Security challenges in emerging networks

Assignment Help Computer Networking
Reference no: EM131650850

Assessment - Security Challenges in Emerging Networks

Purpose of the assessment

- The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:

Identify and report network threats, select and implement appropriate countermeasures for network security

Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization

Demonstrate professional and ethical behaviour with regard to network security.

Assignment Description
The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Internet of Things (IoT) is an emerging area in computer networking. Internet of Things could refer to a network of devices with embedded technology including Sensors, Radio Frequency Identification tags, actuators, with the ability to continuously sense and exchange data to perform a range of tasks. The IoT will have a major impact on aspects of everyday-lives and behaviour of users. Security of Internet of Things is a prime concern.

This assignment includes four parts

Literature review on Internet of Things (IoT)

You need to write 800 word literature on IoT. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

Analyse critically, three current or future security issues in IoT.

In this section you will analyse critically, three security issues in Internet of Things. These issues could be taken from the current state of the art or could be evolved from your own independent innovative thinking. This section must be supported by at least three (3) references.

Propose a possible solution for one of the threats identified in section (2).

In this part you need to apply knowledge to the existing knowledge domain of IoT. You need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue.

Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11.

Verified Expert

In this particular assignment, the overall significance regarding the network security procedure has been judged in order to understand the security issues embedded within the significant decision. Moreover, the importance of identifying the solutions are considered through future implications regarding the factors through determining the principles that have been addressed.

Reference no: EM131650850

Questions Cloud

Producer surplus and welfare and dwl : The government imposed a specific tax of $1 per unit. What effect does this tax have on consumer surplus, producer surplus and welfare and DWL?
Create a public service announcement video : The intent of this assignment is to create a Public Service Announcement video that can be used in an appropriate venue.
Magnitudes of trade creation and trade diversion : Show that the welfare affects of a preferential trade agreement depends on the magnitudes of trade creation and trade diversion.
Compare and contrast the role of environment and biology : Compare and contrast the role of environment and biology regarding individuals with phenylketonuria (PKU) and Down syndrome.
Security challenges in emerging networks : MN502 - Overview of Network Security - Identify and report network threats, select and implement appropriate countermeasures for network security
National welfare of a large country : Show that an import tariff can increase the national welfare of a large country. What is the source of the gain?
Explain the personal values and professional codes of ethics : Explain two conflicts between personal values and professional code of ethics that social workers encounter when working with the client in the video segment.
Written communication is free of errors that detract : Written communication is free of errors that detract from the overall message
What is sequence of numbers in a after first partition : what is sequence of numbers in A after first partition (by calling Partition(A, 1, 9))? Note that 1 and 9 in Partition(A, 1, 9) function call are array indexes.

Reviews

inf1650850

12/18/2017 5:22:28 AM

Thank you! The assignment looked great! was very good assignment thanks for your help . However, I'll definitely use you again

inf1650850

12/18/2017 5:22:05 AM

Design a detailed Network in Netsim (You must not use packet tracer) which includes - Minimum of 4 switches (include series, model from your suggested first assignment report details) - Minimum of 3 routers (include series, model from your suggested first assignment report details) - 4 PCs ? Network device configurations a. Switch configuration: - set hostname as your name - set system clock to 10:00 am - display the name of the file and version of IOS - display the name of the interfaces - display 6 IOS modes b. Router configuration - set hostname as your family name

len1650850

9/20/2017 6:12:29 AM

Report Layout /5 Well designed layout and proper formatting in IEEE Conference Style Well designed layout in IEEE Conference style Layout in IEEE Conference style Report layout and formatted but not in IEEE Conference style Report lacks a proper layout Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors Presentation slides /4 Well organised and resourceful Organised and resourceful Resourceful but could be better organised Resourceful slides Neither resourceful nor well organised

len1650850

9/20/2017 6:12:23 AM

Analyse Critically /6 Exceptional discussion on security vulnerabilities for the system. Identifying highly sophisticated and well referenced vulnerabilities Exceptional discussion on security vulnerabilities for the system. Discussion on three security vulnerabilities Discussion on Two security vulnerabilities Unable to identify security vulnerabilities Propose a possible solution /6 Advance discussion on threats mitigation using latest technologies and procedures Good discussion on threats mitigation using technologies and procedures Good discussion on threats and mitigation Discussion on threats and mitigation Lacking discussion on threats and mitigation

len1650850

9/20/2017 6:12:16 AM

Marking Rubric for Assignment #2: Total Marks 50 Grade Mark HD 40-50 DI 35-39 CR 30-34 P 25-29 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Literature Review /15 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available

len1650850

9/20/2017 6:12:09 AM

Report Layout The report should be written in IEEE conference format 5 Reference style Follow IEEE reference style 5 Presentation Slides The presentation slides should be well organised and clear. 4 Oral Presentation Delivery of the presentation 4 Total 50

len1650850

9/20/2017 6:12:01 AM

Submission Guidelines The assignment should be submitted on the Moodle in two separate files: The report should be submitted as a Word file The presentation should be submitted as a PPT file Marking criteria: Section to be included in the report Description of the section Marks Introduction Introduction of Internet of Things 5 Literature Review Literature review of Internet of Things 15 Analyse critically Analyse critically, three security vulnerabilitiesof Internet of Things. 6 Propose a possible solution Discuss a threat mitigation techniquefor one of the security vulnerability 6

len1650850

9/20/2017 6:11:48 AM

All work must be submitted on Moodle by the due date along with a title Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  About connecting and disconnecting

Connecting and Disconnecting Online.You connect online multiple times a day from emails, social media, and instant messages (IM) to virtual business meetings and conference calls. Today you can work on projects with people from around the globe-so..

  What are the benefits and drawbacks of using server core

ITNW1316- What are the benefits and drawbacks of using Server Core for this branch office?What are some things you should do to set up this server management environment?

  What activity is a burst activity

Draw a project network from the following information. What activity(s) is a burst activity? What activity(s) is a merge activity

  What is the purpose of using digital encoding schemes

What are the four possible data-to-signal conversion combinations and in few words discuss each one of them?

  Cloud computing like elastic scalability and outsourcing

It also help business to use the best features of cloud computing like, elastic scalability and outsourcing. what are your toughts on the above statement? Do you agree or disagree?

  Write down what hops are taken to reach each destination

Did you notice that the first few hops are the same? Write down what hops are taken to reach each destination, and what hops are the same.

  Designing a secure network

Designing a Secure Network

  Problems-mix statically and dynamically assigned addresses

Describe what types of problems could result from having a mix statically and dynamically assigned addresses on the same network.

  Find the rfc which defines ftp protocol

Find the RFC that defines the FTP protocol. Take any non text file (e.g. word document, mpg, excel or any application centric file) Segmentation of a file and forming FTP datagrams: Read first 'x' number of bytes and use them as part of payload sect..

  What is the purpose of a container in given windows

A computer that has no security attached to it is called what?

  Determine the ip addresses of google and yahoo

Determine the IP addresses of www.google.com and www.yahoo.com. Modify hosts file to map www.google.com to yahoo's IP address and try to do google search. Remove modification to host file and repeat.

  Distinguish between lans wans and wireless technologies

Distinguish between local area networks (LANs), wide area networks (WANs), and wireless technologies. Explain the concepts and building blocks of today's data communication networks, such as switches, routers, and cabling.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd