Read The Paper Lee J Ardakani H D Yang S Bagheri B

Read The Paper Lee J Ardakani H D Yang S Bagheri B

Q1: Read the paper (Lee, J., Ardakani, H. D., Yang, S., & Bagheri, B. (2015). Industrial big data analytics and cyber-physical systems for future maintenance & service innovation. Procedia Cirp , 38 , 3-7.) Going to Google Scholar, you can see that the paper is cited 155 times so far. Industrial big data analytics and cyber-physical systems for future maintenance & service innovation J Lee , HD Ardakani, S Yang , B Bagheri - Procedia Cirp, 2015 - Elsevier With the rapid advancement of Information and Communication Technologies (ICT) and the integration of advanced analytics into manufacturing, products and services, many industries are facing new opportunities and at the same time challenges of maintaining their … Cited by 155 Related articles All 4 versions Pick the original paper, and (3-5) of the papers that cited this original paper (from the 155 listed in Google scholar).

Then read and summarize the papers in your own words (size 3 pages double line 12 fonts times new roman). Your own words mean write your own sentences for the original paper and also the cited papers. You need to summarize properly. ----------------------------------------------------------- Q2: Read the paper/patent (Amini, L., Christodorescu, M., Cohen, M. A., Parthasarathy, S., Rao, J., Sailer, R., ... & Verscheure, O. (2015). U.S. Patent No. 9,032,521 . Washington, DC: U.S. Patent and Trademark Office.) Adaptive cyber -security analytics L Amini , M Christodorescu , MA Cohen… - US Patent …, 2015 - Google Patents Performing adaptive cyber -security analytics including a computer implemented method that includes receiving a report on a network activity. A score responsive to the network activity and to a scoring model is computed at a computer.

The score indicates a likelihood of a … Cited by 78 Related articles All 4 versions Pick the original paper/patent, and (3-5) of the papers that cited this original paper/patent (from the 78 listed in Google scholar). Then read and summarize the papers in your own words (size 3 pages double line 12 fonts times new roman). Your own words mean write your own sentences for the original paper and also the cited papers. You need to summarize properly. Q3: This is a research-oriented question on the paper (The security of machine learning) Barreno, M., Nelson, B., Joseph, A.

D., & Tygar, J. D. (2010). The security of machine learning. Machine Learning , 81 (2), . Pick the original paper, and (3-5) of the papers that cited this original paper (from the 374 listed in Google scholar).

Then read and summarize the papers in your own words (size 3 pages double line 12 fonts times new roman) Q4: This is a research-oriented question on the paper (Combining ensemble of classifiers by using genetic programming for cyber security applications) Folino, G., & Pisani, F. S. (2015, April). Combining ensemble of classifiers by using genetic programming for cyber security applications. In European Conference on the Applications of Evolutionary Computation (pp. 54-66).

Springer, Cham. Pick the original paper, and (3-5) of the papers that cited this original paper (from the 18 listed in Google scholar). Then read and summarize the papers in your own words (size 3 pages double line 12 fonts times new roman) 2019 PT_project.pkt 1 HIT274 Assignment You are one of the network specialists for ABC Company. Your boss has several tasks that include app development, troubleshooting, setting up a server, etc. You can choose to work individually or in groups depending on the requirements given for each tasks.

Choose 1 of the following: 1. Develop a game with a focus on network security. (target audience: university students) a. Number of students: max 3 students/group b. Objective: understand the different security measures that you can implement in routers, switches, workstations, servers, etc. (you do not need to consider the social aspects) c. Platform: Any d.

Deliverables: i. An end product ii. A short report outlining the features, setup and objectives of the game. 2. Develop an application teaching beginners about networking concepts. (target audience: university students) a.

Number of students: max 3 students/group b. Objective: interactive learning for beginners to learn about an aspect of networking such as subnetting concepts, routing protocols, OSI model, etc. c. Platform: Any d. Deliverables: i. An end product ii.

