Research Paper on Computer Security Concerns: Threats, Attacks, and Assets

Topic:  Computer Security Concerns: Threats, Attacks, and Assets  

You will write a paper of 10-12 pages in length and this is not including the separate title page, Abstract, Introduction, body of content page, conclusion, and a separate page for references. The syllabus provides a list of potential topics. You must include 3-5 references, two that must be. peer-reviewed journals. The paper must follow APA guidelines.  

Don't use plagiarized sources. Get Your Custom Essay on
Research Paper on Computer Security Concerns: Threats, Attacks, and Assets
Just from $13/Page
Order Essay

Schoolof Business, Economic, and Technology

Campbellsville University- Louisville Center

Research Report Guide

A Guide for BA63

2

Students

©2019, Dr Vincent Scovetta

Campbellsville University. All rights reserved.

1/4/2019

Table of Contents

The Research Report

4

Chapter 1- Background/Introduction (3 – 4 pages)

4

Introduction

4
Problem Statement and Purpose of Research 4
Relevance and Significance 4
Research Questions 5
Barriers and Issues 5

Chapter 2 – Review of the Literature (6-8 pages)

5

Chapter 3 – Approach/Methodology (1 – 2 pages)

5

Chapter 4: Findings, Analysis, and Summary of Results (2 – 4 pages)

5

Chapter 5: Conclusions (2 – 4 pages)

5
References 6

Research Report Structure

6
Front Matter 6
Chapter 1 through 5 (12 pages): 6
Back Matter: 6

Document Preparation – Form and Style

6

References

and Citations 7
Margins 7
Line Spacing 7
Paragraph Spacing 7
Page Numbering 7

Type Style

8
Title Page 8
The Abstract 8
Chapter Title, Heading 1, Heading 2 8
Tables and Figures in the Text Body 9
Appendix 9

Additional Resources

9

Sample First Page of Table of Contents

10
Sample Reference List 11

The Research Report

The Research Report serves as the deliverable towards partial completion of the requirement for BA6332. The requirement of your research is expected to be built and constitutes the five-chapter model. This document is not intended to be a one-time or static document. The Research Report needs to be 10 to 12 pages in length (not including the front and back matter and needs to be written in the past and present tense, as appropriate.

The Research Report should be a complete and concise document that establishes your credentials as a relative expert in the domain of your study. In all cases, a good understanding of the specific domain will be necessary for the successful completion of your study. It is vital that you stay current in the literature germane to the study you are conducting and update the chapters accordingly.

The following is the general structure of the Research Report

Chapter 1- Background/Introduction (3 – 4 pages)

In this section, present enough information about the proposed work so that the reader understands the general context or setting. It is also helpful to include a summary of how this document is organized.

Introduction

This section introduces the reader to the structural content of your Research Report

Problem Statement and Purpose of Research

In this section, present a concise statement of a research-worthy problem to be addressed (i.e., why the work should be undertaken – don’t state “it was a requirement of the professor”). Follow the statement of the problem with a well-supported discussion of its scope and nature. The discussion of the problem should include: what the problem is, why it is a problem, how the problem evolved or developed, and the issues and events leading to the problem. Your problem statement must be clear, concise, to the point and able to be articulated in no more than three sentences.

Relevance and Significance

This section provides the necessary support for both the problem statement of your study. Consider the following questions and support your discussion by citing the research literature:

· Why is there a problem? What groups or individuals are affected?

· How far-ranging is the problem and how great is its impact? What’s the benefit of solving the problem?

· What has been tried without success to correct the situation? Why weren’t those attempts successful?

· What are the consequences of not solving the problem?

· How does the goal of your study address the research problem and how will your proposed study offer promise as a resolution to the problem?

· How will your research add to the knowledge base?

· What is the potential for generalization of your results?

· What is the potential for original work?

Research Questions

In this section you will define the research questions you expect to answer in your finding / results / conclusion sections. The research question(s) must be directly related to the problem statement and introduce the reader to their respective relationships. The answers to the research question(s) need to be either qualitative or quantitative.

Barriers and Issues

In this section, identify how the problem is inherently difficult to solve. You should also show how the solution you propose are difficult to obtain (unlike a book report). You should show the study you propose is of adequate difficulty to warrant a successful grade assignment. What issues do you expect to be confronted with that will limit the viability of your finding and conclusion?

Chapter 2 – Review of the Literature (6-8 pages)

In this section, it is important to clearly identify the major areas on which you will need to focus your research in order to build a solid foundation for your study in the existing body of knowledge. The literature review is the presentation of quality literature in a particular field that serves as the foundation and justification for the research problem, research questions or hypothesis, and methodology. You will develop a more comprehensive review of the literature as part of your report. This section must include your analysis and synthesis of the digested materials.

Chapter 3 – Approach/Methodology (1 – 2 pages)

Describe how you plan to address your research problem and accomplish your stated goal. List the major steps that must be taken to accomplish the goal and include a preliminary discussion of the methodology and specific research methods you plan to implement. Although specific details are not required at this point, you must provide adequate discussion of the general process you will follow to implement your research methodology.

Chapter 4: Findings, Analysis, and Summary of Results (2 – 4 pages)

Chapter 4 includes an objective description and analysis of the findings, results or outcomes of the research. Limit the use of charts, tables, figures to those that are needed to support the narrative. Most of these illustrations can be included as part of the Appendixes.

The following topics are intended to serve as a guide:

· Data analysis

· Your Findings

· Your Analysis

· Summary of results & discussion

Chapter 5: Conclusions (2 – 4 pages)

· Conclusions – Clearly state the conclusions of the study based on the analysis performed and results achieved. Indicate by the evidence or logical development the extent to which the specified objectives have been accomplished. If the research has been guided by hypotheses, make a statement as to whether the data supported or rejected these hypotheses. Discuss alternative explanations for the findings, if appropriate. Delineate strengths, weaknesses, and limitations of the study.

· Implications – Discuss the impact of the work on the field of study and its contributions to knowledge and professional practice. Discuss implications for future research.

· Recommendations – Present recommendations for future research or for changes in research methods or theoretical concepts. As appropriate, present recommendations for changes in academic practice, professional practice, or organizational procedures, practices, and behavior.

References

Follow the most current version of APA to format your references. However, each reference should be single-spaced with a double space between each cited entry. Make sure that every citation is referenced and every reference is cited.

Research Report Structure

Notes:

· White space added to the report will negatively affect the final grade of your report. Do not add extra space to your document in an effort to extend the page count.

Front Matter

· The front matter includes the following:

· Title Page

· Abstract

· Table of Contents

· List of Tables

· List of Figures

Chapter 1 through 5 (12 pages):

Back Matter:

· The back matter includes the following:

· Appendixes

· References

Document Preparation – Form and Style

Form and style guidelines for a Research Report serve a number of purposes: to ease adaptation of the document for publication in whole or part, to ensure a level of professional appearance, and ease the burden on the readers of the document by presenting material in a logical, consistent fashion. Nevertheless, form and style guidelines should not be burdensome for Peer Reviewer or Professor. The bulk of the effort in developing and mentoring a Research Report should certainly be directed toward the quality of the thoughts being presented, not the appearance of that presentation.

The current edition of the Publication Manual of the American Psychological Association serves as the primary guide for format and style. Since that manual focuses primarily on publication in journals, some exceptions are necessary for a Research Report. The Research Report guidelines are amplified with examples of:

· Title Page

· Table of Contents

· List of Tables

· List of Figures

· First Page of a Chapter

· Appendix Pages

· Reference List

References and Citations

One of the most important tasks in writing a Research Report is to reference other works and sources in the text body. You must provide a formal reference citation for each idea or statement taken from the work of an individual or organization. Failure to provide a reference citation, when one is appropriate, is plagiarism, which is a violation of the university’s Code of Student Conduct and Academic Responsibility. An act of plagiarism will subject the student to disciplinary action including suspension or expulsion from the university. Always err on the side of caution when writing any formal paper. As you conduct your work, keep accurate records that indicate which portions of your Research Report are not your own words and ideas. If you attempt to do this as an afterthought, you run the risk of losing the source of the information and committing plagiarism. Reference citations in the text should use the author-date citation system specified in the current edition of the Publication Manual of the American Psychological Association. All reference citations must be listed alphabetically in the References section at the end of the document, again following the format specified in the current edition of the Publication Manual of the American Psychological Association. However, each reference should be single-spaced with a double space in between each entry. Make sure that every citation is referenced and every reference is cited.

Margins

The left-hand margin must be 1.0 inches (4 cm.). Margins at the right, top, and bottom of the page should be 1.0 inch. (See exception for chapter title pages below.) The Research Report text must be left-aligned (leaving a ragged right edge).

Li
ne Spacing

Double-spacing is required for most of the text in documents submitted during the Research Report process. Pages for the abstract, acknowledgments, and parts of the table of contents, however, must be single-spaced in the Research Report. Single-spacing also can be used for table titles and headings, figure captions, references in a reference list (but double-spacing is required between references in the list), footnotes, and long quotations. Long quotations may be indented five spaces. Judicial triple can improve appearance and readability and is appropriate after chapter titles, before major subheadings, before footnotes, and before and after tables in the text; however, avoid open white spaces.

Paragraph Spacing

The text of the document is double-spaced. There should be no extra spaces between paragraphs in sections; however, indent the first line of paragraphs five spaces (1/2 inch). Chapters must begin on new pages.

Page Numbering

Page numbers for the front matter, starting with the Table of Contents, should be lowercase roman numerals, centered at the bottom of the page. All pages following the front matter should have page numbers in Arabic numerals in the upper right-hand corner. The page order and numbering for the front matter is:

1. Title page is page i, but the page number is not printed.

2. Approval Signature page is page ii, but the page number is not printed.

3. Abstract is page iii but the page number is not printed.

4. Acknowledgements is page iv and not to exceed one page. The page number is not printed.

5. Table of Contents is page v and the page number is printed, bottom center.

6. List of Tables (only present if the document contains tables) is given the next page number in sequence, printed bottom center.

7. List of Figures (only present if the document contains figures) is given the next page number in sequence, printed bottom center.

Type Style

For body text, you should use 12-point Times New Roman. Text for the cover page may be larger but should not exceed 14-point size. Text for the chapter title text should be 14-point size. Be consistent in your use of typefaces throughout the document. Do not use a compressed typeface or any settings on your word processor that would decrease the spacing between letters or words. Sans serif typefaces such as Helvetica or Arial may be used for relatively short blocks of text such as chapter headings and captions but should be avoided in long passages of text as they impede readability.

Title Page

Every document that is submitted, from the Research Report, must have a title page. The title page includes the exact title of the Master’s Thesis, date of submission, your name, and name of the department which the report is submitted. Use the format of the Sample Research Report Title Page provided in Appendix A.

The Abstract

The abstract (see Appendix es C) is single spaced. An abstract is a stand-alone document and therefore, should not include citations because it would then need references. Note that the abstract must be fewer than 200 words.

Chapter Title, Heading 1, Heading 2

It is preferred that Research Report contain no more than three levels of headings in the body text. All headings should have only the first letter of each word capitalized except that non-major words shorter than four letters have no capital letters. See Appendix H for a sample page for a first page of a chapter.

Instructions for heading levels follow:

Level 1: Chapter Title

This heading starts two inches from the top of the page, is centered on the page, and is set in 14point type. The first line contains the chapter number (e.g., Chapter 4). The second line is blank. The third line displays the chapter title, is centered on the page, and is set in 14-point type.

Level 2: Heading 1

Start heading 1 at the left margin of the page, four spaces (i.e., two returns when your document is set for double-spacing) down from the title, set in bold 12-point type. Double-space (one return) to the subheading body text. Indent the first line of the body text five spaces.

Level 3: Heading 2

Start the heading 2 at the left margin of the page, double-spaced (i.e., one return when your document is set up for double-spacing) from the subheading, set in 12-point italics. Double-space (one return) to the sub-subheading body text. Indent the first line of the body text five spaces.

Tables and Figures in the Text Body

Charts, graphs, diagrams, figures, and summary tables that significantly enhance reading of the Research Report should be placed in the text body. Only include material in the text body that is needed by the reader to understand the point(s) you are trying to make. Other material should be placed in Appendixes. Tables that summarize large amounts of data are best placed at the end of the Master’s Thesis. If you have included data in your text related to some point, then the full table containing such data belongs in an Appendix. When using tables and figures in the body of the paper, remember that the horizontal center of the body is not at the center of the paper. It is 0.25” to the right of center due to the 1.5” left binding margin. All tables and figures that are less than body width must be centered properly and posted in the Appendices.

Appendix

Place in appropriate appendices all analytical tables, evaluation instruments, and other material important in the determination, evaluation, analysis, and description of your research that is not contained in the text body (see section above). Use an Appendix to present material that supplements the text or may be of interest to readers but is too detailed or distracting for inclusion in the main body of the text. Surveys, evaluation instruments, original data, complicated mathematical tables, new computer programs, computer printouts, and data collection forms are examples of materials that are most appropriately appended. Do not exclude material that would be necessary for another researcher to replicate your work and that is not available elsewhere. Include copies of IRB permission from the sponsoring organization and from the study site. Present copies of all letters and e-mails that allow you to use and modify materials belonging to others. If appropriate, you may use a titled cover sheet for an Appendix.

Additional Resources

American Psychological Association (2010). Publication manual of the American Psychological Association. (6th ed.). Washington, D.C.: Author.

Bolker, J. (1998). Writing your Research Reportin fifteen minutes a day: A guide to starting, revising, and finishing your doctoral thesis. New York, NY: Henry Holt Publishing.

Kiernan, V (2005). Writing Your Dissertation with Microsoft Word. MattilyPublishing, Alexandria, Virginia

Sample First Page of Table of Contents

Table of Contents

Abstract iii

List of Tables – Appendix A (if necessary) 123

List of Figures – Appendix B (if necessary) 234

Chapters

1. Introduction

· Statement of the Problem to Be Investigated 1

· Goal to Be Achieved 2

· Relevance and Significance 4

· Barriers and Issues 7

· etc.

2. Review of the Literature

· The theory and research literature specific to the topic 17

· etc.

3 . Methodology

· Research Methods Employed 35

· etc.

4. Findings, Analysys, Results,

· Findings 78

· Analysis 91

· Results

5. Conclusions, Implications, and Recommendations

· Results 102

· Conclusions 108

· Implications 123

· etc.

Appendices

A. xxxxxxxxxxxxxxxxx 140

B. xxxxxxxxxxxxxxxxxxxxxxx 148

C. xxxxxxxxxxxxxxx 155 etc.

Reference List 198

Note: Count and print the number of this page centered here in lowercase Roman.

Sample Reference List

American Psychological Association (2010). Publication manual of the American Psychological Association. (6th ed.). Washington, D.C.: Author.
Bolker, J. (1998). Writing your Research Reportin fifteen minutes a day: A guide to starting, revising, and finishing your doctoral thesis. New York, NY: Henry Holt Publishing.
Kiernan, V (2005). Writing Your Dissertation with Microsoft Word. MattilyPublishing, Alexandria, Virginia

2

Research Report

Cyber

Security and Robotics

Table of Contents
Chapter 1- Abstract

2

Introduction

3
Problem Statement and Purpose of Research 3
Relevance and Significance 4

Research Questions

4

Barriers and Issues

5
Chapter 2 – Review of the Literature 5
Chapter 3 – Approach/Methodology 7
Chapter 4: Findings, Analysis, and Summary of Results 9
Chapter 5: Conclusions 10
References 10

Chapter 1- Abstract

Robots whether those are military, surgical, or household are prone to face similar

cyber

security threats as any handheld device or a computer system have been facing. With the innovation of newer technology humans have been able to achieve rapid success in the field of robotics, but that has opened doors to many cyber threats on these robots.

Robots like vacuum cleaners or simple telephones could also pose privacy and safety threats to their owners. What will happen if these robots are hacked? This research paper emphasizes on the cybersecurity attacks associated with service robots and presents the risk faced by the user by bucketing them into two different categories, which are security and safety. The study presents that robot development phase is where there is greatest opportunity to foresee the type of potential threats the robot and in turn the user may face and the importance of robot security control in the development phase.

Keywords: cybersecurity, privacy, safety, robots, innovation, technology

Introduction

Robotics is one of the domains where cyber threat is being recognized as the major security and privacy risk.

Robots are being used in assembly lines, medical settings, entertainment, and households extensively nowadays, thus, it is clear that safety, security and privacy of robotic systems is critical. Mitigating cyber threats on robots is a complicated process, as it requires robot builders to focus on multiple areas starting from coding the algorithms right by the developers to maintaining the confidentiality of the device architecture and design. The security problems that arise could be categorized as “virtual” pertains to the compromised data or communication and the other is on the physical side that concerns the user as well as the robot. Together these can me referred as “Cyber-physical security” to include both virtual and physical threats. In this study I am focusing on only the safety and privacy side and aims at gathering recent studies and surveys conducted in this area. There are many existing studies that focus on the importance of security and privacy of robotics systems in this rapidly growing technological era.

The survey presented in this study tries to gather information on the outcomes of previous research conducted. The different areas in this research paper are organized as follows. Chapter 1 presents a general overview of cybersecurity risks to different service robots and provides a taxonomy for the risks. Chapter 2 presents details on the focus areas of the research to build the foundation and justify results. Chapter 3 and 4 outlines the methodology employed and any supported data analysis and summarizes them. Finally, Chapter 5 summarizes the work done in this research paper.

Problem Statement and Purpose of Research

Cyber threats are affecting robotics operations in a negative way virtually. Hackers can modify the information gathered, stored or transmitted by the robot. These threats have effects on both external and internal entities. Some of these threats could have real potential to cause significant harm to innocent people, disrupt services, harm products and steal important information. Many robots are being used in autonomous weapon systems, industrial setup, medical procedures and in armed forces where they work side-by-side with humans. Thus, there is a genuine need to mitigate cyber security threats. In this study, we have focused on two particular cases: safety and privacy.

Relevance and Significance

Robots are actively involved in people’s daily lives at each aspect. May it be inside the house using robotic vacuum cleaners for house hold work or outside using an autonomous car, an entertainment robot or drone. Cyber threats have been increasing exponentially as people all over the world are rapidly using newer robots and technology. They are connected using robots, may it be for communication, entertainment, military or any other miscellaneous digital means. The Robotics and automation industry is expected to grow from $62 billion to $1.2 trillion in the next one decade. These numbers shed some light on the importance of safety and security in this industry.

The main objectives of this paper are to:

· Analyze several cyber-physical security threats, which indirectly target clients or users.

· Improve safety and security of the robotic systems, raise awareness and increase understanding of the emerging threats on the robotic platforms.

The study outlined in this paper focusses on how to have a safer and more secure robotic systems by addressing one or more of the following issues:

· identification of possible security and privacy threats against many modalities of robotic systems;

· evaluation of impact of the identified threats in a systematic manner; and

· prevention and mitigation of the threats.

Research Questions

· How to categorize the possible security and privacy threats faced by different robotic systems.

· Understanding the impact, the type of user, domestic vs business vs governmental have on type of threats.

· Once attacks are identified, how someone can mitigate the risks.

· How to model risks based on the type of threats experienced in the past.

Barriers and Issues

The robotics field is vast and due to the different types of robots and their uses the type of threats experienced are also different. Thus, it’s difficult to generalize the type of threats and remedies. Threats could have been generated accidentally due to some malfunctioning in robot resulting in transmission of confidential data or with malicious intent from the third party. The former ones are easier to control where the development team can take possible measures if faced during manufacturing and testing phase of the robot but the later is difficult to detect as well as control.

Chapter 2 – Review of the Literature

Below are some of the needs for modeling risks that helped build a foundation to justify the research problem i.e, need to improve the safety and security of robotics systems irrespective of the area of use.

To model risk, research uses security risk analysis that is performed on two factors: likelihood of a successful attack against an asset, and the consequence of such an attack. There are studies that show cybersecurity threats have targeted industrial environments more than that of service robots at home in the past. Cyber threats could be classified in general into three fields: confidentiality, integrity, and availability of information. In addition to this there are physical damages caused by cyber threats. In the research, risks associated with an attack are modeled in terms of the final user of the robot. The three identified robot users are – domestic users, commercial ones, and high-level organization.

Below are some of the threats experienced in the past by domestic and industrial robot users:

1.

Economic risks, which takes into account the expenses incurred to fix the robot or the associated environment after the attack.

2.

Physical

, Reputational and Psychological if any damage to humans happens.

3. Economic damage, national security problems and any political risks in case the robot is being used by a public corporation.

The type of potential damage depends on the different levels of physical attacks to the robot: destruction, partial damage, degradation, disruption, or substitution of their elements.

Table below shows the summarization of threats identified using numbers 1-4 based on a survey conducted on the physical elements of the robot, with 4 being the severe scale of attack. The rows of the table indicate the different levels of physical attacks which are- destruction, partial damage, degradation, disruption, or substitution of their elements. Columns of below table indicate the different types of users of service like the domestic, commercial, or public administration/governmental.

These also depend on the type of user. The damages attack different users in a different ways, and users’ perception about the relevance of these risks is also different. For instance, domestic users are more concerned about the privacy issues, whereas corporate users are more concerned about the reputation of the corporation or their personal reputation in the corporation. Same applies to safety issues; domestic users are more concerned about the economic damage that robots can cause in their belongings, whereas corporate users are more worried about reputational damages or potential lawsuits. From my point of view, attacks on privacy are the one of most relevant risks that service robots could bring both to homes and to business.

The leak of information in a threat can cause severe damages. So, in the next section the research focuses on privacy threats.

Privacy

risks characterization Robots can go places humans cannot go, see things humans cannot see, and do things humans cannot do. These characteristics have made the robots very useful in some domains like space exploration, rescue missions, hazardous materials manipulation, etc. where use of humans could be dangerous and life threatening. The entertainment robots/gadgets sometimes come with built-in cameras, microphones and speakers, which could be controlled using a remote either hand held or audio command based. Some of the online cyber attackers get control of the mobile Wi-Fi robot toys that kids are using and could pose a risk to families with children. For example, the Wall Street Journal reported that after an investigation into Cayla doll,1 Germany’s Federal Network has issued an order for all parents to find the doll and destroy her. Parents who ignore the order to destroy Cayla could face a fine of up to €25,000 and up to 2 years in prison. On its website, the agency posted a template for a destruction certificate that should be filled in, signed by a waste-management company, and sent to the agency as proof of destruction. Cayla doll is just an example.

Chapter 3-Approach/ Methodology

Before the analysis of any risks and threats, we have an urge to model the scenarios that may define or develop to be a part of cybersecurity for robots. This paper will attempt to execute a generalized research, hence avoiding any particular scenario. This approach and methodology will be divided into multiple layers, that is pictorially represented in Fig 1.

The origin of any threat can be fragmented into 3 main buckets:

a.

Accident

– An accepted scenario where there are no perfect situations created in the laboratories. This means that planning for such situations is close to impossible. This may include the risk of third party APK malfunction, logic developed by open source developers, etc.

b.

Natural

– A natural disaster that may compromise the physical integrity of the robot. This may cause partial damage, degraded performance, unexpected behavior, disruption of components, etc.

c. External –

Attack

s that can be attempted by external users. This can include altering control parameters, tampering logic in production, tampering calibration parameters, altering signals generated by the robots for control, etc.

These elements need to be vetted and planned for, before deploying into a physical environment.

Software flaws, intentional or unintentional can be presented into the following categories:

a. Software flaws

b. Security malfunction

c. Feature misuse

While these risks cannot be avoided totally, there are several approaches to cope with these threats. This will be briefly explained in the next section.

Integrity

Confidentiality

Privacy

Availabilitydent

Safetydent

Internal and external users

Disruption

Degradation

Destructiondent

Physical & Cyber

cyber
Cyber
Physical
Natural
Attack
Accident

Risk

Impact

Target

Origin

Chapter 4 – Analysis

While there are always several actors involved in implementation of these systems (namely – final users, business users, robot vendors, independent developers) the impact of each threat on different actor will differ.

A domestic user can be concerned about the economic impact of the damage or even physical damage that it may cause to a human. On the other hand, a business user will be concerned with the following:

a. Theft of intellectual property

b. Reputation amongst the public.

c. Regulatory problems, sometimes involving legal actions.

To avoid or prepare for these threats, we need to analyze the methods of attacks in the cyber infrastructure. The following may be a list of the most common attacks (not a complete list):

a. Malware – A software that may be developed to cause damage to a single component or an entire network. This may or may not be structured. This includes worms, torjans and viruses. The attack may render the robot (software or hardware) inoperable or even grant the attacker root access, enabling them to control the network remotely.

b. Phishing – A method used by an attacker to fool the user into taking harmful actions. These actions may be as simple as reveling the passwords, usually an outcome of a successful phishing page.

c. Denial of Service (DOS) – Typically a brute force attack to stop the service from working entirely. This attack, when prolonged for a long time may cause severe damage to the repetition of the firm/ business involved

d. Man in the middle (MITM) – An attack involving the attacker to interpose secretly between the user and the service. A successful MITM attack may equip the attacker with sensitive information and relaying false information to the destination at the same time.

Common methods to avoid cyber attacks –

a. End point protection

b. Firewall

c. Access management

d. Data backup for rollbacks

e. Data Encryption

i. AES 256(Advanced Encryption Standard)

ii. RSA(Rivest-Shamir-Adleman)

iii. Triple DES

Chapter 5: Conclusions

This study has shed light on the security and safety risks caused by cyber attackers on robotic systems. The study has proposed taxonomy for the attack on service robots. The study has used the type of robots, type of users of the robot and the asset being compromised to create the taxonomy. In case of a virtual attack, assets of type data, information, confidentiality could be compromised and in case of physical attacks it can impose physical threats to the human or robots involved. This classification could be used while deciding on whether to purchase the robot or not for the service required and highlights the potential risks that the buyer could encounter. The study has considered the different types of sensors that are equipped by the service robots and the type of information they can gather during a cyber-attack. This info can be used to configure robots depending on their use and the type of user. The database of type of threats that have been faced in the past plays a major role in the risk modeling and thus helps to foresee and mitigate associated risks. Finally, the importance of mitigating these risks and taking measure during the development phase of the robot is highlighted, using standard protocols, algorithms, hardware and good practices are a key.

References

1.

Cyber attacks on robots a real threat — New report shows ease of hacking

2.

https://www.researchgate.net/publication/321638514_Cybersecurity_of_Robotics_and_Autonomous_Systems_Privacy_and_Safety

3.

https://www.csoonline.com/article/3237324/what-is-a-cyber-attack-recent-examples-show-disturbing-trends.html

4.

https://capcoverage.com/index.php/10-ways-to-prevent-cyber-attacks/

5.

10 Ways to Prevent Cyber Attacks

6.

https://www.getapp.com/resources/common-encryption-methods/

7. Calo RM. Robots and privacy. In: Bekey P, Abney G, Lin K, editor. Robot Ethics: The Ethical and Social Implications of Robotics. Boston: MIT Press; 2011

8. Humayed A, Lin J, Li F, Luo B. Cyber-Physical Systems Security – A Survey [Internet]. 2017. arXiv preprint. arXiv:1701.04525

2

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code Happy