Develop research and analytical skills

Assignment Help Management Information Sys
Reference no: EM131994831

Assignment Description

The purpose of this assignment is to develop research and analytical skills. In this assignment students will firstly learn how to develop knowledge based on the current state of the art emerging knowledge domains. They will critically analyse three of the current or future security issues in this area and their countermeasures. Internet of Things (IoT) is a network of ‘‘things''.

The term ‘‘thing'' here can constitute any smart device ranging from home appliances, telecommunication, sensor devices used in vehicles/ agricultural sector/homeland security to health monitoring devices inside of (or connected with) a human body.

In fact, any device that has the ability to collect and transfer data across the network can be a part of an IoT system. With the introduction of smart cities, smart homes, smart office and smart devices, the Internet of Things (IoT) is an emerging area of incredible potential of growth.

However, most of these IoT devices are at risk of being hacked and compromised. Internet of Things (IoT) still have many security issues that need to be solved (i.e, RFID tag security, cyber security, wireless security, network transmission security and privacy protection etc). In this assignment student will work on the security issues and its countermeasures in the area of IoT.

This assignment includes three parts.

1. Literature review of Internet of Things (IoT): Your review should be supported by at least three (3) academic (journal/conference) papers chosen from the current state of the art. The paper should not be older than four years. Your discussion should include:

i. Introduction to IoT

ii. Characteristics of IoT compared to the traditional network (please include the variety of devices that are used in IoT).

iii. Discuss three areas of applications for IoT.

2. Analyse critically, three current or future security issues in IoT and its countermeasures In this section you will

i. Explain and analyse critically three security issues in IoT.

ii. Explain the countermeasures/mitigation techniques and tools used for each of the security issues mentioned in section i. This section must be supported by at least three (3) references (good quality conference or journal paper such as IEEE/ACM/Springer).

3. Create a 3 - 5 minutes presentation and present your work during the Laboratory class. You have to create a 3 - 5 minutes presentation to present your work in front of your class members and tutor during the Laboratory class in Weeks 11 and 12.

Submission Guidelines

The assignment should be submitted on the Moodle in two separate files:

1. The report should be submitted as a Word file.

2. The presentation should be submitted as a PPT file.

Marking criteria:

Section to be included in the report

1. Introduction : Introduction of IoT. Introduction should also contain what this report covers and any background information that is needed for marker to understand the report.

2. Literature Review: Literature review of IoT.

3. Security Threats: Analyse critically, three security threats of IoT.

4. Threat Mitigation Techniques and tools: Discuss the threat mitigation techniques and tools used for each one of the security vulnerabilities mentioned in the report.

5. Report Layout : The report layout should be appropriate (following the submission guidelines and containing all the sections mentioned above).

6. Reference style: Follow IEEE reference style.

7. Presentation Slides: The presentation slides should be well organised and clear. Oral Presentation Delivery of the presentation (which includes quality of the presentation, depth of knowledge on the material presented and ability to answer questions asked by the audience)

Reference no: EM131994831

Questions Cloud

Proportion of males and females : Is there evidence of a significant difference between the proportion of males and females who say they buy clothing from their mobile devices
Explain the concepts around your specific issue : Discuss how the theory has been used in at least 5 recent peer-reviewed journal articles in your area of interest (i.e. Software Development)
Computing the present value of growth opportunities : The market consensus is that Analog Electronic Corporation has an ROE = 11%, has a beta of 1.50, and plans to maintain indefinitely its traditional plowback.
There enough evidence to support the claim : A professor claims that the average of scores obtained by Mathematics majors is close to the average of scores obtained by the Computer Science majors
Develop research and analytical skills : MN502 :The purpose of this assignment is to develop research & analytical skills.In this assignment students will firstly learn how to develop knowledge based.
Construct the cie interval : Suppose no claim was made but the researcher is thinking of making a claim using a 95% two-sided confidence interval. Using the same data
What is the marketing or sales control activity : What is the marketing or sales control activity? How is it done? Please write at least one page word document. And mention the sources or references if used.
Address the security issues of rare vintage auto parts ltd : CSG 5308 - Wireless Security Assignment. Address the security issues of Rare Vintage Auto Parts Ltd who are not security or IT experts
What can innovative idea do you have : What can innovative idea do you have that Yasa could do to expand its markets and even create new markets in iran and could sell new kinds of jewelry.

Reviews

Write a Review

Management Information Sys Questions & Answers

  The importance of organizational testing methodologies

The Importance of Organizational Testing Methodologies - This solution describes the importance of testing in organizations.

  Coordination cooperation and collaborationcan you help me

coordination cooperation and collaborationcan you help me get started on this

  Explain role of information technology in creating dilemma

Describe the role of information technology in creating this ethical dilemma. Do you think the NSA should be allowed to continue its electronic surveillance programs? Why or why not?

  How freedom of expression and intellectual property rights

Discuss how freedom of expression and intellectual property rights might ethically conflict.

  What impact if any does outsourcing all of the it operations

A large US organization--a leader in its field--decided to outsource almost all of its IT operations to gain more agility.

  Which regulation you would associate with that organization

Briefly describe the organization that you chose. which regulation you would associate with that organization. Explain purpose of regulation for that business.

  What skills should a cio possess

Do you feel that the organizations WALMART Canada, take the function of information management seriously?

  Problem related to the software products

Consider at least two (2) software products that you use or have used in the past. Provide at least two (2) examples in which ease of learning conflicted.

  Phases of the smp and sisp processes

discuss the key similarities and differences in comparing the first three phases of the SMP and SISP processes.

  Give the pseudocode and flowchart

Give the pseudocode and flowchart that would show how one of the additional data structures could be implemented to search data.

  Cultural differences introduce challenges

From the e-Activity, examine the two articles you selected on universal usability and discuss one topic of interest that was addressed.

  Discuss about the e-business and e-commerce

Determine the fundamental business advantages and disadvantages of e-business and e-commerce across the business organization. Next, select one (1) out of the five (5) key challenges faced by online retail businesses in the business-to-consumer (B..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd