Reference no: EM131657037
Assessment - Security Challenges in Emerging Networks
Purpose of the assessment
The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:
Identify and report network threats, select and implement appropriate countermeasures for network security
Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization
Demonstrate professional and ethical behaviour with regard to network security.
Assignment Description
The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this
emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.
Internet of Things (IoT) is an emerging area in computer networking. Internet of Things could refer to a network of devices with embedded technology including Sensors, Radio Frequency Identification tags, actuators, with the ability to continuously sense and exchange data to perform a range of tasks.The IoT will have a major impact on aspects of everyday-lives and behaviour of users. Security of Internet of Things is a prime concern.
The assignment should be written in IEEE conference format
This assignment includes four parts
1. Literature review on Internet of Things (IoT)
You need to write 800 word literature on IoT. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.
2. Analyse critically,three current or future security issues in IoT.
In this section you will analyse critically, three security issues in Internet of Things. These issues could be taken from the current state of the art or could be evolved from your own independent innovative thinking. This section must be supported by at least three (3) references.
3. Propose a possible solution for one of the threats identified in section(2).
In this part you need to apply knowledge to the existing knowledge domain of IoT. You need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue.
4. Create a 3 - 5 minutes presentation and present your work during the Lab.
You have to create a 3 - 5 minutes presentation to present your work in front of your class.
Java collections sort differ in the time
: How do selection, insertion, and the Java Collections sort differ in the time required to sort data ranging from 10,000 elements to 250,000 elements.
|
Pieces of legislation that apply to managing human resources
: Identify five key pieces of legislation that apply to managing human resources.
|
Define a class representing an inflatable balloon
: Define a class representing an inflatable balloon. Balloon should have a method inflate( ) (which can be called many times) and a maximum inflation pressure.
|
Explain the guidelines for ethical decision making
: Using the Guidelines for Ethical Decision Making, what do you want to know before you decide whether you will support the decision of the CEO?
|
Identify and report network threats
: MN502 - Overview of Network Security - Security Challenges in Emerging Networks - Identify and report network threats, select and implement countermeasures
|
How relatively effective are feminist practice methods
: How relatively effective are feminist practice methods versus more traditional/standard methods such as cognitive-behavioral ones?
|
What is the average salary of an american ceo
: What is the average salary of an American CEO? (US Publically Traded Companies). How many more time times is the average pay of a CEO vs. an average worker?
|
What would you do as a seagold director in given case
: You are a director of Sea Gold Canning Company. Sea Gold's business is canning tuna and salmon for sale to consumers. Its annual revenue is $575,000,000.
|
Facility vulnerability and countermeasures
: For this assignment, please choose a facility (business, school, government, etc.) and then analyze and explain the following:
|