Site icon Tutor Bin

James Madison University Securing Autonomous Vehicles Essay

James Madison University Securing Autonomous Vehicles Essay

Description

Select one of the following, and provide up to two pages of a meaningful, action-oriented response, using bullets to make your points.

Kali for Database Hacking:  https://www.youtube.com/watch?v=lg1GYOaYAok  (Watch, try some of the tools, and provide lessons learned. Find additional resources and include them in your research and execution of tools.  List URLs.)

Autonomous Vehicle Security:  https://www.cisa.gov/autonomous-vehicle-security (Read this page and the linked AV Security Guide (pdf) at the bottom.  Provide analysis and actionable steps as if we were designing AVs and wanted to make sure we were following CISA guidance.

CMMC Deep Dive: https://www.acq.osd.mil/cmmc/index.html gives an overview, and after becoming comfortable with the scope, dig into the details (https://www.acq.osd.mil/cmmc/documentation.html ) to provide a briefing as if our organization was considering embracing CMMC so that we would be eligible for future work opportunities.

  • OWASP Cheat Sheets: OWASP provides a wide array of cheat sheets.  Feel free to peruse the alphabetical list (https://cheatsheetseries.owasp.org/Glossary.html ) and find a few that are relevant to your interests or work projects.  Or, find a collection, such as https://cheatsheetseries.owasp.org/IndexTopTen.html .  Among others, the Query Parameterization Cheat Sheet is particularly applicable to this course.  Provide a two-page analysis of context, approach, and bulleted list of actionable items we can adopt for use from among some of the cheatsheets.

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Exit mobile version