7026CEM Security of Emerging Connected Systems Assignment

Assignment Help Other Engineering
Reference no: EM132499813 , Length: word count:2500

7026CEM Security of Emerging Connected Systems - Coventry University

Security Investigation -Home IoT System

Learning Outcome 1: Propose and implement effective 'defence-in-depth' solutions to mitigate the key technical internet security vulnerabilities that organisations face.
Learning Outcome 2: Design and implement secure private networks for IoT and BYOD.
Learning Outcome 3: Discuss and debate a wide range of current research and technological advances in network security.

Task and Mark distribution:

Introduction
You are given access to an IoT environment, representing a home owned by early adopters in the current move to "smart homes". The devices are all from a single manufacturer and you are required to evaluate the security aspects of the system before marketing and sale of the devices.

You will be given access to a testbed network in order to perform a practical security audit as well as associated documentation for review.

Task Breakdown

Your work should include:
1. A security evaluation report on the test-bed system. This is a "white-box" analysis, so you should execute it as a security review rather than penetration test. You can examine any of the files and materials you are given, but any security vulnerability should be demonstrated with a prof-of-concept (PoC) attack that would work without the information gained through white-box testing. Make sure you consider more than just direct attacks on the devices. Also consider what information is exposed about the consumer.
2. A report to the manufacturer on your findings that includes a short review of each problem, along with a brief overview of how it could be solved. For each issue, you should have a more detailed description of the steps you took to discover it, showing enough detail for it to be repeated by the developers.

Scope
• You will be given a collection of docker build scripts and Makefiles.
• Although you have access to the non-live versions of the systems, their Dockerfiles, Makefiles and so on, this does not count as a vulnerability. This is just the mechanism by which you gain access to the virtualised IoT environment.
o You can, however, examine all of these files to see if there might be vulnerabilities or security flaws you can demonstrate in the running system.
o This is the equivalent of having the source code for the IoT systems and being able to review the code, making this a "white box" test.
The system
The system is comprised of:

• An MQTT server that coordinates internal messaging and provides a web front-end for the user
• A Database server that stores local information, settings and so on
• A number of devices within the system.
o a temperature sensor
o a heating system
o a light sensor

All of the services are containerised in order to minimise platform dependency. For the purposes of this coursework you can assume that the underlying platform is secure unless the container itself is compromised. You will be given a separate container for each of the services and they will function in "virtual mode" while not on actual hardware.

You are also provided with a document describing the design of the infrastructure outside of the containers. You must include this in your assessment, but rather than look for vulnerabilities in the Task and Mark distribution:

Introduction
You are given access to an IoT environment, representing a home owned by early adopters in the current move to "smart homes". The devices are all from a single manufacturer and you are required to evaluate the security aspects of the system before marketing and sale of the devices.

You will be given access to a testbed network in order to perform a practical security audit as well as associated documentation for review.

Task Breakdown

Your work should include:

1. A security evaluation report on the test-bed system. This is a "white-box" analysis, so you should execute it as a security review rather than penetration test. You can examine any of the files and materials you are given, but any security vulnerability should be demonstrated with a prof-of-concept (PoC) attack that would work without the information gained through white-box testing. Make sure you consider more than just direct attacks on the devices. Also consider what information is exposed about the consumer.

2. A report to the manufacturer on your findings that includes a short review of each problem, along with a brief overview of how it could be solved. For each issue, you should have a more detailed description of the steps you took to discover it, showing enough detail for it to be repeated by the developers.

Scope
• You will be given a collection of docker build scripts and Makefiles.
• Although you have access to the non-live versions of the systems, their Dockerfiles, Makefiles and so on, this does not count as a vulnerability. This is just the mechanism by which you gain access to the virtualised IoT environment.
o You can, however, examine all of these files to see if there might be vulnerabilities or security flaws you can demonstrate in the running system.
o This is the equivalent of having the source code for the IoT systems and being able to review the code, making this a "white box" test.
The system
The system is comprised of:

• An MQTT server that coordinates internal messaging and provides a web front-end for the user
• A Database server that stores local information, settings and so on
• A number of devices within the system.
o a temperature sensor
o a heating system
o a light sensor

All of the services are containerised in order to minimise platform dependency. For the purposes of this coursework you can assume that the underlying platform is secure unless the container itself is compromised. You will be given a separate container for each of the services and they will function in "virtual mode" while not on actual hardware.

You are also provided with a document describing the design of the infrastructure outside of the containers. You must include this in your assessment, but rather than look for vulnerabilities in the implementation for this part, you must assess the design decisions presented.

Attachment:- Security of Emerging Connected Systems.rar

Reference no: EM132499813

Questions Cloud

What is a generative moment : What is a generative moment? How do these occur in a coaching session? How does God use these types of moments in our own lives to change us?
What are the nominal and effective costs of trade credit : What are the nominal and effective costs of trade credit under the credit terms of 4/10, net 40? Assume a 365-day year. Do not round intermediate
Find the present value of the annual savings created : Blake Company, Find the present value of the annual savings created by this decision. Find the value added to the company by this procedure.
Shift the demand for labor : Give two examples of events/variables that could shift the demand for labor, and explain why they could shift it.
7026CEM Security of Emerging Connected Systems Assignment : 7026CEM Security of Emerging Connected Systems Assignment help and solution, Coventry University - assessment writing service
How you determined the duties and qualifications for the job : Explain how you determined the duties and qualifications for the job and which laws were considered when creating the job description.
Find what is internal rate of return of the project : $510,000 in year three, and $150,000 in year four. Zion's required rate of return is 10%. What is IRR (Internal Rate of Return) of this project?
Draw a correctly labeled graph showing grande : Draw a correctly labeled graph showing Grande's demand curve, average total cost curve, and marginal cost curve, and show the profit-aximizing quantity, labeled
Determine the factors that affect healthcare quality : Determine the factors that affect healthcare quality in healthcare organizations. Use technology and information resources to research issues in healthcare.

Reviews

Write a Review

Other Engineering Questions & Answers

  Advantages of using mobile computing technology

Analyze the advantages and disadvantages of using mobile computing technology to monitor patients. Assess the security concerns with regard to the transmission of personal medical information over wireless networks

  What is the expected error in the stage gain

In the quiescent state, what dc voltage must appear at the output of each of the error amplifiers? At what value of positive vO will QP be supplying all the load current? Repeat for negative vO and QN supplying all the load current.

  What is the uniform deterministic arrival rate

what is the uniform deterministic arrival rate if the vehicle queue is cleared 35 minutes after vehicles begin to arrive?

  An x-ray diffraction laboratory is analyzing the mineral

an x-ray diffraction laboratory is analyzing the mineral andalusite al2sio5. powder diffraction of andalusite is being

  The removal of eschar from burned skin

------------------is the removal of eschar from burned skin.  _____________ investigates the body's structure, whereas __________ investigates the processes or functions of living things.

  Conduct multiple linear regression analyses

IENG 314 - Semester Design Project - Phase 2 ALL-LineX Superior Energy Performance. Based on the results from part 1, conduct multiple linear regression analyse

  Coefficient of determination for a simple linear regression

What is the chi squared statistic for the given information?

  Draw gate networks for the five outputs

Develop a non-priority 10-to-4 encoder shown Non-priority - how many of each and the total generic gate count - draw the corresponding gate networks

  BC 16 English for Professional Development and Communication

BC 16 English for Professional Development and Communication Assignment help, MAJAN UNIVERSITY COLLEGE, Business Report - FACULTY OF BUSINESS MANAGEMENT

  Problems based on determination of laplace transformation

For the circuit shown below, find the input/output differential equation.

  Write the boolean expression for the given logic circuits

Write the Boolean expression for each of the logic circuits below. Which Boolean law is used to transform each of the following equations? Draw a logic circuit for circuit represented by each expression:

  Food nano technology and emulsion technology

Requires the completion of a written research paper on food nano technology and emulsion technology and this assignment requires students to interrogate and report a review on the topic with pictures figures and diagrms.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd