Literature review on internet of things

Assignment Help Computer Network Security
Reference no: EM131653869 , Length: word count:1700

Overview of Network Security Assessment Title - Security Challenges in Emerging Networks

Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:

a. Identify and report network threats, select and implement appropriate countermeasures for network security

b. Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization

c. Demonstrate professional and ethical behaviour with regard to network security.

Assignment Description -

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Internet of Things (IoT) is an emerging area in computer networking. Internet of Things could refer to a network of devices with embedded technology including Sensors, Radio Frequency Identification tags, actuators, with the ability to continuously sense and exchange data to perform a range of tasks.The IoT will have a major impact on aspects of everyday-lives and behaviour of users. Security of Internet of Things is a prime concern.

This assignment includes four parts

1. Literature review on Internet of Things (IoT)

You need to write 800 word literature on IoT. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

2. Analyse critically,three current or future security issues in IoT.

In this section you will analyse critically, three security issues in Internet of Things. These issues could be taken from the current state of the art or could be evolved from your own independent innovative thinking. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section (2).

In this part you need to apply knowledge to the existing knowledge domain of IoT. You need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.    

You have to create a 3 - 5minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11.

Verified Expert

The work is in 1700 words in IEEE format in MS word and PPT where the focus is on handling the IoT and handle the measures which includes the different issues related to the working of the system, security and the privacy measures. this IoT also works with the enhancement of the system level and the practices.

Reference no: EM131653869

Questions Cloud

What is something else that she may have reflected upon : What is something else that she may have reflected upon? How will knowing Sarah's learning style help Mrs. Smith be a more effective teacher?
Specific facts that would support your clients demands : You are an attorney representing an actor of your choice who has been offered a role in a feature film. It is your job to negotiate the best possible deal
Discuss the medical assistant to complete a request form : The physician directs the medical assistant to complete a request form for an x-ray study of the fibula
Describe the ethical issues related to the research process : Write a 1,050- to 1,400-word paper in which you describe the ethical issues related to the research process within the field of criminal justice.
Literature review on internet of things : MN502 Overview of Network Security Assignment. he purpose of this assignment is to develop skills to independently think of innovation
Identify context in which instructor would use a cad program : Next, identify the context in which an instructor would use a CAD program to help create an understanding certain concepts.
What is your personal stance on the privatization of prisons : What is your personal stance on the privatization of prisons versus traditional government-run facilities? Is it ethical for prisons to focus on profit?
What is the expected value of your business : Why do we need to "reinvent the law," according to Hadfield, and what does she suggest such a reinvention might entail?
Identify legal issues in a given fact pattern : Draft a well-reasoned analysis of the given situations making arguments in support of both parties to the dispute - Identify legal issues in a given fact patter

Reviews

len1653869

9/22/2017 7:40:15 AM

Australian student, total 1500-2000 words. Submission Guidelines - All work must be submitted on Moodle by the due date along with a title Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Submission Guidelines - The assignment should be submitted on the Moodle in two separate files: The report should be submitted as a Word file and The presentation should be submitted as a PPT file.

len1653869

9/22/2017 7:40:07 AM

Introduction- Introduction of Internet of Things. Literature Review - Literature review of Internet of Things. Analyse critically - Analyse critically, three security vulnerabilities of Internet of Things. Propose a possible solution - Discuss a threat mitigation technique for one of the security vulnerability. Report Layout - The report should be written in IEEE conference format. Reference style - Follow IEEE reference style. Presentation Slides - The presentation slides should be well organised and clear. Oral Presentation - Delivery of the presentation.

len1653869

9/22/2017 7:40:02 AM

Introduction - All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated. Literature Review - Finding is clearly linked and well justified. Analyse Critically - Exceptional discussion on security vulnerabilities for the system. Identifying highly sophisticated and well referenced vulnerabilities. Propose a possible solution - Advance discussion on threats mitigation using latest technologies and procedures. Report Layout - Well designed layout and proper formatting in IEEE Conference Style. Reference style - Clear styles with excellent source of references. Presentation slides - Well organised and resourceful. Oral Presentation - Good delivery, easy to follow and good interaction.

Write a Review

Computer Network Security Questions & Answers

  Analyse security procedures

Analyse security procedures

  Prepare a trouble ticket to record the problem

Prepare a Trouble Ticket to record the problem

  INFA 640 Cryptology and data protection

INFA 640,  Cryptology and data protection  Roberta, the daughter of Bob and Alice, is a summer intern at Encrypt-It-Rite, Inc. For her summer project, Roberta would like to implement a stream cipher using public key encryption. Is this a viable ide..

  Identify three commercially available technology solutions

Identify three commercially available technology solutions (products or services) which could be used to address cybersecurity problems specific to DR / BCP.

  Why is a rootkit more dangerous than a run-of-the-mill piece

CSIS 343- Why is a rootkit more dangerous than a run-of-the-mill piece of malware? Why is detection of a rootkit more difficult than detection of run-of-the-mill malware?

  Is it possible to decrypt the message with a different key

Is it possible to decrypt the message with a different key? Justify your answer. Do you agree with the statement of the message? Why or why not?

  What kinds of things do you think the administrator will see

A network administrator views the output from the "show ip route" command. What kinds of things do you think the administrator will see on the output?

  Explain efficiency issues and alternate method

Bob sending an encrypted, signed message to Alice and Carol.

  What are the common tools used for denial of service

What are the common tools used for denial of service and How does a SQL injection attack take place

  Explain a method for consolidating core network services

Explain a method for consolidating Core Network services. Provide a plan for integrating both AD forests eliminating duplication of service wherever possible

  Nap to reduce security risks

You discover that many of your company's customers have been responsible for introducing viruses and malware into the company network via the Internet

  What edition of windows will be used for each server

What edition of Windows will be used for each server (e.g., Standard, Datacenter)? Will Server Core be used on any servers? Where are each of servers located?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd