Analyse three current or future security issues in iot

Assignment Help Computer Network Security
Reference no: EM131663714

Assignment: Security Challenges in Emerging Networks

Purpose

The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:

a. Identify and report network threats, select and implement appropriate countermeasures for network security

b. Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization

c. Demonstrate professional and ethical behaviour with regard to network security.

Word limit: 1500 - 2000words.

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Internet of Things (IoT) is an emerging area in computer networking. Internet of Things could refer to a network of devices with embedded technology including Sensors, Radio Frequency Identification tags, actuators, with the ability to continuously sense and exchange data to perform a range of tasks.The IoT will have a major impact on aspects of everyday-lives and behaviour of users. Security of Internet of Things is a prime concern.

The assignment should be written in IEEE conference format.

(if not working google the formate)

NOTE- YOU MUST READ 4 IEEE PAPER AND PROVIDE REFERANCE OF IT

This assignment includes four parts

1. Literature review on Internet of Things (IoT)

You need to write 800 word literature on IoT. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

2. Analyse critically, three current or future security issues in IoT.

In this section you will analyse critically, three security issues in Internet of Things. These issues could be taken from the current state of the art or could be evolved from your own independent innovative thinking. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section(2).

In this part you need to apply knowledge to the existing knowledge domain of IoT. You need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11.

Submission Guidelines

The assignment should be submitted on the Moodle in two separate files:

1. The report should be submitted as a Word file
2. The presentation should be submitted as a PPT file.

Reference no: EM131663714

Questions Cloud

Discuss in detail the outcomes of job satisfaction : Discuss in detail the outcomes of job satisfaction and how an organization ensure that these outcomes can occur. Is it possible in all industries
Would you recommend that your parents : Would you recommend that your parents (as examples) get a certificate that they could use to send e-mail?
Servant leadership theory influence followers : How does your servant leadership theory influence followers?
Depending upon the goal or purpose of the organization : The technology needs of a business vary depending upon the goal or purpose of the organization.
Analyse three current or future security issues in iot : Analyse critically, three current or future security issues in IoT. Propose a possible solution for one of the threats identified in section(2).
Strengths-weaknesses of analytic and nonanalytic forecasting : Compare and contrast the major strengths and weaknesses of analytic and nonanalytic forecasting.
Calculate megaphone corporation breakeven revenues : Joshua Kirby, Megaphone's president, is very concerned about Megaphone Corporation's poor profitability. He asks Leroy Gibbs, production manager.
What is the largest possible value for n : Each process will need three drives. What is the largest possible value for n, and the system still remain deadlock free? Please show how you got to the answer
Overall security of the network in jeopardy : Why does the use of passwords put the overall security of the network in jeopardy?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Research the issue of social engineering

Research the issue of social engineering in the context of cyber security and report your findings, including what the problem is, types of social engineering techniques, existing and potential protection mechanism and future trends.

  Discretionary and mandatory access control

Logic bombs, War dialing, Ping of death attack, steganography, RSA scheme, digital signature, A chain of certificates, A certificate revocation list, A trust anchor, asymmetric algorithm used by PGP, IPSec mode, IP virtual Private Networks

  Prepare a research paper written on computer security

You need to prepare a research paper written on computer security.

  What rc4 key value will completely invert s

What RC4 key value will completely invert S after the initial permutation (so that S[0] = 255, S[1] = 254, ..., S[254] = 1, S[255] = 0)?  Show your work. (Explain how you got this.)

  Define the mission statement for your business

Define the mission statement for your business. Develop a technology architecture plan. The datacenter has five servers. Each server hosts different services: HTTPS, DNS, Secure File Sharing, Email, and Collaboration Software.

  Define the term security

Define the term security and list (and discuss in detail) the five main security measures.Give some data in healthcare management

  Describe how use of equipment software and multiplexing

write a 4-7 page paper including the followingmiddot analyze the current options available for use of tcpip and

  Decrypt message using caesar rot-three substitution cipher

Decrypt the message "F R Q J U D W X O D W L R Q V B R X J R W L W" using the Caesar ROT3 substitution cipher.

  Identify the types of network components devices and

define the requirements and then design an appropriate network that would support this dental practice. your answer

  Describe the integrative functions

Describe the various integrative functions and processes within the information systems area, including databases, systems analysis, security, networking, computer infrastructure, human computer interaction, and Web design.

  Describe real-world examples that help support your position

Prepare your paper in Word format and submit it through your Assignments Folder. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

  What would you do to practice the new skills and why

If you were Doug in the case above, what would you do to practice the new skills, and why? Any current topic or article related to penetration techniques.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd