Identify and report network threats

Assignment Help Computer Networking
Reference no: EM131662632

Security Challenges in Emerging Networks

Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:

Identify and report network threats, select and implement appropriate countermeasures for network security

Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization

Demonstrate professional and ethical behaviour with regard to network security.

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Internet of Things (IoT) is an emerging area in computer networking. Internet of Things could refer to a network of devices with embedded technology including Sensors, Radio Frequency Identification tags, actuators, with the ability to continuously sense and exchange data to perform a range of tasks.The IoT will have a major impact on aspects of everyday-lives and behaviour of users. Security of Internet of Things is a prime concern.

The assignment should be written in IEEE conference format:

This assignment includes four parts
1. Literature review on Internet of Things (IoT)

You need to write 800 word literature on IoT. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

2. Analyse critically,three current or future security issues in IoT.

In this section you will analyse critically, three security issues in Internet of Things. These issues could be taken from the current state of the art or could be evolved from your own independent innovative thinking. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section(2).

In this part you need to apply knowledge to the existing knowledge domain of IoT. You need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work in front of your class fellows and tutor.

Verified Expert

This assignment is a Literature review of Internet of Things. Second part is critical analysis of three security issues in IoT. Third part of assignment is possible solution for IT security threats. PPT of 7 plus slides is also prepared.

Reference no: EM131662632

Questions Cloud

Determine if the system is linear and time-invariant : A number of systems are specified below in terms of their input-output relationships. For each case, determine if the system is linear and/or time-invariant.
Discuss the commercial activity exception : Under what circumstances does this doctrine apply? What are its exceptions? Should this suit be dismissed under the "commercial activity" exception? Explain.
Second place horses in the first two races : At a race track you have the opportunity to buy a ticket that requires you to pick the first and second place horses in the first two races.
Is islam compatible with democracy : Is the globalization of Islam capable of rendering it fully compatible with democracy? Is Islam compatible with democracy?
Identify and report network threats : MN502 - develop skills to independently think of innovation and three security issues in Internet of Things - Security of Internet of Things is a prime concern
How facilitate a caring-healing environment : In your current practice, what are ways by which you could facilitate a caring-healing environment
Describe the types of optical input devices : Describe the types of optical input devices. For what type of input is each device intended ?What is a stack? Why is it needed?
Picture with the three men in the middle : How many ways can this be done? (Assume there are two women on each side of the group of men)
Determining the cost of production : Did the Commerce Department act reasonably in determining the cost of production? Why or why not?

Reviews

inf1662632

1/1/2018 4:20:07 AM

I am exceptionally suspicious when I was giving over my paper to them. But thanks god, who helped me to get the authentic task help in the wake of being swindled by many other services. You are astonishing support team, and I am proposing everybody to get help from Expertsmind.

inf1662632

1/1/2018 4:17:40 AM

Hii..i have to order two assignments more today so i want some concession because 120 usd is too much so pls give me some concession Ok thanks Hi.within 3 hours i have to submit the assignment of mn502 Thanks alot

len1662632

9/28/2017 6:15:50 AM

Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors Presentation slides /4 Well organised and resourceful Organised and resourceful Resourceful but could be better organised Resourceful slides Neither resourceful nor well organised Oral Presentation /4 Good delivery, easy to follow and good interaction Delivered, easy to follow and provided a level of interaction Delivered and provided a level of interaction Delivered No oral presentation

len1662632

9/28/2017 6:15:43 AM

Analyse Critically /6 Exceptional discussion on security vulnerabilities for the system. Identifying highly sophisticated and well referenced vulnerabilities Exceptional discussion on security vulnerabilities for the system. Discussion on three security vulnerabilities Discussion on Two security vulnerabilities Unable to identify security vulnerabilities Propose a possible solution /6 Advance discussion on threats mitigation using latest technologies and procedures Good discussion on threats mitigation using technologies and procedures Good discussion on threats and mitigation Discussion on threats and mitigation Lacking discussion on threats and mitigation Report Layout /5 Well designed layout and proper formatting in IEEE Conference Style Well designed layout in IEEE Conference style Layout in IEEE Conference style Report layout and formatted but not in IEEE Conference style Report lacks a proper layout

len1662632

9/28/2017 6:15:38 AM

Marking Rubric for Assignment #2: Total Marks 50 Grade Mark HD 40-50 DI 35-39 CR 30-34 P 25-29 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Literature Review /15 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available

len1662632

9/28/2017 6:15:32 AM

Propose a possible solution Discuss a threat mitigation technique for one of the security vulnerability 6 Report Layout The report should be written in IEEE conference format 5 Reference style Follow IEEE reference style 5 Presentation Slides The presentation slides should be well organised and clear. 4 Oral Presentation Delivery of the presentation 4 Total 50

len1662632

9/28/2017 6:15:25 AM

Submission Guidelines The assignment should be submitted on the Moodle in two separate files: 1. The report should be submitted as a Word file 2. The presentation should be submitted as a PPT file Marking criteria: Section to be included in the report Description of the section Marks Introduction Introduction of Internet of Things 5 Literature Review Literature review of Internet of Things 15 Analyse critically Analyse critically, three security vulnerabilities of Internet of Things. 6

Write a Review

Computer Networking Questions & Answers

  Current network diagram infrastructure

Determine which devices you will use for both the current network diagram infrastructure consisting of firewalls, routers, and workstations as well as the device you need to incorporate. Include the following for each:

  Explain the construction of fiber-optic cable to a team

What is the best way to explain the construction of Fiber-Optic cable to a team? What are the important points to cover? In your post, detail the points that are important to discuss about FO cable construction.

  Review the challenges in it system planning

Review the challenges in IT system planning and discuss in detail the problem of scope creep - what your sources say does not constitute an adequate paper.

  What is tco and why is the tco so high

What is TCO? Why is the TCO so high? How can network costs be reduced? What do network management software systems do and why are they important?

  Identify a networking strategy

Identify a networking strategy that will expand your brand awareness while adding value to those in your network.

  Which is better or controlled access or contention

Which is better, controlled access or contention? Explain.- Define two fundamental types of errors.- Is there any difference in the error rates of lower-speed lines and higher-speed lines?

  Key pieces of basic architecture of the internet

Research to see how the Internet is put together. What are some key pieces of the basic architecture of the Internet?

  Discuss the two type styles of typography

Discuss the two type styles of typography, explaining how their differences effect your presentation within a webpage, and how you might use each to achieve your objectives. Explain the attributes of image coding and what each contributes to the p..

  Literature review on internet of things

Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art - current or future

  Compare different version of snmp to each others

It is a fact that SNMP is not a perfect technology. List at least 4 major problems with SNMP. Compare different version of SNMP to each others.

  Discuss wired vs wireless networking what are the

discuss wired vs. wireless networking. what are the advantages and disadvantages of each? consider installation cost

  Why does keeping good records help in managing your network

Prepare a 350 to 1,050 word paper that answers fully discusses the topic questions: Why does keeping good records help in managing your network

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd