Implement appropriate countermeasures for network security

Assignment Help Other Engineering
Reference no: EM131659399

Security Challenges in Emerging Networks

Purpose of the assessment

The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:

- Identify and report network threats, select and implement appropriate countermeasures for network security

- Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization

- Demonstrate professional and ethical behaviour with regard to network security.

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Internet of Things (IoT) is an emerging area in computer networking. Internet of Things could refer to a network of devices with embedded technology including Sensors, Radio Frequency Identification tags, actuators, with the ability to continuously sense and exchange data to perform a range of tasks.The IoT will have a major impact on aspects of everyday-lives and behaviour of users. Security of Internet of Things is a prime concern.

The assignment should be written in IEEE conference format

This assignment includes four parts
1. Literature review on Internet of Things (IoT)

You need to write 800 word literature on IoT. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

2. Analyse critically,three current or future security issues in IoT.

In this section you will analyse critically, three security issues in Internet of Things. These issues could be taken from the current state of the art or could be evolved from your own independent innovative thinking. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section(2).

In this part you need to apply knowledge to the existing knowledge domain of IoT. You need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work in front of your class

Reference no: EM131659399

Questions Cloud

Two divergent ethical foundations : There are several different bases for morality or deciding what is right and wrong: consequences, individual rights, moral duties, and virtues.
What is the current health status of this minority group : Compare the health status of the minority group you have selected to the national average. What is the current health status of this minority group?
Major american military operations land : Discuss the major American military operations land, sea, and air, in the Pacific Theater from December 1941 to the end of 1943
Forms of pop art were popular all around the world : Forms of Pop Art were popular all around the world in the 1960s. What were the forms of Pop Art that were popular in Germany and France at this time?
Implement appropriate countermeasures for network security : MN502 - Security Challenges in Emerging Networks - Overview of Network Security - Analyse critically,three current or future security issues in IoT
Part of a global movement of people : How was immigration to the US in this period part of a global movement of people?
Evaluate the presidency of barack obama : Evaluate the presidency of Barack Obama in 250 words.
American promise by roark : Referencing the book The American Promise by Roark, answer the following question.
Highlighting one major motivation for coming to america : Compose a thesis statement (a few paragraphs) highlighting one major motivation for coming to America (Africans and Europeans).

Reviews

len1659399

9/26/2017 8:35:20 AM

Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors Presentation slides /4 Well organised and resourceful Organised and resourceful Resourceful but could be better organised Resourceful slides Neither resourceful nor well organised Oral Presentation /4 Good delivery, easy to follow and good interaction Delivered, easy to follow and provided a level of interaction Delivered and provided a level of interaction Delivered No oral presentation

len1659399

9/26/2017 8:35:13 AM

Analyse Critically /6 Exceptional discussion on security vulnerabilities for the system. Identifying highly sophisticated and well referenced vulnerabilities Exceptional discussion on security vulnerabilities for the system. Discussion on three security vulnerabilities Discussion on Two security vulnerabilities Unable to identify security vulnerabilities Propose a possible solution /6 Advance discussion on threats mitigation using latest technologies and procedures Good discussion on threats mitigation using technologies and procedures Good discussion on threats and mitigation Discussion on threats and mitigation Lacking discussion on threats and mitigation Report Layout /5 Well designed layout and proper formatting in IEEE Conference Style Well designed layout in IEEE Conference style Layout in IEEE Conference style Report layout and formatted but not in IEEE Conference style Report lacks a proper layout

len1659399

9/26/2017 8:35:05 AM

Marking Rubric for Assignment #2: Total Marks 50 Grade Mark HD 40-50 DI 35-39 CR 30-34 P 25-29 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Literature Review /15 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available

len1659399

9/26/2017 8:34:59 AM

Propose a possible solution Discuss a threat mitigation technique for one of the security vulnerability 6 Report Layout The report should be written in IEEE conference format 5 Reference style Follow IEEE reference style 5 Presentation Slides The presentation slides should be well organised and clear. 4 Oral Presentation Delivery of the presentation 4 Total 50

len1659399

9/26/2017 8:34:53 AM

Submission Guidelines The assignment should be submitted on the Moodle in two separate files: 1. The report should be submitted as a Word file 2. The presentation should be submitted as a PPT file Marking criteria: Section to be included in the report Description of the section Marks Introduction Introduction of Internet of Things 5 Literature Review Literature review of Internet of Things 15 Analyse critically Analyse critically, three security vulnerabilities of Internet of Things. 6

Write a Review

Other Engineering Questions & Answers

  Calculate the area in the correct units

Calculate the area in the correct units. Draw a table of what you are going to plot and define the physical quantity resistivity.

  Design a summing amplifier with three channels

Design a summing amplifier with three channels, using a 741C Op-Amp. The voltage gain of the should be 1.3, 2, and 4.7 for channel 1 to channel 3. Show the results for vout for all possible combinations of the channels in a table.

  Compute the strains at the interface between laminae

Compute the strains ?x, ?y, γxy at the interface between laminae,- the stresses σx, σy, τxy on all laminae, right next to the interface,

  Write vhdl code for the given lfsr circuit

Question no. 1 Write VHDL code for the LFSR circuit given in Fig 1. Use the sample entity statement shown in Fig 2. Use the testbench code given with assignment to test your VHDL code.

  Design and simulate an eight-bit adder or subtractor

Design and simulate an 8-bit adder/subtractor using a hierarchical Verilog structural description. Your design should accept 2 twos complement 8-bit inputs (x and y) and generate an output.

  What design speed was used for the curve

If the necessary sight distance required 52 ft of lateral clearance from the roadway centerline, what design speed was used for the curve?

  Compute e1 and e2 using both the rule of mixtures

Comment on which values are lower or upper bounds to the real value of each elastic property and what seems to be the best model in each case.

  Project about sound detect

I have a project about sound detect. The software codes of (ChipKit Max32) which uses MPIDE platform.. The codes should insert the 3 analog microphones to the ADC inputs of the micro-controller.. Then the timer will work to detect the fastest signa..

  Calculate fast line tension and static line tension

Calculate Fast line tension and Static line tension - Calculate Formation pressure and Mud weigh to drill this formation

  Problems based on nyquist sampling theorem

What is the definition of "Nyquist rate"? What is the "Nyquist sampling theorem"? Plot the signal ??(??) = sin(4????).

  Explain strategies to support motor development in infants

Explain the Strategies to Support Motor Development and Learning in Infants and Toddlers.

  What are the five fluids used as damping media

What are the five (5) fluids used as damping media. Calculate the logarithmic decrements of the beam in these five fluids. Calculate the damping ratio of these five fluids and rank them from the highest to the lowest.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd