Sentinel security product prototype description - the paper


Follow lab outline, as you go and use lab sample project that I have attached as a guideline. This project needs to be written just like lab sample project file. About 14-18 pages is required, I have included pictures that can be used in the paper as well.

Lab I - Descriptive/Persuasive Paper

Paper Requirements (Individual Assignment)

The goal of this assignment is to prepare a descriptive paper that communicates the characteristics of your team's CS 410 product to the stakeholders who could be a colleague, a customer, or anyone with interest in the associated societal problem. The paper should describe innovative aspects of your product and persuade the stakeholders of the intrinsic value of your product. This must be supported with reference material identified in CS 410 along with the results of any additional research performed.

The purpose, in your role as a designer of the prototype of the CS 410 project, is to inform the stakeholders of the differences that will exist in the laboratory prototype to be developed this semester. You need to communicate what elements will be modeled/simulated, what elements will be eliminated, and what will be added to facilitate testing.

You should not assume that any reader has knowledge about any of the salient topics of the product other than those that are commonly available in the current media. That media is the Internet, the local news, newspapers, and television and radio broadcasts.

Your paper should have a transparent connection with the descriptive material that was prepared during CS 410 and contains the technical characteristics of the project. Figures and/or tables may be incorporated in the paper, but these elements are not essential. You will be evaluated on your technical writing skills as well as on grammar and style.

Your paper should be double-spaced and submitted via Blackboard. You should use a font size that is no greater than 12 pts. Your paper's margins should be no greater than one inch right and left, top and bottom. APA guidelines must be adhered to. Guidance and course specific interpretations of the guidelines are provided in Blackboard.

The paper must follow APA style, and must include a cover page, table of contents, glossary, and references. Your paper must strictly adhere to the content defined below. The information within the brackets "<" and ">" describe the content to be written within each section. Replace "XXX" with the title of your product.

Following your submission of the paper, make sure to add your professional development reflections on your blog in Blackboard.

1 INTRODUCTION

2 XXX PRODUCT DESCRIPTION

2.1 Key Product Features and Capabilities

2.2 Major Components (Hardware/Software)

3 IDENTIFICATION OF CASE STUDY

4 XXX PRODUCT PROTOTYPE DESCRIPTION

Include a table of comparison between RWP and Prototype either in section 4.>

4.1 Prototype Architecture (Hardware/Software)

4.2 Prototype Features and Capabilities

4.3 Prototype Development Challenges

Lab 1 outline

1. Introduction

1. Introducing Sentinel Security
a. Team
b. Purpose/Goal
i. Secure Communication for all professionals/healthcare workers.
ii. Plug-and-play Hardware
1. Lightweight
2. Transportable
3. Fast Connection.

2. Problem Statement
a. Secure communication for mobile
b. Frequent and extensive updates
c. Security evaluation of mobile technologies
i. Slow
ii. Costly
iii. Incomplete
iv. Continuously evolving

3. Solution Statements
a. Using Raspberry Pi
i. Intercepts all data
ii. Encrypts data
iii. Routes to data center.
b. Using Data Center
i. Receives data
ii. Decrypts data
iii. Analyzes for malicious pattern
iv. Forwards to intended recipient

2.0 Sentinel Security Product Description

1. Encrypt and forward traffic
2. Gather traffic data
3. Analyze traffic
4. Predict persistent threats

2.1 Product features and capabilities (end goal)

1. User access management
a. Adding user
2. Removing user
3. Plug and Play
a. Wifi-implemented
4. Android devices
a. download app
5. Traffic
a. Monitoring
b. Analyzing
c. Blocking/Permitting
6. Traffic database
a. IP origin
b. IP destination
7. Recognize persistent threats

2.2 Major Components (Hardware/Software)

1. Hardware (what equipment I as a user and I as a admin need to have)
a. Android Device
b. Raspberry Pi 2
c. Datacenter

2. Software (what software do I need as a developer)
a. MySQL
b. WireShark
c. OpenVPN
d. Sentinel Security Android App

3. Software developments (what software am I writing as a team to create the solution)
a. Wireshark to Database Conversion
b. Traffic Analysis
c. app (UI)
d. reporting mechanism
i. scheduled (maintenance)
ii. non-scheduled (alerts)

3.0 Identification of Case Study

1. Product is developed for MITRE with potential customer industries
a. Medical
b. Financial
c. Legal
d. Defense
e. Governmental

2. Prototype is developed as a test-bed

3. Simulation
a. Proof of concept
i. 4 files
1. permitted or denied IP
2. Push or pull request
b. Traffic stress
i. 100 files
1. permitted and denied IP
2. Push and pull request
c. Risk mitigation
i. only valid users send and receive
d. Plug and Play
i. Connect hardware for recognition
ii. Disconnect and reconnect recognition
e. Add and remove employees

4.0 Sentinel Security Product Prototype Description

1. Sentinel Security App
a. Downloadable
b. Simple to use
c. One-click authentication

2. Raspberry Pi
a. No interface
b. Connects phone to datacenter

3. Datacenter
a. Gather traffic data
b. Data flow
i. Permit
ii. Deny

4.1 Prototype Architecture (Hardware/Software)

1. Hardware
a. Android Device
b. Raspberry Pi 2
c. Virtual Machine provided by ODU CS dept

2. Software to be used
a. MySQL
b. WireShark
c. OpenVPN
d. Sentinel Security Android App

3. Prototype software to be developed
a. Algorithms
i. Manage traffic data
ii. Store traffic data
b. Testing suit
i. Collection of tests
ii. Simulation tests in 3.0.3
c. Report generation

4.2 Prototype Features and Capabilities

1. File access
a. Grant or deny
2. Gather traffic data
3. Encrypts data before transmission
4. Decrypts data upon arrival
5. Android app activates connection

4.3Prototype Development Challenges

1. Limitations of hardware
2. Lack of skills
3. Connecting product chain
4. Proving ease of use

5.0 Glossary

1. Sentinel Security - encryption and communication evaluation for mobile devices

2. Plug-and-Play Hardware - denoting or relating to a devices that are intended to work perfectly when first used or connected, without reconfiguration or adjustment by the user.

3. Raspberry Pi - is a low-cost, basic computer that runs entirely on open-source software.

4. Datacenter - a large group of networked computer servers typically used for the remote storage, processing, or distribution of large amounts of data.

5. Encryption - the conversion of electronic data into another form, called ciphertext.

6. Decryption - the conversion of encrypted data back to it's original form.

6.0 References

Sentinel Security

Encryption and Communication Evaluation for Mobile DevicesProblem Statement

Migration to the use of evolving mobile technologies for secure communication in highly regulated industries is arduous.

Problem with Devices

Popularity of mobile devices

Updates are frequent and extensive

11 versions in under 10 years1

Security is asserted by evaluation of mobile technologies

Slow

Costly

Incomplete

Continuously evolving

Attachment:- CS project.rar

Solution Preview :

Prepared by a verified Expert
C/C++ Programming: Sentinel security product prototype description - the paper
Reference No:- TGS01286646

Now Priced at $150 (50% Discount)

Recommended (94%)

Rated (4.6/5)