenter

2. Software (what software do I need as a developer)
a. MySQL
b. WireShark
c. OpenVPN
d. Sentinel Security Android App

3. Software developments (what software am I writing as a team to create the solution)
a. Wireshark to Database Conversion
b. Traffic Analysis
c. app (UI)
d. reporting mechanism
i. scheduled (maintenance)
ii. non-scheduled (alerts)

3.0 Identification of Case Study

1. Product is developed for MITRE with potential customer industries
a. Medical
b. Financial
c. Legal
d. Defense
e. Governmental

2. Prototype is developed as a test-bed

3. Simulation
a. Proof of concept
i. 4 files
1. permitted or denied IP
2. Push or pull request
b. Traffic stress
i. 100 files
1. permitted and denied IP
2. Push and pull request
c. Risk mitigation
i. only valid users send and receive
d. Plug and Play
i. Connect hardware for recognition
ii. Disconnect and reconnect recognition
e. Add and remove employees

4.0 Sentinel Security Product Prototype Description

1. Sentinel Security App
a. Downloadable
b. Simple to use
c. One-click authentication

2. Raspberry Pi
a. No interface
b. Connects phone to datacenter

3. Datacenter
a. Gather traffic data
b. Data flow
i. Permit
ii. Deny

4.1 Prototype Architecture (Hardware/Software)

1. Hardware
a. Android Device
b. Raspberry Pi 2
c. Virtual Machine provided by ODU CS dept

2. Software to be used
a. MySQL
b. WireShark
c. OpenVPN
d. Sentinel Security Android App

3. Prototype software to be developed
a. Algorithms
i. Manage traffic data
ii. Store traffic data
b. Testing suit
i. Collection of tests
ii. Simulation tests in 3.0.3
c. Report generation

4.2 Prototype Features and Capabilities

1. File access
a. Grant or deny
2. Gather traffic data
3. Encrypts data before transmission
4. Decrypts data upon arrival
5. Android app activates connection

4.3Prototype Development Challenges

1. Limitations of hardware
2. Lack of skills
3. Connecting product chain
4. Proving ease of use

5.0 Glossary

1. Sentinel Security - encryption and communication evaluation for mobile devices

2. Plug-and-Play Hardware - denoting or relating to a devices that are intended to work perfectly when first used or connected, without reconfiguration or adjustment by the user.

3. Raspberry Pi - is a low-cost, basic computer that runs entirely on open-source software.

4. Datacenter - a large group of networked computer servers typically used for the remote storage, processing, or distribution of large amounts of data.

5. Encryption - the conversion of electronic data into another form, called ciphertext.

6. Decryption - the conversion of encrypted data back to it's original form.

6.0 References

Sentinel Security

Encryption and Communication Evaluation for Mobile DevicesProblem Statement

Migration to the use of evolving mobile technologies for secure communication in highly regulated industries is arduous.

Problem with Devices

Popularity of mobile devices

Updates are frequent and extensive

11 versions in under 10 years1

Security is asserted by evaluation of mobile technologies

Slow

Costly

Incomplete

Continuously evolving

Attachment:- CS project.rar

C/C++, Programming

  • Category:- C/C++
  • Reference No.:- M91675014
  • Price:- $150

Priced at Now at $150, Verified Solution

Have any Question?


Related Questions in C/C++

1 implement the binary search tree bst in c using the node

1. Implement the Binary Search Tree (BST) in C++, using the Node class template provided below. Please read the provided helper methods in class BST, especially for deleteValue(), make sure you get a fully understanding ...

Assignment word matchingwhats a six-letter word that has an

Assignment: Word Matching What's a six-letter word that has an e as its first, third, and fifth letter? Can you find an anagram of pine grave. Or how about a word that starts and ends with ant (other than ant itself, of ...

There are several ways to calculate the pulse width of a

There are several ways to calculate the pulse width of a digital input signal. One method is to directly read the input pin and another method (more efficient) is to use a timer and pin change interrupt. Function startTi ...

Assign ment - genetic algorithmin this assignment you will

ASSIGN MENT - GENETIC ALGORITHM In this assignment, you will use your C programming skills to build a simple Genetic Algorithm. DESCRIPTION OF THE PROGRAM - CORE REQUIREMENTS - REQ1: Command-line arguments The user of yo ...

Project - space race part a console Project - Space Race Part A: Console Implementation

Project - Space Race Part A: Console Implementation INTRODUCTION This assignment aims to give you a real problem-solving experience, similar to what you might encounter in the workplace. You have been hired to complete a ...

What are the legal requirements with which websites must

What are the legal requirements with which websites must comply in order to meet the needs of persons with disabilities? Why is maximizing accessibility important to everyone?

Why do researcher drop the ewaste and where does it end

Why do researcher drop the ewaste and where does it end up?

Software development fundamentals assignment 1 -details amp

Software Development Fundamentals Assignment 1 - Details & Problems - In this assignment, you are required to answer the short questions, identify error in the code, give output of the code and develop three C# Console P ...

Question 1find the minimum and maximum of a list of numbers

Question: 1. Find the Minimum and Maximum of a List of Numbers: 10 points File: find_min_max.cpp Write a program that reads some number of integers from the user and finds the minimum and maximum numbers in this list. Th ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As