Security challenges in emerging networks

Assignment Help Computer Networking
Reference no: EM131653364 , Length: Word count:1700

Assessment - Security Challenges in Emerging Networks

Purpose of the assessment

The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following

ULOs:
Identify and report network threats, select and implement appropriate countermeasures for network security
Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization
Demonstrate professional and ethical behaviour with regard to network security.

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Internet of Things (IoT) is an emerging area in computer networking. Internet of Things could refer to a network of devices with embedded technology including Sensors, Radio Frequency Identification tags, actuators, with the ability to continuously sense and exchange data to perform a range of tasks.The IoT will have a major impact on aspects of everyday-lives and behaviour of users. Security of Internet of Things is a prime concern.

This assignment includes four parts

1. Literature review on Internet of Things (IoT)

You need to write 800 word literature on IoT. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

2. Analyse critically, three current or future security issues in IoT.

In this section you will analyse critically, three security issues in Internet of Things. These issues could be taken from the current state of the art or could be evolved from your own independent innovative thinking. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section(2).

In this part you need to apply knowledge to the existing knowledge domain of IoT. You need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11.

The assignment should be submitted on the Moodle in two separate files:

1. The report should be submitted as a Word file
2. The presentation should be submitted as a PPT file

Verified Expert

The work is in 1700 words in IEEE format in MS word and PPT where the focus is on handling the IoT and handle the measures which includes the different issues related to the working of the system, security and the privacy measures. this IoT also works with the enhancement of the system level and the practices.

Reference no: EM131653364

Questions Cloud

Why catalase an important test for gram positive bacteria : Why is catalase such an important test for Gram positive bacteria? (Critical thought response not describing what catalase is)
Examine the results from the employee survey : Examine the results from the employee survey. What is the data saying about the health of the organization?
Coefficient of static friction between the cubes : The coefficient of static friction between the cubes is 0.710. What is the smallest magnitude that P can have in order to keep the small cube from sliding.
Demonstrates mastery of theories by including key elements : Your project will be assessed on the following: Demonstrates mastery of the theories by including key elements, definitions, examples, and sample scenarios.
Security challenges in emerging networks : MN502 - Develop skills to independently think of innovation and Demonstrate professional and ethical behaviour with regard to network security
Find the magnitude of the motorcycle acceleration : The propulsion force pushing the motorcycle up the ramp is 3130 N, and air resistance produces a force of 250 N that opposes the motion.
When plasma solute flows into the nephrons of the kidney : When plasma solute flows into the nephrons of the kidney. Which ones are reabsorbed and eliminated
Downward at a constant velocity : This force can either push the block upward at a constant velocity or allow it to slide downward at a constant velocity.
What is the p-disk test : What is the P-Disk test? How does it work? What is the principle? What kinds of results can one get? What do the results mean

Reviews

inf1653364

12/26/2017 4:16:57 AM

ExpertsMind are reliable source for students who has limited time to do assignment on their own. It is a wonderful organisation that interested in students success. I really thankful to them.

inf1653364

12/26/2017 4:16:33 AM

Hello mate today is last day of my assignment and you need to send me today only, please take care. Whats about the comment in the assignment. Can you check this assignment pleas. hey bro. how time you will be take for this hey mate please reply me asp. whats about the meaning of comment given in the assignment comment Deleted:s I am attach a pic and check this one please. 25171393_1Screenshot 271001-193156.png

len1653364

9/22/2017 3:56:15 AM

Presentation slides /4 Well organised and resourceful Organised and resourceful Resourceful but could be better organised Resourceful slides Neither resourceful nor well organised Oral Presentation /4 Good delivery, easy to follow and good interaction Delivered, easy to follow and provided a level of interaction Delivered and provided a level of interaction Delivered No oral presentation

len1653364

9/22/2017 3:56:07 AM

Propose a possible solution /6 Advance discussion on threats mitigation using latest technologies and procedures Good discussion on threats mitigation using technologies and procedures Good discussion on threats and mitigation Discussion on threats and mitigation Lacking discussion on threats and mitigation Report Layout /5 Well designed layout and proper formatting in IEEE Conference Style Well designed layout in IEEE Conference style Layout in IEEE Conference style Report layout and formatted but not in IEEE Conference style Report lacks a proper layout Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors

len1653364

9/22/2017 3:55:57 AM

Marking Rubric for Assignment #2: Total Marks 50 Grade Mark HD 40-50 DI 35-39 CR 30-34 P 25-29 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Literature Review /15 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available Analyse Critically /6 Exceptional discussion on security vulnerabilities for the system. Identifying highly sophisticated and well referenced vulnerabilities Exceptional discussion on security vulnerabilities for the system. Discussion on three security vulnerabilities Discussion on Two security vulnerabilities Unable to identify security vulnerabilities

len1653364

9/22/2017 3:55:49 AM

Marking criteria: Section to be included in the report Description of the section Marks Introduction Introduction of Internet of Things 5 Literature Review Literature review of Internet of Things 15 Analyse critically Analyse critically, three security vulnerabilities of Internet of Things. 6 Propose a possible solution Discuss a threat mitigation technique for one of the security vulnerability 6 Report Layout The report should be written in IEEE conference format 5 Reference style Follow IEEE reference style 5 Presentation Slides The presentation slides should be well organised and clear. 4 Oral Presentation Delivery of the presentation 4 Total 50

len1653364

9/22/2017 3:55:41 AM

1. Literature review on Internet of Things (IoT) You need to write 800 word literature on IoT. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art. 2. Analyse critically, three current or future security issues in IoT. In this section you will analyse critically, three security issues in Internet of Things. These issues could be taken from the current state of the art or could be evolved from your own independent innovative thinking. This section must be supported by at least three (3) references. 3. Propose a possible solution for one of the threats identified in section (2). In this part you need to apply knowledge to the existing knowledge domain of IoT. You need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd