Issues in an iot network and security

Assignment Help Computer Networking
Reference no: EM133052243 , Length: word count:2000

CIS4019-N IoT Security - Teesside University

Learning outcome 1: Communicate clearly and professionally regarding technical issues in an IoT network and security.

Learning outcome 2: Demonstrate critical understanding of standard security and privacy preserving mechanisms in IoT.

Learning outcome 3: Discuss and make informed comments on emerging areas of the Internet of Things, demonstrating an understanding of the social, environmental, and commercial context.

Assignment Title:

A layer-wise component and security analysis of an IoT application

Introduction
You need to do a layer-wise component and security analysis of a selected IoT application and make a report of process (approx. 2000 words).

The Scenario

CyberHealth Ltd. is a Teesside based cybersecurity solution provider, where you are working as a cybersecurity expert. Your company provides Networking & Cybersecurity solutions for the business environment. They currently offer managed, professional, and hardware & software services. Recently, few companies have approached CyberHealth to offer them services for their IoT solution clients. CyberHealth is interested in extending its business by providing services to its customers who offer IoT solutions.

The use of telemedicine with the support IoT has increased globally due to COVID-19. Your company is more interested in healthcare related IoT solution providers or customers. In this context, you are assigned to analyse the security of an existing remote monitoring system (offered by an IoT solution provider) for elderly and chronic disease patients.

Your Tasks

Task 1: Discuss the three- and five-layered architecture of the IoT-basedremote patient monitoring system (e.g., fall detection and reporting or any app selected from Google's play or Apple' Apps store and uses mobile sensors). For the task you need to include:
- A diagram of the architecture
- Brief description of each layer (e.g., sensing or perception) with their components (e.g., specific sensor or sensors).

Task 2: What is Risk in cybersecurity? Do a risk assessment of the selected IoT application using a risk assessment framework. You can select any framework you prefer.

Task 3: Explain with examples how you would analyse the end-to-end (E2E) security vulnerabilities or concerns (using the 3-layer architecture in task 1 and its layer-wise components) of the selected solution. For this task,
- be precise about tools and methods,
- justify all your decisions, and
- Discussion needs to be linked with the selected application.

Task 4: Discuss countermeasures for the identified security concerns of the sensing (in task 3) layer of the selected patient monitoring system.

Task 5: Discuss and make informed comments on emerging applications of IoT in healthcare, demonstrating an understanding of the social and commercial context.

Task 6: Write the report clearly and professionally (i.e., using references and figures where appropriate) regarding technical issues in an IoT network and security.

Attachment:- IoT Security.rar

Reference no: EM133052243

Questions Cloud

Question on transportation problem : Canning Transport is to move goods from three factories to three distribution centers.
Share of profits on sales of innovative apparel : The management at Holden Outerwear is able to push its vendors to work on new developments by:
Prepare Journal entries for Rye contribution : Rye's contribution was $335,000 in 2018 and benefits paid were $215,000. Prepare Journal entries for a) Rye's contribution and b) benefits paid to retirees
Employee advocacy programs : Hootsuite Amplify has created a free online calculator for companies to calculate their potential social reach if they were to leverage employee advocacy.
Issues in an iot network and security : Discuss and make informed comments on emerging areas of the Internet of Things, demonstrating an understanding of the social, environmental, and commercial
Decision point-implementing change : You decide that structural changes must be made immediately at Holden Evan to deal with the problems caused by the three SBU marketing teams.
What is your core purpose as a leader : As you reflect on your Personal Leadership Statement should address some these questions:
Example of a strong infographic : For this post. Find and analyze in-depth an example of a strong infographic (google search for images using the term: good infographic). When doing the post, pl
Intrusive and nonintrusive tests : Discuss the differences between intrusive and nonintrusive tests. Is it possible to provide a secure environment with no intrusive tests?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd