Develop research and analytical skills

Assignment Help Management Information Sys
Reference no: EM131994831

Assignment Description

The purpose of this assignment is to develop research and analytical skills. In this assignment students will firstly learn how to develop knowledge based on the current state of the art emerging knowledge domains. They will critically analyse three of the current or future security issues in this area and their countermeasures. Internet of Things (IoT) is a network of ‘‘things''.

The term ‘‘thing'' here can constitute any smart device ranging from home appliances, telecommunication, sensor devices used in vehicles/ agricultural sector/homeland security to health monitoring devices inside of (or connected with) a human body.

In fact, any device that has the ability to collect and transfer data across the network can be a part of an IoT system. With the introduction of smart cities, smart homes, smart office and smart devices, the Internet of Things (IoT) is an emerging area of incredible potential of growth.

However, most of these IoT devices are at risk of being hacked and compromised. Internet of Things (IoT) still have many security issues that need to be solved (i.e, RFID tag security, cyber security, wireless security, network transmission security and privacy protection etc). In this assignment student will work on the security issues and its countermeasures in the area of IoT.

This assignment includes three parts.

1. Literature review of Internet of Things (IoT): Your review should be supported by at least three (3) academic (journal/conference) papers chosen from the current state of the art. The paper should not be older than four years. Your discussion should include:

i. Introduction to IoT

ii. Characteristics of IoT compared to the traditional network (please include the variety of devices that are used in IoT).

iii. Discuss three areas of applications for IoT.

2. Analyse critically, three current or future security issues in IoT and its countermeasures In this section you will

i. Explain and analyse critically three security issues in IoT.

ii. Explain the countermeasures/mitigation techniques and tools used for each of the security issues mentioned in section i. This section must be supported by at least three (3) references (good quality conference or journal paper such as IEEE/ACM/Springer).

3. Create a 3 - 5 minutes presentation and present your work during the Laboratory class. You have to create a 3 - 5 minutes presentation to present your work in front of your class members and tutor during the Laboratory class in Weeks 11 and 12.

Submission Guidelines

The assignment should be submitted on the Moodle in two separate files:

1. The report should be submitted as a Word file.

2. The presentation should be submitted as a PPT file.

Marking criteria:

Section to be included in the report

1. Introduction : Introduction of IoT. Introduction should also contain what this report covers and any background information that is needed for marker to understand the report.

2. Literature Review: Literature review of IoT.

3. Security Threats: Analyse critically, three security threats of IoT.

4. Threat Mitigation Techniques and tools: Discuss the threat mitigation techniques and tools used for each one of the security vulnerabilities mentioned in the report.

5. Report Layout : The report layout should be appropriate (following the submission guidelines and containing all the sections mentioned above).

6. Reference style: Follow IEEE reference style.

7. Presentation Slides: The presentation slides should be well organised and clear. Oral Presentation Delivery of the presentation (which includes quality of the presentation, depth of knowledge on the material presented and ability to answer questions asked by the audience)

Reference no: EM131994831

Questions Cloud

Proportion of males and females : Is there evidence of a significant difference between the proportion of males and females who say they buy clothing from their mobile devices
Explain the concepts around your specific issue : Discuss how the theory has been used in at least 5 recent peer-reviewed journal articles in your area of interest (i.e. Software Development)
Computing the present value of growth opportunities : The market consensus is that Analog Electronic Corporation has an ROE = 11%, has a beta of 1.50, and plans to maintain indefinitely its traditional plowback.
There enough evidence to support the claim : A professor claims that the average of scores obtained by Mathematics majors is close to the average of scores obtained by the Computer Science majors
Develop research and analytical skills : MN502 :The purpose of this assignment is to develop research & analytical skills.In this assignment students will firstly learn how to develop knowledge based.
Construct the cie interval : Suppose no claim was made but the researcher is thinking of making a claim using a 95% two-sided confidence interval. Using the same data
What is the marketing or sales control activity : What is the marketing or sales control activity? How is it done? Please write at least one page word document. And mention the sources or references if used.
Address the security issues of rare vintage auto parts ltd : CSG 5308 - Wireless Security Assignment. Address the security issues of Rare Vintage Auto Parts Ltd who are not security or IT experts
What can innovative idea do you have : What can innovative idea do you have that Yasa could do to expand its markets and even create new markets in iran and could sell new kinds of jewelry.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd