Self-Driving Car AS CPS( Cyber Physical System )

Detailed Instructions

The purpose of the case study project is to get you acquainted with the security challenges of a real, complex, Cyber Physical Systems. In class, you will be learning about CPS security concepts, security architecture, Threats and Attacks related to several application domains of CPS and the countermeasures to secure them. In the case study, you will see how those concepts are applied, or not applied.

This case study is designed to help you in two key ways: investigation and co-authorship. The investigative part of this project is to help you learn about CPS systems from the outside in. This means reading published incident reports, research papers, visiting a industry, online white papers, and anything else you can get your hands on to understand what’s going on. The co-authorship part of this project is to help you learn what it’s like to describe complex arguments (i.e. specific security risks) to a technical, yet non-security-minded audience. The “co-” part is to help you learn how to write much like how you’ve learned how to code… communicating, coordinating, know when to work alone, know when to work collaboratively, giving good feedback, and reacting to feedback.

The main component of this project is a paper that will be written much like we write code – iteratively. In terms of writing style, here’s what the instructor likes to see:

For formal, technical writing, brevity and clarity are key. I would far rather see one clear, thoughtful sentence than three repetitive sentences. You might notice that we have no word minimums or maximums here – only questions that must be answered.

Furthermore, the paper must have a cohesive writing style. Like coding, this is not something you want to be slapping together from a few paragraphs people wrote separately. The varying sections need to be all part of a single narrative. Thus, please do NOT repeat the questions below in your paper – it should read smoothly on its own. Also, using bullet points as a structure is not a cohesive style – this is not a PowerPoint presentation, it is prose.

Formatting

Please use following formatting throughout your paper.

  • 12pt font
  • Justified text (no ragged edges)
  • Headers have a maximum size of 16pt font
  • Tables & Figures must be numbered starting at 1 going through the whole document.
  • Tables must have their caption be above the table
  • Figures have their caption below the figure.
  • Cite URLs by using hyperlinks in the text, like this.

Case Study Proposal

Choosing a project may take some effort, as not every project out there makes a good candidate. Here are the minimum requirements for a good case study:

  • Must have a CPS application domain that has significant security risks
  • Non-trivial. Large enough that one single person cannot know everything. At least look for the industry that you can visit or find enough information about.
  • Not too massive, either. Entire oil and gas industry/smart grid are not recommended, for visit.
  • Must be actually used in production
  • Must have had a list of reported vulnerabilities, threats, security incidents. The more detailed the records, the better (e.g. do they trace to bugs and source code patches? do they have defect tracking of their vulnerabilities?). Note: third-party sources such as the CVE or CVEDetails.com are NOT enough (and sometimes wrong). The project themselves need to acknowledge vulnerabilities and you must look into the project history yourself.

Your proposal must be written in paragraph form and it must provide a convincing narrative about how you will be able to study your project empirically. In your proposal, include the following:

  • The names of each team member
  • Project overview.
    • What is the CPS application used for?
    • What is the development team like?
    • How often does the project release?
  • Security Risks.
    • What are some example security risks of this system?
    • What kinds of data does this product protect?
    • What are the ramifications of this software is compromised?

For this proposal, create a document called “X Case Study Proposal”.

Grading scheme (10pts)

  • 6pts – Submit a case study proposal naming a project.
  • 1pt – Project matches the minimum criteria
  • 3pts – Proposal demonstrates a surface-level understanding of the project security risks

 

It is a project related to Cyber Physical System we choose the topic about Self-Driving Car AS CPS( Cyber Physical System )
Step 1:
First of all, read the document that I providing that has guidelines and ensure Self-Driving Car as CPS meets the minimum requirements that are specified in the document

if it is not meet just tell me and give suggestion about another topics of CPS

Step 2:
of all you should do the research about Self-Driving Car as CPS

then answer the following questions in the proposal where each question should be answered as paragraph
here are the questions :

• Project overview.
o What is the CPS application used for?
o What is the development team like?
o How often does the project release?

• Security Risks.
o What are some example security risks of this system?
o What kinds of data does this product protect?
o What are the ramifications of this software is compromised?

For this proposal, create a document called “X Case Study Proposal”.

please follow the guidelines and do it very well

Do your search very well

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply