Reference no: EM132959696
ITECH3100 Mobile and Cloud Security
Assignment - System Discovery
Overview
For this assessment task, you will create a written technical report to explore one smart/automation system that has been applied to an industry or field.
The purpose of this assignment is for you to develop your big-picture thinking, and to explore various impacts of the ever-changing IT industry.
Learning Outcome 1: Critically evaluate various types of trust in mobile cloud computing.
Learning Outcome 2: Distinguish different levels of security for mobile cloud computing.
Learning Outcome 3: Audit different security threats involved in mobile cloud.
Learning Outcome 4: Investigate current security issues and challenges in relation to mobile cloud computing.
Learning Outcome 5: Communicate professionally to list security policies for mobile cloud computing.
Assessment Details
1. Search literature and real-world applications in your life environment, get to know one category of smart systems that have been applied in one of the following areas:
a. Smart Home and Furniture
b. Smart Care for Older People
c. Smart Logistics and Retail
d. Smart Agriculture
e. Smart Environment and Ecosystems
f. Smart Medicine and Healthcare
g. Smart Roads and Transportation
2. Discover via Step 1, one specific smart system/device of your interest. Note that the chosen system/device must include mobile and/or cloud components.
The following gives a list of example systems, on which a collection of literatures has been provided on Moodle as the references for your Assignment 1 work.
1) Wearable Sensor for Human Activities Monitoring
2) Body Area Network
3) IoT Health Monitoring System
4) Agriculture Product Traceability System
5) 5G Application System
6) Smart Home Robot
3. Conduct system discovery (on the system from the viewpoint of system function, architecture, access control, and communication, respectively, and prepare a technical report in the following structure
1. Introduction (new functions and applications in Industry).
2. Review of how cyber-attacks happened to the smart system
2. System Architecture (components, Internal and external connections, and key technologies)
4. Vulnerability Analysis and Countermeasure (space for Assignment 2)
5. Related works and summary (similar systems comparison)
Students can include diagrams and tables to present your information in the report. Report should be maximum 3 pages and should include title, abstract, and reference.
Technical report should be formatted in the ACM proceedings format.
We recommend using the LaTeX Collaborative Authoring Tool on Overleaf Platform included on the above page that is particularly convenient for group projects.
Attachment:- System Discovery.rar