ENGR9742 Assignment 2: Case Study Plan, Semester 2, 2017
VerifiedAdded on 2020/04/01
|4
|1282
|137
Report
AI Summary
This assignment, ENGR9742 Assignment 2, presents a case study plan centered on cyber security within network systems. The student has provided an annotated bibliography, analyzing three peer-reviewed articles. The first article discusses cyber security in networked control systems, focusing on false data injection attacks. The second article explores cyber security challenges for wireless networked aircraft, while the third article proposes a framework for constructing a knowledge base for cyber security. The assignment also includes an abstract summarizing the key concepts of cyber security, emphasizing the vulnerabilities of wireless networks and the importance of protecting routing protocols. The student uses the Harvard referencing method to cite the sources. The assignment covers critical aspects of network security and information security.

ENGR9742 Assessment: Case Study Plan Put your name and student number here
ENGR9742 Assignment 2 – Case Study Plan
Semester 2, 2017
Case Study Topic:
Name:
Student Number:
Tutorial Group:
Word Count (not including coversheet or references):
1
ENGR9742 Assignment 2 – Case Study Plan
Semester 2, 2017
Case Study Topic:
Name:
Student Number:
Tutorial Group:
Word Count (not including coversheet or references):
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

ENGR9742 Assessment: Case Study Plan Put your name and student number here
Assignment 1: Part A (Annotated Bibliography) – (3x200
words - 600 words total)
For each article, briefly answer the following questions:
What is the argument of this author(s) regarding the topic?
What evidence does the author(s) provide to support their argument?
Is the evidence used to support the argument conclusive and/or
convincing?
How does the argument of this author compare to the other articles
discussed?
Your answers to the questions should be concise and draw upon examples or
quotes from the article where appropriate. These can be used to illustrate your
assessment of the article. Your complete discussion of each article should be
presented as a paragraph rather than sentences or dot points, and should be
approximately 200 words each.
Reference 1: Rebaï, S.B., Voos, H. and Darouach, M., 2017, May. A
contribution to cyber-security of networked control systems: An event-
based control approach. In Event-Based Control, Communication and
Signal Processing (EBCCSP), 2017 3rd International Conference on (pp. 1-
7). IEEE.
The main point of view that the author wants to relate through the article is the
concept of cyber security which is based on network control systems. The paper mainly
deals with the typical architecture for a system of networked control under the motive of
false data attacks of injection. These formulates the capture trade off which is mainly
focused upon attack impact on the factors of control; performance, detectability of attack
and resources which are adversarial. The formulation is than mainly discussed and related
to the overall system of theoretic concept. The concept is formulized by following a
number of examples which mainly illustrates the various tradeoff for a quadruple tank
process.
The first move is the development of the conceptual framework which is mainly
for the networked control of the system with the malicious adversaries which is
introduced. The main emphasis of the model is the adversary aim at the concept of
disrupting the system behavior while the concept of being undetected by an anomaly
detector. The main problem which is related to the distributed reconfiguration under
actuator faults and sensors. In particular, the main focus is on the control system with the
implementation of actuator cooperating and sensors which are reductant which mainly
cooperating in order to recover the concept of removal of nodes which are individual.
2
Assignment 1: Part A (Annotated Bibliography) – (3x200
words - 600 words total)
For each article, briefly answer the following questions:
What is the argument of this author(s) regarding the topic?
What evidence does the author(s) provide to support their argument?
Is the evidence used to support the argument conclusive and/or
convincing?
How does the argument of this author compare to the other articles
discussed?
Your answers to the questions should be concise and draw upon examples or
quotes from the article where appropriate. These can be used to illustrate your
assessment of the article. Your complete discussion of each article should be
presented as a paragraph rather than sentences or dot points, and should be
approximately 200 words each.
Reference 1: Rebaï, S.B., Voos, H. and Darouach, M., 2017, May. A
contribution to cyber-security of networked control systems: An event-
based control approach. In Event-Based Control, Communication and
Signal Processing (EBCCSP), 2017 3rd International Conference on (pp. 1-
7). IEEE.
The main point of view that the author wants to relate through the article is the
concept of cyber security which is based on network control systems. The paper mainly
deals with the typical architecture for a system of networked control under the motive of
false data attacks of injection. These formulates the capture trade off which is mainly
focused upon attack impact on the factors of control; performance, detectability of attack
and resources which are adversarial. The formulation is than mainly discussed and related
to the overall system of theoretic concept. The concept is formulized by following a
number of examples which mainly illustrates the various tradeoff for a quadruple tank
process.
The first move is the development of the conceptual framework which is mainly
for the networked control of the system with the malicious adversaries which is
introduced. The main emphasis of the model is the adversary aim at the concept of
disrupting the system behavior while the concept of being undetected by an anomaly
detector. The main problem which is related to the distributed reconfiguration under
actuator faults and sensors. In particular, the main focus is on the control system with the
implementation of actuator cooperating and sensors which are reductant which mainly
cooperating in order to recover the concept of removal of nodes which are individual.
2

ENGR9742 Assessment: Case Study Plan Put your name and student number here
Reference 2: Rajasekaran, R.K., 2017, April. Cyber-security challenges for
wireless networked aircraft. In Integrated Communications, Navigation and
Surveillance Conference (ICNS), 2017 (pp. 3C3-1). IEEE.
The author in the article puts direct emphasis on the concept of network enabled
service which can improve the flight operation, reduce need for on board system’s or
mainly sub system’s and increase operation consistency. The main flow of information
mainly relies on a network which is secured and which determines the utility, efficiency
and the overall cost related to the network which is enabled in air crafts. This paper has a
framework of developing a taxonomy of the security threats which are related to the
aircraft system’s that could mainly rely on the network which is wireless in order to
timely supply of information which is very much critical. The paper on the hand also
explores the existing situation which can be translated into the same domain, helping
address those concern at a lower level, as well as different original and adaptive
architecture that could be developed in order to address the consequences of a
compromise network.
Reference 3: A Framework to Construct Knowledge Base for
Cyber Security
The author in this paper mainly relates to the conceptual framework in order to
construct the knowledge base for the aspect of the cyber security. There are many
independent cyber security knowledge’s bases for different aspect which are dealt now.
In the internet framework there are also much of cyber security related content which
exists in different form or text. Fusion of the related aspect of the cyber security related to
the information which can be very much meaningful in the work. In the paper, a
framework is proposed in order to integrate existing cyber security knowledge base and
extract a mean of cyber security related to the information system. in the framework,
there is mainly a construction of a vulnerable- centric ontology and train a Stanford
named entity recognizer in order to extract cyber security related entity from the text. In
the end of the article through many experiments it can be seen that the verification of
important feature is done which is named use Gazette to train a named entity recognizer
in the cyber security domain.
Note: You must only use peer-reviewed sources in your annotated
bibliography, (but a mix of peer-reviewed sources and reports, and
standards or regulations or government authorised reports) will be counted
when calculating the number of sources used in your final case study
report.
3
Reference 2: Rajasekaran, R.K., 2017, April. Cyber-security challenges for
wireless networked aircraft. In Integrated Communications, Navigation and
Surveillance Conference (ICNS), 2017 (pp. 3C3-1). IEEE.
The author in the article puts direct emphasis on the concept of network enabled
service which can improve the flight operation, reduce need for on board system’s or
mainly sub system’s and increase operation consistency. The main flow of information
mainly relies on a network which is secured and which determines the utility, efficiency
and the overall cost related to the network which is enabled in air crafts. This paper has a
framework of developing a taxonomy of the security threats which are related to the
aircraft system’s that could mainly rely on the network which is wireless in order to
timely supply of information which is very much critical. The paper on the hand also
explores the existing situation which can be translated into the same domain, helping
address those concern at a lower level, as well as different original and adaptive
architecture that could be developed in order to address the consequences of a
compromise network.
Reference 3: A Framework to Construct Knowledge Base for
Cyber Security
The author in this paper mainly relates to the conceptual framework in order to
construct the knowledge base for the aspect of the cyber security. There are many
independent cyber security knowledge’s bases for different aspect which are dealt now.
In the internet framework there are also much of cyber security related content which
exists in different form or text. Fusion of the related aspect of the cyber security related to
the information which can be very much meaningful in the work. In the paper, a
framework is proposed in order to integrate existing cyber security knowledge base and
extract a mean of cyber security related to the information system. in the framework,
there is mainly a construction of a vulnerable- centric ontology and train a Stanford
named entity recognizer in order to extract cyber security related entity from the text. In
the end of the article through many experiments it can be seen that the verification of
important feature is done which is named use Gazette to train a named entity recognizer
in the cyber security domain.
Note: You must only use peer-reviewed sources in your annotated
bibliography, (but a mix of peer-reviewed sources and reports, and
standards or regulations or government authorised reports) will be counted
when calculating the number of sources used in your final case study
report.
3

ENGR9742 Assessment: Case Study Plan Put your name and student number here
Assignment 1: Part B (Abstract) – 250 words
Abstract:
Cyber security or information system can be referred to as a technique in
order to protect computer system, networks, programs and data from being
exploited by unauthorized person or attacks. The major areas that are concerned in
the scenario are application security, disaster security, information security and
network security. The most important being the network security which mainly
include protection in the field of reliability, integrity and safety relating to the
overall concept of networking. Cyber security which is related to the data networks
is in itself infancy which are related to the attackers on the network who are
becoming increasing sophisticated. The necessary of the widespread of the
implementation of the wireless network mainly provides more emphasis on
vulnerabilities. Network can be considered as a vital point in the functioning of the
network. When this concept is compromised ones it can lead to a very difficult in
terms of recovering it. It has been seen that since few years’ network practitioners
have mainly worked on different prospectus in order to protect the routing protocol
through the authentication of the updates which are passed in the network.
Cyber security has been increasingly become a main area of concern with
regards to the policy makers, agencies which are related to government and
American businesses which mainly consist of infrastructure which is critical which
is under attack on a daily basis. The aspect of security which is related to cyber
should seek the solution that consist that mainly expertise the leverage of both the
sectors of private and government which is federal and should be oriented towards
the result and technological sphere which can be termed as neutral.
Reference List
Include full bibliographical details of all the articles you have found and used in
the preparation of the assignment here. Use the Harvard referencing method.
If you are unsure on the correct format, see the Harvard Reference Guide
provided on FLO.
4
Assignment 1: Part B (Abstract) – 250 words
Abstract:
Cyber security or information system can be referred to as a technique in
order to protect computer system, networks, programs and data from being
exploited by unauthorized person or attacks. The major areas that are concerned in
the scenario are application security, disaster security, information security and
network security. The most important being the network security which mainly
include protection in the field of reliability, integrity and safety relating to the
overall concept of networking. Cyber security which is related to the data networks
is in itself infancy which are related to the attackers on the network who are
becoming increasing sophisticated. The necessary of the widespread of the
implementation of the wireless network mainly provides more emphasis on
vulnerabilities. Network can be considered as a vital point in the functioning of the
network. When this concept is compromised ones it can lead to a very difficult in
terms of recovering it. It has been seen that since few years’ network practitioners
have mainly worked on different prospectus in order to protect the routing protocol
through the authentication of the updates which are passed in the network.
Cyber security has been increasingly become a main area of concern with
regards to the policy makers, agencies which are related to government and
American businesses which mainly consist of infrastructure which is critical which
is under attack on a daily basis. The aspect of security which is related to cyber
should seek the solution that consist that mainly expertise the leverage of both the
sectors of private and government which is federal and should be oriented towards
the result and technological sphere which can be termed as neutral.
Reference List
Include full bibliographical details of all the articles you have found and used in
the preparation of the assignment here. Use the Harvard referencing method.
If you are unsure on the correct format, see the Harvard Reference Guide
provided on FLO.
4
1 out of 4

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.