Topic: Computer Security Concerns: Threats, Attacks, and Assets
You will write a paper of 10-12 pages in length and this is not including the separate title page, Abstract, Introduction, body of content page, conclusion, and a separate page for references. The syllabus provides a list of potential topics. You must include 3-5 references, two that must be. peer-reviewed journals. The paper must follow APA guidelines.
Schoolof Business, Economic, and Technology
Campbellsville University- Louisville Center
Research Report Guide
A Guide for BA63
2
Students
©2019, Dr Vincent Scovetta
Campbellsville University. All rights reserved.
1/4/2019
Table of Contents
4
4
4
Problem Statement and Purpose of Research 4
Relevance and Significance 4
Research Questions 5
Barriers and Issues 5
5
5
5
5
References 6
6
Front Matter 6
Chapter 1 through 5 (12 pages): 6
Back Matter: 6
6
and Citations 7
Margins 7
Line Spacing 7
Paragraph Spacing 7
Page Numbering 7
8
Title Page 8
The Abstract 8
Chapter Title, Heading 1, Heading 2 8
Tables and Figures in the Text Body 9
Appendix 9
9
10
Sample Reference List 11
The Research Report
The Research Report serves as the deliverable towards partial completion of the requirement for BA6332. The requirement of your research is expected to be built and constitutes the five-chapter model. This document is not intended to be a one-time or static document. The Research Report needs to be 10 to 12 pages in length (not including the front and back matter and needs to be written in the past and present tense, as appropriate.
The Research Report should be a complete and concise document that establishes your credentials as a relative expert in the domain of your study. In all cases, a good understanding of the specific domain will be necessary for the successful completion of your study. It is vital that you stay current in the literature germane to the study you are conducting and update the chapters accordingly.
The following is the general structure of the Research Report
Chapter 1- Background/Introduction (3 – 4 pages)
In this section, present enough information about the proposed work so that the reader understands the general context or setting. It is also helpful to include a summary of how this document is organized.
Introduction
This section introduces the reader to the structural content of your Research Report
In this section, present a concise statement of a research-worthy problem to be addressed (i.e., why the work should be undertaken – don’t state “it was a requirement of the professor”). Follow the statement of the problem with a well-supported discussion of its scope and nature. The discussion of the problem should include: what the problem is, why it is a problem, how the problem evolved or developed, and the issues and events leading to the problem. Your problem statement must be clear, concise, to the point and able to be articulated in no more than three sentences.
This section provides the necessary support for both the problem statement of your study. Consider the following questions and support your discussion by citing the research literature:
· Why is there a problem? What groups or individuals are affected?
· How far-ranging is the problem and how great is its impact? What’s the benefit of solving the problem?
· What has been tried without success to correct the situation? Why weren’t those attempts successful?
· What are the consequences of not solving the problem?
· How does the goal of your study address the research problem and how will your proposed study offer promise as a resolution to the problem?
· How will your research add to the knowledge base?
· What is the potential for generalization of your results?
· What is the potential for original work?
In this section you will define the research questions you expect to answer in your finding / results / conclusion sections. The research question(s) must be directly related to the problem statement and introduce the reader to their respective relationships. The answers to the research question(s) need to be either qualitative or quantitative.
In this section, identify how the problem is inherently difficult to solve. You should also show how the solution you propose are difficult to obtain (unlike a book report). You should show the study you propose is of adequate difficulty to warrant a successful grade assignment. What issues do you expect to be confronted with that will limit the viability of your finding and conclusion?
Chapter 2 – Review of the Literature (6-8 pages)
In this section, it is important to clearly identify the major areas on which you will need to focus your research in order to build a solid foundation for your study in the existing body of knowledge. The literature review is the presentation of quality literature in a particular field that serves as the foundation and justification for the research problem, research questions or hypothesis, and methodology. You will develop a more comprehensive review of the literature as part of your report. This section must include your analysis and synthesis of the digested materials.
Chapter 3 – Approach/Methodology (1 – 2 pages)
Describe how you plan to address your research problem and accomplish your stated goal. List the major steps that must be taken to accomplish the goal and include a preliminary discussion of the methodology and specific research methods you plan to implement. Although specific details are not required at this point, you must provide adequate discussion of the general process you will follow to implement your research methodology.
Chapter 4: Findings, Analysis, and Summary of Results (2 – 4 pages)
Chapter 4 includes an objective description and analysis of the findings, results or outcomes of the research. Limit the use of charts, tables, figures to those that are needed to support the narrative. Most of these illustrations can be included as part of the Appendixes.
