Choose a Critical Infrastructure Sector
“There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof” (Department of Homeland Security, 2016, p.1).
Choose a critical infrastructure sector to focus your technology review. For definitions of critical infrastructures, see https://www.dhs.gov/critical-infrastructure-sectors. You may wish to choose your emerging application of technology first and then select an appropriate critical infrastructure in which your selected technology can be applied or deployed.
Choose an Emerging Application of Technology
Choose an emerging application of technology that can be used in the computers, digital devices, and other electronic / electrical technologies (including networks and network infrastructures) that are deployed in or used to build, operate, support, or maintain a critical infrastructure sector (e.g. utilities, pipelines, transportation, smart cities, etc.).
Suggested technologies include:
Autonomous Vehicles (ground, sea, or air): Transportation Systems Sector
Deep Space Communication Networks: Communications Sector
Implantable Medical Devices: Healthcare and Public Health Sector
Precision Agriculture (integrated systems using satellite imagery, GPS, Sensors, Robots): Food & Agriculture Sector
Robot inspectors for physical infrastructures (buildings, roads, railways, pipelines, etc.): Multiple Sectors
Smart Grid (also called Advanced Metering Infrastructure): Energy Sector
Wearable Sensors for Hazardous Materials Detection (e.g. CBRNE): Emergency Services Sector
You are encouraged to look for and investigate additional appropriate technologies before deciding upon your technology choice for this assignment.
If you decide to research a technology that is not on the suggested technologies list (see above), you must first request and receive your instructor’s permission.Your instructor may require that you do preliminary library searches for research papers and technical papers to prove that you can find a sufficient number of resources to complete the assignment.
Find Appropriate Sources (“Survey the Literature”)
You may find it helpful to begin by reading the tables of contents for recent issues of the Communications of the ACM, IEEE Computer Magazine, IEEE Pervasive Computing, and IEEE Security & Privacy. These professional journals frequently publish highly readable, research-based articles about the cybersecurity implications of new and emerging technologies in the context of critical infrastructure sectors.
Next, brainstorm keywords that you can use to find additional articles, papers, and other scholarly publications (“sources’) which discuss and/or evaluate your selected emerging application of technology in the context of your chosen critical infrastructure.
Your selected sources must come from publications indexed in one or more of the following library databases:
ACM Digital Library http://ezproxy.umgc.edu/login?url=http://www.acm.org/dl
Dissertations & Theses (Pro Quest) http://ezproxy.umgc.edu/login?url=http://search.proquest.com/pqdtft/advanced?accountid=14580
IEEE Computer Society Digital Library https://www-computer-org.ezproxy.umgc.edu/csdl/home
Science Direct http://ezproxy.umgc.edu/login?url=http://www.sciencedirect.com/science/search
Since the point of this search is to find information about emerging applications of technology for a critical infrastructure, your sources must have a publication date of 2016 or later (2016, 2017, 2018, 2019, 2020, 2021). For papers indexed in Science Direct, you may also use papers that are marked “In Press.”
Allowable source types are: (a) professional journals, (b) conference proceedings, (c) dissertations or theses, and (d) technical magazines (published by either the ACM or IEEE). Each of your selected sources must have a reference list containing at least 3 references for authoritative papers. (See http://sites.umgc.edu/library/libhow/scholarlyjournals.cfm)
To complete this part of the assignment, you may need to review 15 – 20 sources (search results) in order to find 10 papers or articles that are usable for this assignment. The sources you choose must provide technical information about your selected technology (see selection requirements for each paper).
Create Your Bibliography (List of Sources)
Choose the 10 best sources from your searches for articles, papers, and dissertations. Focus on the ones that give details about your technology and how it can be used in an emerging application of technology. Next, write the reference list entry (APA, MLA, or another appropriate professional citation style) for each source. Alphabetize your list of reference list entries. After you have the correctly ordered list, number your entries from 1 to 10. Note: different reference entry formats are used for different types of sources. Review the UMUC Library’s “Get Help > Citing and Writing for samples and explanations of the formatting rules. If you are using APA format, your list should look something like the following.
Authors. (date). Article title. Publication name, vol(issue), #-#.
Authors. (date). Paper title. Published in the Proceedings of conference-name, pp. #-#.
Author …
Write Your Annotations
In an annotated bibliography, the annotation is a paragraph or two placed under the reference list entry for each source. For this assignment, the annotation should be a combination of factual information from the source and your evaluation (opinion) of that information. To accomplish this, you should read the abstract, introduction section, and closing sections for each article or paper. For dissertations, look over the Introduction and the Literature Review (usually Chapters 1 & 2). From this information, develop a one to three paragraph informative or descriptive summary of the source that includes: (a) a description of technology and its characteristics, (b) planned uses of the technology in the critical infrastructure, and (c) your thoughts and opinions as to how you could use this paper to justify selecting the technology for an Internal Research & Development study.
In each annotation, you should provide at least one specific example of a characteristic and/or application of the technology, e.g. an emerging technology, which impacts cybersecurity.
For example, for an annotation for an article about robots used to inspect dams and bridges, you could focus upon the need to secure the WiFi communications used to operate the device (“command and control” links). Improving the security of the WiFi transmissions would reduce the risk that attackers could take control of the robot or otherwise interfere with its operations. This in turn will decrease the probability of loss of availability caused by a successful attack. Decreasing the probability of a negative event will decrease the risk associated with that event
Note: Remember that the security posture of a system or product is framed in terms of risk, threats, vulnerabilities, etc. Improvements to the security posture (positive security implications) will result in reduced risk, increased resistance to threats or attacks, and decreased vulnerability.Negative impacts on the security posture will result in increased risk, decreased resistance to threats / attacks, and increased vulnerability (weakness).
As you write the annotations for each article / paper / dissertation, make sure that you include YOUR thoughts and ideas about the security implications of this technology. Use standard terminology per the resources in this course and in your previous coursework.
As you brainstorm the security implications of this technology (if these are not specifically discussed by your source), you should consider use of the technology to improve cybersecurity. Then consider applications or uses which will negatively impact the security posture of the identified critical infrastructure. It is very important that you consider BOTH SIDES OF THIS ISSUE.
Sample Solution
Text review of this article: This page of the paper has 2148 words. Download the full form above. Conceptual: In current days, exchanges can differ from a colossal exchange to microtransaction. Be that as it may, Bitcoin and other digital currency doesn't permit a microtransaction with no exchange expense. Another cyptocurrency called IOTA has no exchange charges which implies IOTA can be utilized for micropayments. We can send IOTA to a location without any expenses charged. Fundamentally, rather than a more modest subset of the organization being answerable for the general agreement (excavators/stakers), the whole organization of dynamic members are straightforwardly engaged with the endorsement of exchanges. In that capacity, agreement in IOTA is not, at this point decoupled from the exchange making measure: it's a natural piece of it, and it's what empowers IOTA to scale with no exchange charges. A full hub climate is arrangement and added this hub to neighbors which are appended to the knot. Played out a microtransaction from full hub to the next hub and tended to not many concerns which existing framework is having like exchange speed and versatility. This eliminates the current issue of exchange charge and simultaneously gives different advantages like versatility and high exchange speed. Presentation: What is blockchain? A blockchain is comprised of two essential parts: a decentralized organization encouraging and checking exchanges, and the unchanging record that organization keeps up. The inquiry is how would we perform microtransaction in this record. The response to the above inquiry is that with blockchain, we can envision a world wherein contracts are inserted in computerized code and put away in straightforward, shared information bases, where they are shielded from erasure, altering, and modification. Yet, utilizing bitcoin, the exchange charge is more noteworthy than the ordinary expense utilizing the bitcoin and how quick and versatile is the arrangement. The Problem with Blockchain The new element can absolutely change the versatile business and some connected paid substance, as applications or games. This field manages miniature exchanges and its costly expense structures. Nonetheless, "Bitcoin can possibly help this issue by commonly bringing down charges. However, things get truly amazing with off blockchain exchange, since it in a real sense brings the charges down to zero". Yet, this would truly not be a decent choice to make a microtransaction as the exchange charge is extremely high. Versatility • Bitcoin's blockchain takes around 10 minutes to affirm an exchange. About 200K unsubstantiated exchanges all at once. • This is irritating. As this arrangements with higher exchange charge and manage exchange vulnerability. It's difficult to scale. As we would prefer not to store the information straightforwardly in square chain as there is thing called block chain swelling so we need to have a pointer which is highlighting an information living in a dispersed hash table. Charges • Average exchange charge for exchange is in bitcoin network is $1. It probably won't be a lot for high exchanges yet for the exchanges managing microtransaction, it implies a great deal! • Solutions incorporate expanding block size limit, lightning organization, focal workers for off chain exchange, sidechains and treechains. Bunches of Computing Power required • Mining is to some degree incorporated in blockchain by goliath mining pools. • Transaction speed decays as the organization increments in size as more exchanges go after the restricted square spaces. • It will take increasingly figuring capacity to mine a similar measure of bitcoin. Powerless against Quantum assault • Bitcoin and other verification of work based blockchains are helpless to being broken by an incredible quantum PC. There is another innovation which has developed called "Particle". Particle ARCHITECTURE Particle USES BLOCKDAG • IOTA isn't an abbreviation for Internet of Things, IOTA simply mean something tiny. Square chains are successive chains where squares are included ordinary spans. • The knot a DAG (Directed Acyclic Graph) can accomplish high exchange throughput and no exchange charges on exchanges. • As it develops and more members make exchanges, the general framework turns out to be safer and quicker, with affirmation times/exchange absolution going down. • But look it's actually utilizes conveyed information base, it's as yet a P2P organization it actually depends on an agreement and approval system. • The more the hubs, the quicker the exchange speed will be. Green Blocks: Transactions on which agreement was accomplished. Red Blocks: Transactions where we are as yet unsure on their full acknowledgment. Dim Blocks: Tips (Unconfirmed exchanges). There is no exchange charge as there is no mining included. At the point when we make an exchange we need to affirm two different exchanges utilizing the evidence of work. Tallness • Height is the length of the longest arranged way to the beginning. • For instance: G has a tallness of I. D has a tallness of 3 Profundity • Depth is the longest opposite situated way to some tip. • For instance: g has a profundity of 4 to TIP A. Way = F,D,B and A. It's a 3 stage cycle to make an exchange 1) Signing – You sign the exchange contributions with your private keys. 2) Tip choice – Markov chain Monte Carlo is utilized to haphazardly choose two hints (i.e unverified exchanges), which will be referred to by your exchange. 3) Proof of Work: In request to have our exchanges acknowledged by the organization, we need to do some evidence of work-Similar to hashcash. Your hub checks if the two exchanges are not clashing. Next, the hub must do some verification of work by fathoming a cryptographic riddle (hashcash). Hashcash works by consistently hashing a similar information with a minuscule variety until a hash is found with a specific number of driving zero pieces. This PoW is to forestall spam and Sybil assaults. A Sybil assault depends on the supposition, that a big part of all hash power is coming from pernicious hubs. Whenever you've done that, your exchange will be transmission to the organization. Another person will tag along, pick your exchange in the tip choice measure and approve it. Also, much the same as that, exchange is affirmed. • It's very simple to decide the affirmation level of your exchange: it executes the MCMC calculation N times, the likelihood of exchange being acknowledged is thusly M of N. • As a trader, in IOTA you have total opportunity to choose with what likelihood you will begin tolerating exchanges. On the off chance that you are content with 51% exchange you can build the edge to 99 or 100. How does IOTA forestall twofold spending • In the knot, exchanges are nuclear. During handling however, groups are. • When a full hub is approached to give tips to a light hub to make an exchange, the full hub will walk in reverse along the edges of the DAG to the overall exchange and check if there are any clashing exchanges en route. On the off chance that there is, at that point that tip is disposed of. In the event that there isn't, at that point the tip is viewed as substantial. • An aggressor would need to dominate the info stream of new exchanges. The knot is network bound – requiring an assailant to be wherever simultaneously. • So full hubs are continually being approached to give branch and trunk tips to the light hubs for packaging purposes and will just choose tips liberated from struggle. The aggressor will attempt to do likewise with the twofold spend and needs to figure out how to overpower the whole organization's convergence. • There is no worldwide consistency in the knot. There is just possible consistency. • Stuck exchanges are called vagrants. They can be assembled in subtangles. To make it feasible for the organization to develop and secure it against specific assaults, IOTA at present depends on an organizer. The facilitator checkpoints substantial exchanges, which are then approved by the whole organization. The facilitator is being controlled by the IOTA establishment in a multi-signature. The organizer can't denounce any and all authority as he is being checked and approved by the whole organization. Particle FEATURES • Infinite Scalability • No charge miniature exchanges • Quantum-obstruction • Making micropayments in the Bitcoin network has neither rhyme nor reason if the charges are higher than the exchange esteem. Arrangement: 1) To set up the Full hub we need to introduce the java by heading off to this connection: http://www.oracle.com/technetwork/java/javase/downloads/index.html 2) We introduce Java SE 8u171 since it is viewed as steady form. As per the Operating System introduce the ideal rendition. I have utilized Windows x64. 3) Go to https://github.com/iotaledger/wallet/deliveries to introduce the wallet and it goes about as front end for the hub. 4) 5) Go to https://github.com/iotaledger/wallet/delivers and download the above demonstrated container record. 6) Once, the wallet is being introduced it will have the screens as demonstrated as follows Notice the port number you find in the wallet after establishment. Whenever this is done make reference to the name u longing and make a standard which will permit the wallet port to experience the firewalls and communicate with the IOTA organization. • Once this is refined, it will toss a mistake which needs the iri record to be stuck which was downloaded in sync 5 in the where the particle wallet organizer is made. For example here, my particle organizer is made in C envelope under AppData\Local|Programs\Iota. Go to assets under particle envelope and make another organizer called iri and glue the one we downloaded in sync 5. Simply after this stage a full hub is introduced. • If the above advance is effective, at that point this is the way the wallet GUI looks. We can add neighbors who assumes an extremely fundamental function in playing out the microtransaction. The full hub needs to have neighbors and they endorse the other 2 exchanges utilizing the agreement and verification of work and afterward they can make their own exchange. The beneath screen capture shows how the neighbors>
GET ANSWER