Identify and report network threats

Assignment Help Computer Networking
Reference no: EM131657037

Assessment - Security Challenges in Emerging Networks

Purpose of the assessment

The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:

Identify and report network threats, select and implement appropriate countermeasures for network security

Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization

Demonstrate professional and ethical behaviour with regard to network security.

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this

emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Internet of Things (IoT) is an emerging area in computer networking. Internet of Things could refer to a network of devices with embedded technology including Sensors, Radio Frequency Identification tags, actuators, with the ability to continuously sense and exchange data to perform a range of tasks.The IoT will have a major impact on aspects of everyday-lives and behaviour of users. Security of Internet of Things is a prime concern.

The assignment should be written in IEEE conference format

This assignment includes four parts

1. Literature review on Internet of Things (IoT)

You need to write 800 word literature on IoT. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

2. Analyse critically,three current or future security issues in IoT.

In this section you will analyse critically, three security issues in Internet of Things. These issues could be taken from the current state of the art or could be evolved from your own independent innovative thinking. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section(2).

In this part you need to apply knowledge to the existing knowledge domain of IoT. You need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work in front of your class.

Verified Expert

In this assignment Literature review of Internet of Things and literature review is supported by journal articles. Second part of this assignment I include critical analysis of three security issues in Internet of Things. Third part of assignment includes possible solution for one of IT security threat. After that PPT is also prepared for work.

Reference no: EM131657037

Questions Cloud

Java collections sort differ in the time : How do selection, insertion, and the Java Collections sort differ in the time required to sort data ranging from 10,000 elements to 250,000 elements.
Pieces of legislation that apply to managing human resources : Identify five key pieces of legislation that apply to managing human resources.
Define a class representing an inflatable balloon : Define a class representing an inflatable balloon. Balloon should have a method inflate( ) (which can be called many times) and a maximum inflation pressure.
Explain the guidelines for ethical decision making : Using the Guidelines for Ethical Decision Making, what do you want to know before you decide whether you will support the decision of the CEO?
Identify and report network threats : MN502 - Overview of Network Security - Security Challenges in Emerging Networks - Identify and report network threats, select and implement countermeasures
How relatively effective are feminist practice methods : How relatively effective are feminist practice methods versus more traditional/standard methods such as cognitive-behavioral ones?
What is the average salary of an american ceo : What is the average salary of an American CEO? (US Publically Traded Companies). How many more time times is the average pay of a CEO vs. an average worker?
What would you do as a seagold director in given case : You are a director of Sea Gold Canning Company. Sea Gold's business is canning tuna and salmon for sale to consumers. Its annual revenue is $575,000,000.
Facility vulnerability and countermeasures : For this assignment, please choose a facility (business, school, government, etc.) and then analyze and explain the following:

Reviews

inf1657037

12/26/2017 5:28:28 AM

Highly recommend they went out of their way to get this assignment done. I have used their service once before and again, I am fully satisfied by their outstanding work

len1657037

9/25/2017 4:43:16 AM

Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors Presentation slides /4 Well organised and resourceful Organised and resourceful Resourceful but could be better organised Resourceful slides Neither resourceful nor well organised Oral Presentation /4 Good delivery, easy to follow and good interaction Delivered, easy to follow and provided a level of interaction Delivered and provided a level of interaction Delivered No oral presentation

len1657037

9/25/2017 4:42:53 AM

Analyse Critically /6 Exceptional discussion on security vulnerabilities for the system. Identifying highly sophisticated and well referenced vulnerabilities Exceptional discussion on security vulnerabilities for the system. Discussion on three security vulnerabilities Discussion on Two security vulnerabilities Unable to identify security vulnerabilities Propose a possible solution /6 Advance discussion on threats mitigation using latest technologies and procedures Good discussion on threats mitigation using technologies and procedures Good discussion on threats and mitigation Discussion on threats and mitigation Lacking discussion on threats and mitigation Report Layout /5 Well designed layout and proper formatting in IEEE Conference Style Well designed layout in IEEE Conference style Layout in IEEE Conference style Report layout and formatted but not in IEEE Conference style Report lacks a proper layout

len1657037

9/25/2017 4:42:40 AM

Marking Rubric for Assignment #2: Total Marks 50 Grade Mark HD 40-50 DI 35-39 CR 30-34 P 25-29 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Literature Review /15 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available

len1657037

9/25/2017 4:42:27 AM

Marking criteria: Section to be included in the report Description of the section Marks Introduction Introduction of Internet of Things 5 Literature Review Literature review of Internet of Things 15 Analyse critically Analyse critically, three security vulnerabilities of Internet of Things. 6 Propose a possible solution Discuss a threat mitigation technique for one of the security vulnerability 6 Report Layout The report should be written in IEEE conference format 5 Reference style Follow IEEE reference style 5 Presentation Slides The presentation slides should be well organised and clear. 4 Oral Presentation Delivery of the presentation 4 Total 50

len1657037

9/25/2017 4:42:16 AM

its my final assignment pls make sure that there is no plagirism.thankyou - • All work must be submitted on Moodle by the due date along with a title Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  Research and discuss packet-switched networks

Research and discuss packet-switched networks

  Draw overall network diagram based on the above description

Draw overall network diagram based on the above description. Your diagram must include layouts that include all the necessary interconnection devices that connect servers, laptops, and PCs.

  What is esf

What is the data rate of a DS-3 line? What is the data rate of a T1 line?

  Write a description of the path a packet

Write a description of the path a packet takes across the Internet from destination A to destination B. What types of network devices does the packet pass through?

  Compare the unshielded twisted pair and coaxial cable

Compare and contrast cat. 6 unshielded twisted pair (UTP), coaxial, and single mode fiber optic cabling types. Describe one or two of the advantages and/or disadvantages associated with using each cable type for a business's network infrastructure..

  Why is it important to know how to check your bandwidth

Test your current bandwidth and write down the results

  Subnets diagram working lan depicting network subnets

Subnet classful Class C network into 2 subnets Diagram working LAN depicting two network subnets (can be in Word of Visio) Network should include

  Implement the skills and knowledge

To implement the skills and knowledge gained through the course and to achieve greater awareness of the ways in which networks are used by organisations.

  1 this question relates to section 2 genetic algorithma

1. this question relates to section 2 genetic algorithma heredna -gt channel assigned to a wireless linkindividual -gt

  Discuss about the packet switched wan protocols

WAN Technologies Paper:Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies associated with the protocol. Include t..

  Create a diagram of dsl and cable modem connections to isp

Create a diagram of DSL and Cable Modem connections to your ISP, and telecom to your home router using Visio or its open source alternative software.

  Use discrete event simulation approach

Use discrete event simulation approach I introduced in class to simulate the traditional "machine-repairman" closed queuing network.Please check "examples" lecture notes (lecture 13) Page 2-5 for the machine-repairman problem description.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd