How can establishing stronger government policy

Assignment Help Computer Engineering
Reference no: EM132029790

Question: Write 200 word

My chosen topic for research is Data Security for devices connected to the Internet of Things (IoT) and how government regulation and policy can impact the security of IoT devices to protect personal data of the consumers and prevent cyberattack.

The problem statement for my research topic is: Network enabled devices on the IoT are not properly secured by the manufacturer to protect the personal data of the consumer or prevent cyberattack.

The purpose statement for my research is: With the increase of network connected devices making up the IoT, personal privacy and personal data protection and prevention of cyberattacks becomes harder and harder to achieve because there are weak or no regulation requiring industry to implement strong security standard on IoT devices.

The significance of this study it to achieve a better understanding of current IoT security standards and how government regulation and policy can improve security of these devices and privacy protection that will help to prevent consumer data loss and cyberattack? The number of devices on the IoT is growing at an extraordinary rate and most of the devices are not being deployed with strong security standards if any at all that will prevent data loss or cyberattack.Most devices are left vulnerable and the consumer is unaware of the security threat the IoT device presents.

The independent variables in my research are government regulation and policy and how it will affect my dependent variable which is IoT device security.Increased security of IoT devices should improve personal data protection and reduce cyberattack

Research Question: How does government regulation and policy mandating tighter security standards affect IoT device security to reduce personal data loss and prevent cyberattacks?

How can establishing stronger government policy on IoT device security reduce personal data loss and cyberattacks?

Reference no: EM132029790

Questions Cloud

What do the larval stages of fireflies eat : What do the larval stages of fireflies eat? How does that impact the environment?
Explain a little bit about your process : If you want to, explain a little bit about your process. What have you experienced so far in writing your paper?
Provide a line-by-line solution for the molecular speed : Provide a line-by-line solution for the molecular speed of each of the following five gases at 300K: CO, SF6, H2S, Cl2, HBr.
How many units must be sold to earn net income : If the unit sales price is $20, unit variable cost is $12, and total fixed costs are $500,000, how many units must be sold to earn net income of $300,000
How can establishing stronger government policy : How does government regulation and policy mandating tighter security standards affect IoT device security to reduce personal data loss and prevent cyberattacks?
How many units should you order : You have a one-time chance to purchase an item for $16. How many units should you order?
What is the percentage of light absorbed : For many UV-Vis instruments, beer's law starts to break down with absorbance (A) greater than 1. What is the percentage of light absorbed
The cost of equity capital for roadrunner bearing company : Roadrunner Bearing Company is an all-equity firm. what is the cost of equity capital for Roadrunner Bearing Company?
What were the causes and effects of the bacon rebellion : What were the reasons for the intensified warfare between Native Americans and settlers in New England in the late 1600s illustrated in the bloody King Philip's

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is time estimate

How does an estimator arrive at a time estimate for a particular task.

  What is the difference between a policy and a procedure

What is the difference between a policy and a procedure. How do regulations affect network policies

  Here the interface id remains set at the 48 bits normal for

discuss the advantages and disadvantages of constructing ipv6 addresses directly from ipv4 addresses by adding the 32

  Print the maturity amount after specified tenure

Print the maturity amount after specified tenure in the format - Provide an estimation of amount of time required to complete the project - identify two groups of people such that a person in one group must not be a friend to any other in the same g..

  What is the dissimilatries between rfp and rfq

What is the dissimilatries between an RFP and an RFQ? Are they different, or the same? How does RFI associated to them

  Describe the effect and list url of the resource on web page

Describe the effect and list the URL of the resource on the Web page. Place your name in an e-mail link on the Web page.

  Create a table that shows every time signals are converted

Create a table (or draw a figure) that shows every time data or signals are converted to a different form in this process.

  Derive the clock signals

Use two 74121s to derive the clock signals shown in Figure.

  Discuss security goals an enterprise may have

security goals an enterprise may have. Replies to an RFI provide details about a product offered for sale

  Describe the primary roles involved in jad sessions

Describe the primary roles involved in JAD sessions. What is the major contribution made by the person(s) fulfilling each role?

  Explaining the rsa

Using the RSA with p = 3, q = 11, e = 7: Explain the suitable value for d? Encode the message “cat” by encrypting each letter separately, i.e., by encrypting ASCII code of each letter.

  Determine which version of the software should be used

Microsoft has released Windows Server 2008. As with Windows 2003, there are several versions of the server software. What are these versions, and what are the criteria that determine which version of the software should be used

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd