Intersection of Cyber Security & Aerospace

Boeing

West Lafayette, IN  

Given a model of an avionics network, construct a VM-based digital twin of that model. Conduct a security analysis to identify potential points and methods a malicious adversary might use to attack that model, and propose/implement a modification or custom defense solution.