The following topics are intended to serve as a guide:
· Data analysis
· Your Findings
· Your Analysis
· Summary of results & discussion
Chapter 5: Conclusions (2 – 4 pages)
· Conclusions – Clearly state the conclusions of the study based on the analysis performed and results achieved. Indicate by the evidence or logical development the extent to which the specified objectives have been accomplished. If the research has been guided by hypotheses, make a statement as to whether the data supported or rejected these hypotheses. Discuss alternative explanations for the findings, if appropriate. Delineate strengths, weaknesses, and limitations of the study.
· Implications – Discuss the impact of the work on the field of study and its contributions to knowledge and professional practice. Discuss implications for future research.
· Recommendations – Present recommendations for future research or for changes in research methods or theoretical concepts. As appropriate, present recommendations for changes in academic practice, professional practice, or organizational procedures, practices, and behavior.
References
Follow the most current version of APA to format your references. However, each reference should be single-spaced with a double space between each cited entry. Make sure that every citation is referenced and every reference is cited.
Research Report Structure
Notes:
· White space added to the report will negatively affect the final grade of your report. Do not add extra space to your document in an effort to extend the page count.
· The front matter includes the following:
· Title Page
· Abstract
· Table of Contents
· List of Tables
· List of Figures
· The back matter includes the following:
· Appendixes
· References
Document Preparation – Form and Style
Form and style guidelines for a Research Report serve a number of purposes: to ease adaptation of the document for publication in whole or part, to ensure a level of professional appearance, and ease the burden on the readers of the document by presenting material in a logical, consistent fashion. Nevertheless, form and style guidelines should not be burdensome for Peer Reviewer or Professor. The bulk of the effort in developing and mentoring a Research Report should certainly be directed toward the quality of the thoughts being presented, not the appearance of that presentation.
The current edition of the Publication Manual of the American Psychological Association serves as the primary guide for format and style. Since that manual focuses primarily on publication in journals, some exceptions are necessary for a Research Report. The Research Report guidelines are amplified with examples of:
· Title Page
· Table of Contents
· List of Tables
· List of Figures
· First Page of a Chapter
· Appendix Pages
· Reference List
One of the most important tasks in writing a Research Report is to reference other works and sources in the text body. You must provide a formal reference citation for each idea or statement taken from the work of an individual or organization. Failure to provide a reference citation, when one is appropriate, is plagiarism, which is a violation of the university’s Code of Student Conduct and Academic Responsibility. An act of plagiarism will subject the student to disciplinary action including suspension or expulsion from the university. Always err on the side of caution when writing any formal paper. As you conduct your work, keep accurate records that indicate which portions of your Research Report are not your own words and ideas. If you attempt to do this as an afterthought, you run the risk of losing the source of the information and committing plagiarism. Reference citations in the text should use the author-date citation system specified in the current edition of the Publication Manual of the American Psychological Association. All reference citations must be listed alphabetically in the References section at the end of the document, again following the format specified in the current edition of the Publication Manual of the American Psychological Association. However, each reference should be single-spaced with a double space in between each entry. Make sure that every citation is referenced and every reference is cited.
The left-hand margin must be 1.0 inches (4 cm.). Margins at the right, top, and bottom of the page should be 1.0 inch. (See exception for chapter title pages below.) The Research Report text must be left-aligned (leaving a ragged right edge).
Double-spacing is required for most of the text in documents submitted during the Research Report process. Pages for the abstract, acknowledgments, and parts of the table of contents, however, must be single-spaced in the Research Report. Single-spacing also can be used for table titles and headings, figure captions, references in a reference list (but double-spacing is required between references in the list), footnotes, and long quotations. Long quotations may be indented five spaces. Judicial triple can improve appearance and readability and is appropriate after chapter titles, before major subheadings, before footnotes, and before and after tables in the text; however, avoid open white spaces.
The text of the document is double-spaced. There should be no extra spaces between paragraphs in sections; however, indent the first line of paragraphs five spaces (1/2 inch). Chapters must begin on new pages.
Page numbers for the front matter, starting with the Table of Contents, should be lowercase roman numerals, centered at the bottom of the page. All pages following the front matter should have page numbers in Arabic numerals in the upper right-hand corner. The page order and numbering for the front matter is:
1. Title page is page i, but the page number is not printed.
2. Approval Signature page is page ii, but the page number is not printed.
3. Abstract is page iii but the page number is not printed.
4. Acknowledgements is page iv and not to exceed one page. The page number is not printed.
5. Table of Contents is page v and the page number is printed, bottom center.
6. List of Tables (only present if the document contains tables) is given the next page number in sequence, printed bottom center.
7. List of Figures (only present if the document contains figures) is given the next page number in sequence, printed bottom center.
Type Style
For body text, you should use 12-point Times New Roman. Text for the cover page may be larger but should not exceed 14-point size. Text for the chapter title text should be 14-point size. Be consistent in your use of typefaces throughout the document. Do not use a compressed typeface or any settings on your word processor that would decrease the spacing between letters or words. Sans serif typefaces such as Helvetica or Arial may be used for relatively short blocks of text such as chapter headings and captions but should be avoided in long passages of text as they impede readability.
Every document that is submitted, from the Research Report, must have a title page. The title page includes the exact title of the Master’s Thesis, date of submission, your name, and name of the department which the report is submitted. Use the format of the Sample Research Report Title Page provided in Appendix A.
The abstract (see Appendix es C) is single spaced. An abstract is a stand-alone document and therefore, should not include citations because it would then need references. Note that the abstract must be fewer than 200 words.
It is preferred that Research Report contain no more than three levels of headings in the body text. All headings should have only the first letter of each word capitalized except that non-major words shorter than four letters have no capital letters. See Appendix H for a sample page for a first page of a chapter.
Instructions for heading levels follow:
Level 1: Chapter Title
This heading starts two inches from the top of the page, is centered on the page, and is set in 14point type. The first line contains the chapter number (e.g., Chapter 4). The second line is blank. The third line displays the chapter title, is centered on the page, and is set in 14-point type.
Level 2: Heading 1
Start heading 1 at the left margin of the page, four spaces (i.e., two returns when your document is set for double-spacing) down from the title, set in bold 12-point type. Double-space (one return) to the subheading body text. Indent the first line of the body text five spaces.
Level 3: Heading 2
Start the heading 2 at the left margin of the page, double-spaced (i.e., one return when your document is set up for double-spacing) from the subheading, set in 12-point italics. Double-space (one return) to the sub-subheading body text. Indent the first line of the body text five spaces.
Charts, graphs, diagrams, figures, and summary tables that significantly enhance reading of the Research Report should be placed in the text body. Only include material in the text body that is needed by the reader to understand the point(s) you are trying to make. Other material should be placed in Appendixes. Tables that summarize large amounts of data are best placed at the end of the Master’s Thesis. If you have included data in your text related to some point, then the full table containing such data belongs in an Appendix. When using tables and figures in the body of the paper, remember that the horizontal center of the body is not at the center of the paper. It is 0.25” to the right of center due to the 1.5” left binding margin. All tables and figures that are less than body width must be centered properly and posted in the Appendices.
Place in appropriate appendices all analytical tables, evaluation instruments, and other material important in the determination, evaluation, analysis, and description of your research that is not contained in the text body (see section above). Use an Appendix to present material that supplements the text or may be of interest to readers but is too detailed or distracting for inclusion in the main body of the text. Surveys, evaluation instruments, original data, complicated mathematical tables, new computer programs, computer printouts, and data collection forms are examples of materials that are most appropriately appended. Do not exclude material that would be necessary for another researcher to replicate your work and that is not available elsewhere. Include copies of IRB permission from the sponsoring organization and from the study site. Present copies of all letters and e-mails that allow you to use and modify materials belonging to others. If appropriate, you may use a titled cover sheet for an Appendix.
Additional Resources
American Psychological Association (2010). Publication manual of the American Psychological Association. (6th ed.). Washington, D.C.: Author.
Bolker, J. (1998). Writing your Research Reportin fifteen minutes a day: A guide to starting, revising, and finishing your doctoral thesis. New York, NY: Henry Holt Publishing.
Kiernan, V (2005). Writing Your Dissertation with Microsoft Word. MattilyPublishing, Alexandria, Virginia
Sample First Page of Table of Contents
Table of Contents
Abstract iii
List of Tables – Appendix A (if necessary) 123
List of Figures – Appendix B (if necessary) 234
Chapters
1. Introduction
· Statement of the Problem to Be Investigated 1
· Goal to Be Achieved 2
· Relevance and Significance 4
· Barriers and Issues 7
· etc.
2. Review of the Literature
· The theory and research literature specific to the topic 17
· etc.
3 . Methodology
· Research Methods Employed 35
· etc.
4. Findings, Analysys, Results,
· Findings 78
· Analysis 91
· Results
5. Conclusions, Implications, and Recommendations
· Results 102
· Conclusions 108
· Implications 123
· etc.
Appendices
A. xxxxxxxxxxxxxxxxx 140
B. xxxxxxxxxxxxxxxxxxxxxxx 148
C. xxxxxxxxxxxxxxx 155 etc.
Reference List 198
Note: Count and print the number of this page centered here in lowercase Roman.
American Psychological Association (2010). Publication manual of the American Psychological Association. (6th ed.). Washington, D.C.: Author.
Bolker, J. (1998). Writing your Research Reportin fifteen minutes a day: A guide to starting, revising, and finishing your doctoral thesis. New York, NY: Henry Holt Publishing.
Kiernan, V (2005). Writing Your Dissertation with Microsoft Word. MattilyPublishing, Alexandria, Virginia
2
Research Report
Cyber
Security and Robotics
Table of Contents
Chapter 1- Abstract
2
3
Problem Statement and Purpose of Research 3
Relevance and Significance 4
4
5
Chapter 2 – Review of the Literature 5
Chapter 3 – Approach/Methodology 7
Chapter 4: Findings, Analysis, and Summary of Results 9
Chapter 5: Conclusions 10
References 10
Chapter 1- Abstract
Robots whether those are military, surgical, or household are prone to face similar
cyber
security threats as any handheld device or a computer system have been facing. With the innovation of newer technology humans have been able to achieve rapid success in the field of robotics, but that has opened doors to many cyber threats on these robots.
Robots like vacuum cleaners or simple telephones could also pose privacy and safety threats to their owners. What will happen if these robots are hacked? This research paper emphasizes on the cybersecurity attacks associated with service robots and presents the risk faced by the user by bucketing them into two different categories, which are security and safety. The study presents that robot development phase is where there is greatest opportunity to foresee the type of potential threats the robot and in turn the user may face and the importance of robot security control in the development phase.
Keywords: cybersecurity, privacy, safety, robots, innovation, technology
Introduction
Robotics is one of the domains where cyber threat is being recognized as the major security and privacy risk.
Robots are being used in assembly lines, medical settings, entertainment, and households extensively nowadays, thus, it is clear that safety, security and privacy of robotic systems is critical. Mitigating cyber threats on robots is a complicated process, as it requires robot builders to focus on multiple areas starting from coding the algorithms right by the developers to maintaining the confidentiality of the device architecture and design. The security problems that arise could be categorized as “virtual” pertains to the compromised data or communication and the other is on the physical side that concerns the user as well as the robot. Together these can me referred as “Cyber-physical security” to include both virtual and physical threats. In this study I am focusing on only the safety and privacy side and aims at gathering recent studies and surveys conducted in this area. There are many existing studies that focus on the importance of security and privacy of robotics systems in this rapidly growing technological era.
The survey presented in this study tries to gather information on the outcomes of previous research conducted. The different areas in this research paper are organized as follows. Chapter 1 presents a general overview of cybersecurity risks to different service robots and provides a taxonomy for the risks. Chapter 2 presents details on the focus areas of the research to build the foundation and justify results. Chapter 3 and 4 outlines the methodology employed and any supported data analysis and summarizes them. Finally, Chapter 5 summarizes the work done in this research paper.
Cyber threats are affecting robotics operations in a negative way virtually. Hackers can modify the information gathered, stored or transmitted by the robot. These threats have effects on both external and internal entities. Some of these threats could have real potential to cause significant harm to innocent people, disrupt services, harm products and steal important information. Many robots are being used in autonomous weapon systems, industrial setup, medical procedures and in armed forces where they work side-by-side with humans. Thus, there is a genuine need to mitigate cyber security threats. In this study, we have focused on two particular cases: safety and privacy.
Robots are actively involved in people’s daily lives at each aspect. May it be inside the house using robotic vacuum cleaners for house hold work or outside using an autonomous car, an entertainment robot or drone. Cyber threats have been increasing exponentially as people all over the world are rapidly using newer robots and technology. They are connected using robots, may it be for communication, entertainment, military or any other miscellaneous digital means. The Robotics and automation industry is expected to grow from $62 billion to $1.2 trillion in the next one decade. These numbers shed some light on the importance of safety and security in this industry.
The main objectives of this paper are to:
· Analyze several cyber-physical security threats, which indirectly target clients or users.
· Improve safety and security of the robotic systems, raise awareness and increase understanding of the emerging threats on the robotic platforms.
The study outlined in this paper focusses on how to have a safer and more secure robotic systems by addressing one or more of the following issues:
· identification of possible security and privacy threats against many modalities of robotic systems;
· evaluation of impact of the identified threats in a systematic manner; and
· prevention and mitigation of the threats.
Research Questions
· How to categorize the possible security and privacy threats faced by different robotic systems.
· Understanding the impact, the type of user, domestic vs business vs governmental have on type of threats.
· Once attacks are identified, how someone can mitigate the risks.
· How to model risks based on the type of threats experienced in the past.
Barriers and Issues
The robotics field is vast and due to the different types of robots and their uses the type of threats experienced are also different. Thus, it’s difficult to generalize the type of threats and remedies. Threats could have been generated accidentally due to some malfunctioning in robot resulting in transmission of confidential data or with malicious intent from the third party. The former ones are easier to control where the development team can take possible measures if faced during manufacturing and testing phase of the robot but the later is difficult to detect as well as control.
Below are some of the needs for modeling risks that helped build a foundation to justify the research problem i.e, need to improve the safety and security of robotics systems irrespective of the area of use.
To model risk, research uses security risk analysis that is performed on two factors: likelihood of a successful attack against an asset, and the consequence of such an attack. There are studies that show cybersecurity threats have targeted industrial environments more than that of service robots at home in the past. Cyber threats could be classified in general into three fields: confidentiality, integrity, and availability of information. In addition to this there are physical damages caused by cyber threats. In the research, risks associated with an attack are modeled in terms of the final user of the robot. The three identified robot users are – domestic users, commercial ones, and high-level organization.
Below are some of the threats experienced in the past by domestic and industrial robot users:
1.
Economic risks, which takes into account the expenses incurred to fix the robot or the associated environment after the attack.
2.
Physical
, Reputational and Psychological if any damage to humans happens.
3. Economic damage, national security problems and any political risks in case the robot is being used by a public corporation.
The type of potential damage depends on the different levels of physical attacks to the robot: destruction, partial damage, degradation, disruption, or substitution of their elements.
Table below shows the summarization of threats identified using numbers 1-4 based on a survey conducted on the physical elements of the robot, with 4 being the severe scale of attack. The rows of the table indicate the different levels of physical attacks which are- destruction, partial damage, degradation, disruption, or substitution of their elements. Columns of below table indicate the different types of users of service like the domestic, commercial, or public administration/governmental.
These also depend on the type of user. The damages attack different users in a different ways, and users’ perception about the relevance of these risks is also different. For instance, domestic users are more concerned about the privacy issues, whereas corporate users are more concerned about the reputation of the corporation or their personal reputation in the corporation. Same applies to safety issues; domestic users are more concerned about the economic damage that robots can cause in their belongings, whereas corporate users are more worried about reputational damages or potential lawsuits. From my point of view, attacks on privacy are the one of most relevant risks that service robots could bring both to homes and to business.
The leak of information in a threat can cause severe damages. So, in the next section the research focuses on privacy threats.
Privacy
risks characterization Robots can go places humans cannot go, see things humans cannot see, and do things humans cannot do. These characteristics have made the robots very useful in some domains like space exploration, rescue missions, hazardous materials manipulation, etc. where use of humans could be dangerous and life threatening. The entertainment robots/gadgets sometimes come with built-in cameras, microphones and speakers, which could be controlled using a remote either hand held or audio command based. Some of the online cyber attackers get control of the mobile Wi-Fi robot toys that kids are using and could pose a risk to families with children. For example, the Wall Street Journal reported that after an investigation into Cayla doll,1 Germany’s Federal Network has issued an order for all parents to find the doll and destroy her. Parents who ignore the order to destroy Cayla could face a fine of up to €25,000 and up to 2 years in prison. On its website, the agency posted a template for a destruction certificate that should be filled in, signed by a waste-management company, and sent to the agency as proof of destruction. Cayla doll is just an example.
Before the analysis of any risks and threats, we have an urge to model the scenarios that may define or develop to be a part of cybersecurity for robots. This paper will attempt to execute a generalized research, hence avoiding any particular scenario. This approach and methodology will be divided into multiple layers, that is pictorially represented in Fig 1.
The origin of any threat can be fragmented into 3 main buckets:
a.
Accident
– An accepted scenario where there are no perfect situations created in the laboratories. This means that planning for such situations is close to impossible. This may include the risk of third party APK malfunction, logic developed by open source developers, etc.
b.
Natural
– A natural disaster that may compromise the physical integrity of the robot. This may cause partial damage, degraded performance, unexpected behavior, disruption of components, etc.
c. External –
Attack
s that can be attempted by external users. This can include altering control parameters, tampering logic in production, tampering calibration parameters, altering signals generated by the robots for control, etc.
These elements need to be vetted and planned for, before deploying into a physical environment.
Software flaws, intentional or unintentional can be presented into the following categories:
a. Software flaws
b. Security malfunction
c. Feature misuse
While these risks cannot be avoided totally, there are several approaches to cope with these threats. This will be briefly explained in the next section.
Integrity
Confidentiality
Privacy
Availabilitydent
Safetydent
Internal and external users
Disruption
Degradation
Destructiondent
Physical & Cyber
cyber
Cyber
Physical
Natural
Attack
Accident
Risk
Impact
Target
Origin
Chapter 4 – Analysis
While there are always several actors involved in implementation of these systems (namely – final users, business users, robot vendors, independent developers) the impact of each threat on different actor will differ.
A domestic user can be concerned about the economic impact of the damage or even physical damage that it may cause to a human. On the other hand, a business user will be concerned with the following:
a. Theft of intellectual property
b. Reputation amongst the public.
c. Regulatory problems, sometimes involving legal actions.
To avoid or prepare for these threats, we need to analyze the methods of attacks in the cyber infrastructure. The following may be a list of the most common attacks (not a complete list):
a. Malware – A software that may be developed to cause damage to a single component or an entire network. This may or may not be structured. This includes worms, torjans and viruses. The attack may render the robot (software or hardware) inoperable or even grant the attacker root access, enabling them to control the network remotely.
b. Phishing – A method used by an attacker to fool the user into taking harmful actions. These actions may be as simple as reveling the passwords, usually an outcome of a successful phishing page.
c. Denial of Service (DOS) – Typically a brute force attack to stop the service from working entirely. This attack, when prolonged for a long time may cause severe damage to the repetition of the firm/ business involved
d. Man in the middle (MITM) – An attack involving the attacker to interpose secretly between the user and the service. A successful MITM attack may equip the attacker with sensitive information and relaying false information to the destination at the same time.
Common methods to avoid cyber attacks –
a. End point protection
b. Firewall
c. Access management
d. Data backup for rollbacks
e. Data Encryption
i. AES 256(Advanced Encryption Standard)
ii. RSA(Rivest-Shamir-Adleman)
iii. Triple DES
Chapter 5: Conclusions
This study has shed light on the security and safety risks caused by cyber attackers on robotic systems. The study has proposed taxonomy for the attack on service robots. The study has used the type of robots, type of users of the robot and the asset being compromised to create the taxonomy. In case of a virtual attack, assets of type data, information, confidentiality could be compromised and in case of physical attacks it can impose physical threats to the human or robots involved. This classification could be used while deciding on whether to purchase the robot or not for the service required and highlights the potential risks that the buyer could encounter. The study has considered the different types of sensors that are equipped by the service robots and the type of information they can gather during a cyber-attack. This info can be used to configure robots depending on their use and the type of user. The database of type of threats that have been faced in the past plays a major role in the risk modeling and thus helps to foresee and mitigate associated risks. Finally, the importance of mitigating these risks and taking measure during the development phase of the robot is highlighted, using standard protocols, algorithms, hardware and good practices are a key.
1.
Cyber attacks on robots a real threat — New report shows ease of hacking
2.
https://www.researchgate.net/publication/321638514_Cybersecurity_of_Robotics_and_Autonomous_Systems_Privacy_and_Safety
3.
https://www.csoonline.com/article/3237324/what-is-a-cyber-attack-recent-examples-show-disturbing-trends.html
4.
https://capcoverage.com/index.php/10-ways-to-prevent-cyber-attacks/
5.
6.
https://www.getapp.com/resources/common-encryption-methods/
7. Calo RM. Robots and privacy. In: Bekey P, Abney G, Lin K, editor. Robot Ethics: The Ethical and Social Implications of Robotics. Boston: MIT Press; 2011
8. Humayed A, Lin J, Li F, Luo B. Cyber-Physical Systems Security – A Survey [Internet]. 2017. arXiv preprint. arXiv:1701.04525
2
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.