A short report outlining the features, setup and objectives of the application. 3. Research about the impact of security on network performances (wired or wireless) a. Individual work b. Objective: To investigate if the impact of security implementations on network performances fall within acceptable level c.

Platform: simulations or real setup d. Deliverables: i. results from simulations or experimental setup ii. A report (about 2000 words) outlining the objectives, topology, results and conclusion. 4. Troubleshooting the network topology given in packet tracer (refer to the appendix) a.

Individual work b. Background: You are given a topology of the Company ABC in packet tracer. Recently, the company has been hacked and resulted in many connectivity issues. You are to find all the problems, fix them up and write a report on it. 2 c.

Deliverables: i. Packet tracer file (after your amendments) ii. A short report outlining the issues and solutions Marking criteria ï‚· Meeting the objectives and satisfying all requirements1: 80% ï‚· Report writing (includes presentation, referencing and grammar): 20% Timeline ï‚· Week 4: Selection of task and informing the lecturer ï‚· Week 5 to 11: Working on the task ï‚· Week 12: Submission *ALL students are to inform the lecturer of their selection by the end of week 4. 1 For choices 1 and 2, this includes the technical and user aspects: Technical aspects: design and complexity User aspects: learning curve, availability of instructions, appeal factor, interactivity, etc 3 Appendix The topology has 3 major networks: HQ, WORLD and BRANCH as shown in the diagram below.

You are NOT allowed to do any modifications in the WORLD. As a result of a recent security breach in the company, there are several problems found in the following areas: A. Routing Protocols (26 marks) ï‚· HQ internal network uses RIP for internal and external connections. ï‚· Branch internal network uses RIP for internal and external connections. ï‚· Every router in HQ should be able to ping every other router ï‚· Routers should be configured with a default route You need to identify all the problems with the settings in each router, the impact on the network due to the problems and how you can rectify them. You need to implement your proposed solutions in the given packet tracer file. IP addresses of the router interfaces are NOT to be changed.

Routers Problems Impact Solutions HQ Tech Router HQ LVL1 Router HQ LVL2 Router HQ Router Branch Router HQ BRANCH WORLD 4 B. Complaints from Staff (20 marks) You need to identify all the causes associated with the complaints shown in the table below and how you can rectify them. You do NOT need to mention any issues related to the settings in the router for this section. You need to implement your proposed solutions in the given packet tracer file. From Complaints Causes Solutions HQ Lvl2_user1 Not able to ping lvl1_user1 Not able to email lvl2_user2 Not able to ping lvl1 printer HQ Lvl1_user1 Not able to ping lvl1_user2 Branch Wireless_PC Not able to ping Branch Printer All HQ users Not able to type in the web browser to access the HQ server Not able to type in the web browser to access the WWW server Not able to type in the web browser to access the BRANCH server C.

Implementing Security Measures (24 marks) The company decides to improve the security of the company by implementing the following: 1. HQ_Router a. Set up NAT/PAT – allowing internal users to go to the external network but blocks all incoming connections with the exception of the HQ server which is accessible from the external network with the IP address 200.20.2.. Branch Network a. DHCP to be set up to allocate IP addresses to the Branch users b.

Block connection to WWW Server c. Add in Branch user3 to the Branch Switch using VLAN2 d. Branch user3 must be able to access the printer which is in VLAN1 e. Branch switch to disable all unused ports 3. All routers a.

Configure a password for privileged EXEC mode (password - cisco) b. Configure a password for the console connection (password - class) c. Configure a password for the VTY connection (password - cisco) d. Configure encryption to all passwords e. Configure a message of the day banner f.

Inactive session timeout on the console port and the virtual terminal after 30 seconds 5 You need to implement the above requirements in the given packet tracer file. Comment on the security measures being implemented and how you can further improve them D. Implementing VLAN (10 marks) Describe how you would implement VLAN to the HQ and BRANCH LAN. You need to implement this in the given packet tracer file.