How can establishing stronger government policy

Assignment Help Computer Engineering
Reference no: EM132029790

Question: Write 200 word

My chosen topic for research is Data Security for devices connected to the Internet of Things (IoT) and how government regulation and policy can impact the security of IoT devices to protect personal data of the consumers and prevent cyberattack.

The problem statement for my research topic is: Network enabled devices on the IoT are not properly secured by the manufacturer to protect the personal data of the consumer or prevent cyberattack.

The purpose statement for my research is: With the increase of network connected devices making up the IoT, personal privacy and personal data protection and prevention of cyberattacks becomes harder and harder to achieve because there are weak or no regulation requiring industry to implement strong security standard on IoT devices.

The significance of this study it to achieve a better understanding of current IoT security standards and how government regulation and policy can improve security of these devices and privacy protection that will help to prevent consumer data loss and cyberattack? The number of devices on the IoT is growing at an extraordinary rate and most of the devices are not being deployed with strong security standards if any at all that will prevent data loss or cyberattack.Most devices are left vulnerable and the consumer is unaware of the security threat the IoT device presents.

The independent variables in my research are government regulation and policy and how it will affect my dependent variable which is IoT device security.Increased security of IoT devices should improve personal data protection and reduce cyberattack

Research Question: How does government regulation and policy mandating tighter security standards affect IoT device security to reduce personal data loss and prevent cyberattacks?

How can establishing stronger government policy on IoT device security reduce personal data loss and cyberattacks?

Reference no: EM132029790

Questions Cloud

What do the larval stages of fireflies eat : What do the larval stages of fireflies eat? How does that impact the environment?
Explain a little bit about your process : If you want to, explain a little bit about your process. What have you experienced so far in writing your paper?
Provide a line-by-line solution for the molecular speed : Provide a line-by-line solution for the molecular speed of each of the following five gases at 300K: CO, SF6, H2S, Cl2, HBr.
How many units must be sold to earn net income : If the unit sales price is $20, unit variable cost is $12, and total fixed costs are $500,000, how many units must be sold to earn net income of $300,000
How can establishing stronger government policy : How does government regulation and policy mandating tighter security standards affect IoT device security to reduce personal data loss and prevent cyberattacks?
How many units should you order : You have a one-time chance to purchase an item for $16. How many units should you order?
What is the percentage of light absorbed : For many UV-Vis instruments, beer's law starts to break down with absorbance (A) greater than 1. What is the percentage of light absorbed
The cost of equity capital for roadrunner bearing company : Roadrunner Bearing Company is an all-equity firm. what is the cost of equity capital for Roadrunner Bearing Company?
What were the causes and effects of the bacon rebellion : What were the reasons for the intensified warfare between Native Americans and settlers in New England in the late 1600s illustrated in the bloody King Philip's

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd