Long Paper about4-5 page content

  Please read the  following article:  Pattanayak, A., & Kirkland, M. (2018, October).  Current cyber security challenges in ics. In 2018 IEEE International Conference on Industrial Internet (ICII) (pp. 202-207). IEEE. ICS-Cyber-Challenges                Download ICS-Cyber-Challenges               The authors conclude “Cybersecurity in the United States seems to  have a bright future. With proper cybersecurity practices in risk … Read more

Research paper

1) Craft an analytical research paper Collaboration and Learning in human computer interaction Prepare a ten (10) page research paper. In the paper, cover the following:  · Cover Page  · Abstract  · Introduction  · Key Definitions · Review of Literature Findings · Future Research Recommendations · Conclusion · Bibliography  The paper should aim to comprehend … Read more

Short Paper in own words

  Read the following  article:  Gonzalez, D., Alhenaki, F., & Mirakhorli, M. (2019,  March). Architectural security weaknesses in industrial control systems  (ICS) an empirical study based on disclosed software vulnerabilities. In  2019 IEEE International Conference on Software Architecture (ICSA) (pp. 31-40). IEEE. ICS-Vulnerabilities-wk6                Download ICS-Vulnerabilities-wk6               The authors’ findings indicate that vulnerabilities focused on (1) … Read more

Survey Instrument

One of the ways in which usability professionals collect data, and for that matter academic professionals, is the use of a Survey Instrument.  Create a paper-based survey instrument evaluating the Amazon Website.  In the assignment, you are expected to include:  1. Participant Demographic Data (Name, Age, Gender, Location, Education etc.)  2. Participation Consent 3. 8 … Read more

Short paper urgent 30 hrs. time limit

  Please read the  following article: Yang, J., Zhou, C., Tian, Y. C., & Yang, S. H.  (2019). A software-defined security approach for securing field zones in  industrial control systems. IEEE Access, 7, 87002-87016. ICS-security-zones.pdf                Download ICS-security-zones.pdf               The authors discuss security protection for ICS networks, especially  for physical devices using software defined security.  This … Read more

Usability Evaluation

Perform a usability evaluation of an existing e-commerce Website.  Including images is highly encouraged to demonstrate the usability issues within the site.   Use the following points as guidelines when writing the Website Review: 1. System Identification: What Website are you evaluating? What is its main purpose, and what are the target users?  2. Tasks … Read more

Big Data

Big Data has undoubtedly played a role in the way business is conducted.  For many industries, when a product is created, especially a website, mobile application, or enterprise system, there is a desire to understand how data is presented in the environment.  Data has in fact become a usability measurement whether it is under the … Read more

Discussion topic

     Week 3 – Discussion – Exploring ICS     Exploring the Unknown Industrial Control System Threat Landscape – SANS ICS Security Summit 2017 (Links to an external site.)   Please watch the video above and comment on the key points discussed regarding the role of ICS. At a minimum, take one of the hypotheses discussed and … Read more