Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Dont USE Ai at all A ) several security issues in the new generation of surveillance systems applied to global aviation the Automatic Dependent Surveillance

Dont USE Ai at all
A)
several security issues in the new generation of surveillance systems applied to global aviationthe Automatic Dependent Surveillance-Broadcast (ADS-B) system. It mainly involves extracting and processing the aviation aircraft's position information and other additional information to form a clear and intuitive background map and trajectory.
However, ADS-B broadcasts information via open and unencrypted protocols, making it vulnerable to deliberate intrusions and attacks, which poses a significant security risk. each threat and provides solutions to mitigate the risk of the threat being a successful exploit.
Your task is to determine the overall risk to the system that is compromised if a vulnerability/weakness is successfully exploited by a threat source, given a specific condition. You can also apply a countermeasure (mitigation) that reduces or eliminates the condition (presence of vulnerability and the threat) or the event (exploitation). The following figure shows the basic idea of the process.
Figure 1- Risk Assessment Process. please see the attached picture
Ultimately, the goal is to measure the probability of the system being compromised, considering the exploitation of a vulnerability/weakness and the presence of any countermeasure for the specific group of threats. You must find at least one exploitation to determine if the system is compromised.
While analyzing the dataset, we found that confidentiality threats impact around 30% of the system's compromise, integrity threats impact 40%, and availability threats 70%. It is important to cite that each group of threats is mutually independent, given the system's condition is compromised.
To determine the feasibility of the exploitation, we must consider two factors: harmful and difficult. Confidential and integrity threats are present 23% of the time when both factors are low. The other situation turns them 80%(confidential) and 60%(integrity). The situation changes when we have availability threats; the feasibility of exploitation for low factors is 10%, high factors are 97%, and the other combination is around 65%.
The presence of any mitigation strategy in the confidential threat group disables the threat and its exploitation in 35% of the cases. In the integrity threat groups, it is 45%, and in the availability groups, it is 85%.
Model the network using Within-Node independence when you find it.
You cannot use a programming language to answer this question; the solution must be provided in Genie or UNBBayes.
You cannot use the UNBBayes or GENIE plugin; you must calculate or use triggers.
You must submit the UNBBayes or GENIE file or the screenshot of you work.
If you do not use the triggers, you must provide the calculation of each probability, showing the calculation steps. You must use the Equation Editor from Word, Office, etc.
Again no AI at all

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Beyond Big Data Using Social MDM To Drive Deep Customer Insight

Authors: Martin Oberhofer, Eberhard Hechler

1st Edition

0133509796, 9780133509793

More Books

Students also viewed these Databases questions

Question

1. The next area, Now we will turn to, or The second step is.

Answered: 1 week ago

Question

Web Application Security Analysis Using OWASP - ZAP

Answered: 1 week ago

Question

How many edit and revision sessions do they perform on shorte ?

Answered: 1 week ago

Question

How do they research and outline writing projects?

Answered: 1 week ago