Analyze three current or future security issues in iot

Assignment Help Computer Network Security
Reference no: EM131660957 , Length: Words = 1700

Assignment: Overview of Network Security

Purpose

The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:

a. Identify and report network threats, select and implement appropriate countermeasures for network security

b. Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization

c. Demonstrate professional and ethical behaviour with regard to network security.

Length: 1500 - 2000 Words.

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Internet of Things (IoT) is an emerging area in computer networking. Internet of Things could refer to a network of devices with embedded technology including Sensors, Radio Frequency Identification tags, actuators, with the ability to continuously sense and exchange data to perform a range of tasks.The IoT will have a major impact on aspects of everyday-lives and behaviour of users. Security of Internet of Things is a prime concern.

The assignment should be written in IEEE conference format.

This assignment includes four parts

1. Literature review on Internet of Things (IoT)

You need to write 800 word literature on IoT. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

2. Analyse critically, three current or future security issues in IoT.

In this section you will analyse critically, three security issues in Internet of Things. These issues could be taken from the current state of the art or could be evolved from your own independent innovative thinking. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section(2).

In this part you need to apply knowledge to the existing knowledge domain of IoT. You need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11.

Submission Guidelines

The assignment should be submitted on the Moodle in two separate files:

1. The report should be submitted as a Word file
2. The presentation should be submitted as a PPT file.

Verified Expert

The work is in 1700 words in IEEE format in MS word and PPT where the focus is on handling the IoT and handle the measures which includes the different issues related to the working of the system, security and the privacy measures. this IoT also works with the enhancement of the system level and the practices.

Reference no: EM131660957

Questions Cloud

Explain the effects of computerized warning systems : Explain the effects of computerized warning systems, electronic systems, and e-prescribing on medication and reconciliation errors
Explain the state income tax issues for telecommuters : Explain when state sales tax is imposed for online transactions. Describe the income tax responsibility for online sellers.
Identify a health policy issue : Describe the current policy and what needs to change, justify your conclusions with citations from the literature
Find the equilibrium profits : Does the demand for firm 2's product satisfy the law of demand - What is the equation of firm 1s best-response function and Find the equilibrium profits
Analyze three current or future security issues in iot : Analyze critically three current or future security issues in IoT. Demonstrate professional and ethical behaviour with regard to network security.
Pick an article issue : Pick an article issue. The article presentation should be concomitant to a particular topic open to varying opinions, debate, and argument.
Describe the it controls for information security : Describe the IT controls the company needs to set up for information security in order to prevent a similar breach in the future.
Define the client for which symptoms of red man syndrome : The nurse, administering an infusion of vancomycin, will observe the client for which symptoms of red man syndrome
The value of planning the risk management approach : Reflect upon the value of planning the risk management approach. Identify two to three challenges faced in doing project work.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Identifies areas of concern based on your review of network

Create a 2-page Excel spreadsheet that identifies areas of concern based on your review of the network along with a proposed solution.

  Research network security solution providers

Research network security solution providers such as Cisco, Barracuda, etc. If you had to recommend one provider for your company, which provider would it be

  Discuss the major categories of information security control

Define and discuss the major categories of information security controls

  Prepare analysis of the interconnectedness of cybersecurity

Prepare a paper highlighting the threat that China poses to the United States as regards Cyberwar and theft of Intellectual Property (IP). The student should identify the key issues and recommend an effective strategy for US policy makers.

  Identify 3 different computer crimes that you are aware

computer crime has become a serious matter for your discussion board post consider the following do you think computer

  Ow does smart grid concept impact cybersecurity discussion

What do you think are the current issues facing our power grids to defend against attacks? And, how does the Smart Grid concept impact the cybersecurity discussion?

  Basic function / purpose of a firewall

What is the basic function / purpose of a firewall? What are some different firewall implementations (stateful inspection, dual-homed, etc) and how might an organization use firewalls

  Federal government regulates labels

The federal government regulates labels, warranties, and consumer products. Without government regulation, what abuses are likely to occur?

  How many keys are there in this compound cipher

An affine cipher can be combined with a Vigenère cipher by fixing a but using k different values of b and cycling through these b values, letter by letter. How many keys are there in this compound cipher?

  What are some of the tests performed to ensure the fault

How would you determine the level of fault tolerance needed for a particular business operational function?

  How will ad organizational units be organized

How will the second site factor into domain controller placement? How will AD sites be configured and how will AD organizational units be organized

  Write a one-page paper recommending the csirt concept

Write a one-page paper recommending the CSIRT concept to the President of Wilmington University. Ensure you discuss the need for a CSIRT team, CSIRT response and benefit of having a CSIRT team.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd