Issues in an iot network and security

Assignment Help Computer Networking
Reference no: EM133052243 , Length: word count:2000

CIS4019-N IoT Security - Teesside University

Learning outcome 1: Communicate clearly and professionally regarding technical issues in an IoT network and security.

Learning outcome 2: Demonstrate critical understanding of standard security and privacy preserving mechanisms in IoT.

Learning outcome 3: Discuss and make informed comments on emerging areas of the Internet of Things, demonstrating an understanding of the social, environmental, and commercial context.

Assignment Title:

A layer-wise component and security analysis of an IoT application

Introduction
You need to do a layer-wise component and security analysis of a selected IoT application and make a report of process (approx. 2000 words).

The Scenario

CyberHealth Ltd. is a Teesside based cybersecurity solution provider, where you are working as a cybersecurity expert. Your company provides Networking & Cybersecurity solutions for the business environment. They currently offer managed, professional, and hardware & software services. Recently, few companies have approached CyberHealth to offer them services for their IoT solution clients. CyberHealth is interested in extending its business by providing services to its customers who offer IoT solutions.

The use of telemedicine with the support IoT has increased globally due to COVID-19. Your company is more interested in healthcare related IoT solution providers or customers. In this context, you are assigned to analyse the security of an existing remote monitoring system (offered by an IoT solution provider) for elderly and chronic disease patients.

Your Tasks

Task 1: Discuss the three- and five-layered architecture of the IoT-basedremote patient monitoring system (e.g., fall detection and reporting or any app selected from Google's play or Apple' Apps store and uses mobile sensors). For the task you need to include:
- A diagram of the architecture
- Brief description of each layer (e.g., sensing or perception) with their components (e.g., specific sensor or sensors).

Task 2: What is Risk in cybersecurity? Do a risk assessment of the selected IoT application using a risk assessment framework. You can select any framework you prefer.

Task 3: Explain with examples how you would analyse the end-to-end (E2E) security vulnerabilities or concerns (using the 3-layer architecture in task 1 and its layer-wise components) of the selected solution. For this task,
- be precise about tools and methods,
- justify all your decisions, and
- Discussion needs to be linked with the selected application.

Task 4: Discuss countermeasures for the identified security concerns of the sensing (in task 3) layer of the selected patient monitoring system.

Task 5: Discuss and make informed comments on emerging applications of IoT in healthcare, demonstrating an understanding of the social and commercial context.

Task 6: Write the report clearly and professionally (i.e., using references and figures where appropriate) regarding technical issues in an IoT network and security.

Attachment:- IoT Security.rar

Reference no: EM133052243

Questions Cloud

Question on transportation problem : Canning Transport is to move goods from three factories to three distribution centers.
Share of profits on sales of innovative apparel : The management at Holden Outerwear is able to push its vendors to work on new developments by:
Prepare Journal entries for Rye contribution : Rye's contribution was $335,000 in 2018 and benefits paid were $215,000. Prepare Journal entries for a) Rye's contribution and b) benefits paid to retirees
Employee advocacy programs : Hootsuite Amplify has created a free online calculator for companies to calculate their potential social reach if they were to leverage employee advocacy.
Issues in an iot network and security : Discuss and make informed comments on emerging areas of the Internet of Things, demonstrating an understanding of the social, environmental, and commercial
Decision point-implementing change : You decide that structural changes must be made immediately at Holden Evan to deal with the problems caused by the three SBU marketing teams.
What is your core purpose as a leader : As you reflect on your Personal Leadership Statement should address some these questions:
Example of a strong infographic : For this post. Find and analyze in-depth an example of a strong infographic (google search for images using the term: good infographic). When doing the post, pl
Intrusive and nonintrusive tests : Discuss the differences between intrusive and nonintrusive tests. Is it possible to provide a secure environment with no intrusive tests?

Reviews

Write a Review

Computer Networking Questions & Answers

  What is the cidr notation for the blocks in the first subnet

An organization is assigned the block 2000:1234:1423/48. What is the CIDR notation for the blocks in the first and second subnets in this organization?

  Codes of conduct in a business environment

Describe the importance of ethics and codes of conduct in a business environment. Assess the impact that these have on business operations.

  Explain and reason how tcp congestion control will react

Explain and reason how TCP congestion control will react: for example, describe what transmission rate TCP would give each of the connections.

  Explain why unreliable udp works well for streaming audio

Examples of applications that use TCP and UDP. Explain why unreliable UDP works well for streaming audio and video.

  Describe mckinnon in the context of the frameworks

Describe McKinnon in the context of the frameworks and theories of cyber-crime and cyber criminals discussed in the classroom

  Analyze and recommend two antivirus solutions

Analyze and recommend two antivirus solutions that can be used on all 3 operating systems. Compare and contrast the features of each product, and make a recommendation about which should be used by MWS.

  Design of secure enterprise wireless network

MN603 Wireless Networks and Security Assignment - Design and implementation of secure enterprise wireless network, Melbourne Institute of Technology Australia

  What command shuts down all network interfaces

What command can be used to verify that a network interface is down?

  COMP 30022 Advanced Networking Technologies Assignment

COMP 30022 Advanced Networking Technologies Assignment Help and Solution, Middle East College - Assessment Writing Service

  Research point-to-point packet switched and circuit switched

Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies associated with the protocol.

  Describe the company network and interconnection

Describe the company network and interconnection

  Dynamic routes using rip protocol

To define the addressing scheme of the company XYZ network you will indicate: The subnet mask selected, the maximum number of subnets provided by the selected subnet mask

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd