Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Dont USE Ai at all A ) several security issues in the new generation of surveillance systems applied to global aviation the Automatic Dependent Surveillance
Dont USE Ai at all
A
several security issues in the new generation of surveillance systems applied to global aviationthe Automatic Dependent SurveillanceBroadcast ADSB system. It mainly involves extracting and processing the aviation aircraft's position information and other additional information to form a clear and intuitive background map and trajectory.
However, ADSB broadcasts information via open and unencrypted protocols, making it vulnerable to deliberate intrusions and attacks, which poses a significant security risk. each threat and provides solutions to mitigate the risk of the threat being a successful exploit.
Your task is to determine the overall risk to the system that is compromised if a vulnerabilityweakness is successfully exploited by a threat source, given a specific condition. You can also apply a countermeasure mitigation that reduces or eliminates the condition presence of vulnerability and the threat or the event exploitation The following figure shows the basic idea of the process.
Figure Risk Assessment Process. please see the attached picture
Ultimately, the goal is to measure the probability of the system being compromised, considering the exploitation of a vulnerabilityweakness and the presence of any countermeasure for the specific group of threats. You must find at least one exploitation to determine if the system is compromised.
While analyzing the dataset, we found that confidentiality threats impact around of the system's compromise, integrity threats impact and availability threats It is important to cite that each group of threats is mutually independent, given the system's condition is compromised.
To determine the feasibility of the exploitation, we must consider two factors: harmful and difficult. Confidential and integrity threats are present of the time when both factors are low. The other situation turns them confidential and integrity The situation changes when we have availability threats; the feasibility of exploitation for low factors is high factors are and the other combination is around
The presence of any mitigation strategy in the confidential threat group disables the threat and its exploitation in of the cases. In the integrity threat groups, it is and in the availability groups, it is
Model the network using WithinNode independence when you find it
You cannot use a programming language to answer this question; the solution must be provided in Genie or UNBBayes.
You cannot use the UNBBayes or GENIE plugin; you must calculate or use triggers.
You must submit the UNBBayes or GENIE file or the screenshot of you work.
If you do not use the triggers, you must provide the calculation of each probability, showing the calculation steps. You must use the Equation Editor from Word, Office, etc.
Again no AI at all
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started