Design and implement secure private networks

Assignment Help Computer Network Security
Reference no: EM133128139 , Length: word count:2500

7026CEM Security of Emerging Connected Systems - Coventry University

Coursework - IoT systems design and security evaluation according to OWASP lists

Learning Outcome 1: Propose and implement effective 'defence-in-depth' solutions to mitigate the key technical internet security vulnerabilities that organisations face.

Learning Outcome 2: Design and implement secure private networks for IoT and Bring Your Own Device (BYOD).

Learning Outcome 3: Discuss and debate a wide range of current research and technological advances in network security.

Task

Introduction

You are given access to an IoT environment, representing a home owned by early adopters in the current move to "smart homes". The devices are all from a single manufacturer and you are required to evaluate the security aspects of the system before marketing and sale of the devices.

You will be given access to a testbed network to perform a practical security audit as well as associated documentation for review.

Task Breakdown
1. A security evaluation report on the test-bed system. This is a "white-box" analysis, so you should execute it as a security review rather than penetration test. You can examine any of the files and materials you are given, but any security vulnerability should be demonstrated with a proof-of-concept (PoC) attack that would work without the information gained through white-box testing. Make sure you consider more than just direct attacks on the devices. Also consider what information is exposed about the consumer.
2. A report to the manufacturer on your findings that includes a short review of each problem, along with a brief overview of how it could be solved. For each issue, you should have a more detailed description of the steps you took to discover it, showing enough detail for it to be repeated by the developers.
3. For each vulnerability and security issue, you have to analyse it according to the OWASP® Foundation security topics; the top 10 risks and vulnerabilities, 2014 and 2018.
4. You have to research and report on each possible security issue and give:
The OWASP category each security issue belongs to.
A technical explanation describing of why and how the issue does belong to that category, e.g.:
Programming/application analysis security issue.
Networking security analysis issue.
Or any other field that the issue might relate to.
An alternative technical solution to prevent the issue or issues.

Scope

• You will be given a collection of docker build scripts and Makefiles.
• Although you have access to the non-live versions of the systems, their Dockerfiles, Makefiles and so on, this does not count as a vulnerability. This is just the mechanism by which you gain access to the virtualised IoT environment.

o You can, however, examine all of these files to see if there might be vulnerabilities or security flaws you can demonstrate in the running system.
o This is the equivalent of having the source code for the IoT systems and being able to review the code, making this a "white box" test.

The system

The system is comprised of:
• An MQTT server that coordinates internal messaging and provides a web front-end for the user
• A Database server that stores local information, settings and so on
• A number of devices within the system.
o a temperature sensor
o a heating system
o a light sensor

All of the services are containerised in order to minimise platform dependency. For the purposes of this coursework, you can assume that the underlying platform is secure unless the container itself is compromised. You will be given a separate container for each of the services, and they will function in "virtual mode" while not on actual hardware.

You are also provided with a document describing the design of the infrastructure outside of the containers. You must include this in your assessment, but rather than look for vulnerabilities in the implementation for this part, you must assess the design decisions presented.

Attachment:- IoT systems design and security.rar

Reference no: EM133128139

Questions Cloud

Outline the talent management program : Outline the talent management program that led to success for the company. Identify the strengths of the program and how they led to goal accomplishment.
What are the four major steps on the growth diamond : 1) What are the four major steps on the growth diamond? 2) According to the quantity theory of money, how would a decrease in velocity affect AD?
Challenges to growth : Determine the stage of organizational growth that is most challenging.
What does gdp measures : 1a. What does GDP measures and is it a good method of measurement? 1b. Is there a difference between GDP and GNP? if yes, what is the main difference?
Design and implement secure private networks : Design and implement secure private networks for IoT and Bring Your Own Device and Discuss and debate a wide range of current research and technological advance
Determine the issuance price of the bonds : National Motors Corporation is planning to issue bonds with a face value of $260,000 and a coupon rate of 4 percent. Determine the issuance price of the bonds
Utility functions for insurance plan : Suppose individuals have different health levels H, where H is distributed uniformly between 0 and 9. The marginal cost of medical care depends on an individual
Discuss the laws and the legal background : Discuss the laws and the legal background, areas, implication, and consequences related to the security issues that have been found in domus system
Statistics canada cansim database : Obtain data on annual inflation (annual CPI), using the Statistics Canada CANSIM database (Excel File must be submitted).

Reviews

Write a Review

Computer Network Security Questions & Answers

  What the risks and issues associated with backing up data

What are the risks and issues associated with backing up data to the cloud? How should Webb's protect access to these services that they are now moving to Cloud

  Which is the protocol used by the internet

EZBiz, the brainchild of three college friends, is a startup venture which plans to produce and market sports gear. They are currently trying to decide between a bricks-and-clicks strategy and a click-only strategy. Which of the following, if true..

  Describe the steps necessary to restore operations

A disgruntled employee takes a critical server home, sneaking it out afterhours. For each of the scenarios (a-e), describe the steps necessary to restore operations. Indicate whether law enforcement would be involved.

  ITECH1102 Content Analysis Assignment Problem

ITECH1102 Networking and Security Assessment Help and Solution - Content Analysis Assignment - Federation University - Explain principles of communication

  What advice do you have for the project manager

How likely does it seem that Pete will achieve his desired goals of being on time and within budget if nothing is done?

  Which tenets of cybersecurity were violated in the breach

Which tenets of cybersecurity were violated in the breach? How were those attacks executed to bypass network defenses?

  Implement client-server application to emulates ping utility

The goal of this assignment is to implement a client-server application which emulates the ping utility. It is also good practice because it implements the client-server architecture.

  Research network security solution providers

Research network security solution providers such as Cisco, Barracuda, etc. If you had to recommend one provider for your company, which provider would it be

  Develop a wlan plan for acme graphic design

Develop a WLAN plan for Acme Graphic Design based on a chosen Blueprint and security to the owner. The description of the network plan for your blueprint.

  Propose a local area network

Propose a local area network (LAN) and a wide area network (WAN) for the organization, define the systems environment, and incorporate this information

  What is cybersquatting

What is cybersquatting? (Chapter 4 MIS2) What does spoofing a website mean? (Class or online) What can a business do to prevent this from happening to it? Short answer (1 -2 paragraphs)

  Identify url of the website and your assigned business model

Identify the URL of the website and your assigned business model/category in the first part of the report. Describe the website structure and the purpose of each element (include snapshots and diagrams where appropriate).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd