Security issues in emerging technology

Assignment Help Computer Networking
Reference no: EM131653666

Assessment - Security Challenges in Emerging Networks

Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:

Identify and report network threats, select and implement appropriate countermeasures for network security
Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization
Demonstrate professional and ethical behaviour with regard to network security.

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Internet of Things (IoT) is an emerging area in computer networking. Internet of Things could refer to a network of devices with embedded technology including Sensors, Radio Frequency Identification tags, actuators, with the ability to continuously sense and exchange data to perform a range of tasks.The IoT will have a major impact on aspects of everyday-lives and behaviour of users. Security of Internet of Things is a prime concern.

The assignment should be written in IEEE conference format

This assignment includes four parts
1. Literature review on Internet of Things (IoT)

You need to write 800 word literature on IoT. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

2. Analyse critically,three current or future security issues in IoT.

In this section you will analyse critically, three security issues in Internet of Things. These issues could be taken from the current state of the art or could be evolved from your own independent innovative thinking. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section(2).

In this part you need to apply knowledge to the existing knowledge domain of IoT. You need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work in front of your class.

Verified Expert

This assignment is a literature review of the Internet of Things. The second part is a critical analysis of three security issues in the Internet of Things. The final part includes a possible solution for one of IT security threat. After that PPT of 7 slides is also prepared.

Reference no: EM131653666

Questions Cloud

The difference between diversity and multiculturalism : Discuss the differences between diversity and multiculturalism as well as to discuss the pros and cons of diversity in the workplace.
Define distilled water was placed in a beaker : Distilled water was placed in a beaker. The bag containing the sodium chloride/starch was then placed in the beaker
Why is tween used in the media of sampling : Why is Tween 80 used in the media of sampling? Was it appropriate for 70% alcohol disinfectant
Explain 360-degree best practices and implementation plans : Explain 360-degree best practices and implementation plans.Explain how you will use feedback with your own employees in your future career.
Security issues in emerging technology : MN502- Security issues in emerging technology Major impact on aspects of everyday-lives and behaviour of users. Security of Internet of Things is prime concern
How nicoles progress on each goal will be assessed : Nicole's areas of strengths and areas needing intervention. How Nicole's progress on each goal will be assessed, including timeframes and tools.
Find a story about rna in the news : Find a story about RNA in the news or a molecular biology method not mentioned in the lecture that uses RNA
What is the osmolarity of her body fluids : What is the osmolarity of her body fluids, How much solute osmoles exists in each of the above compartments
What is your tentative diagnosis based on the history : As the physician's assistant in the office, you are the first to examine Doug. What is your tentative diagnosis based on the history

Reviews

inf1653666

1/1/2018 4:15:16 AM

I was exceptionally weak in English language and grammar which cost me a lot in my exams. Be that as it may, since I have been requested my assignments from you guys I am recently getting An A or A+, as well as enhanced also. All credit goes to Expertsmind that made me a decent solution.

inf1653666

10/11/2017 6:16:16 AM

I have submitted my assignment. Yesterday similarity was 6% and now after submission it's showing 7%. If it is going to increase like this then what I can do. In our provided report it was just 6%, rest assured it will not increase anymore as 1%+- vary with some words. Don't worry.

inf1653666

10/11/2017 6:13:38 AM

lease make good and understandable ppt. and puts heading on slides so that I can understand the rest of points given below on each slides. without headings it is not easy to understand. puts heading as well on word assignment also according to the pdf and subheading also use in assignment wherever you think it is necessary to make the teacher understand easily. Yes thanku for making on time, i will check and if need any help will contact you again. One of mine friend want to make assignmemt and could you please tell me how to refer her through this site. Thanku

len1653666

9/22/2017 5:59:07 AM

Report Layout /5 Well designed layout and proper formatting in IEEE Conference Style Well designed layout in IEEE Conference style Layout in IEEE Conference style Report layout and formatted but not in IEEE Conference style Report lacks a proper layout Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors Presentation slides /4 Well organised and resourceful Organised and resourceful Resourceful but could be better organised Resourceful slides Neither resourceful nor well organised Oral Presentation /4 Good delivery, easy to follow and good interaction Delivered, easy to follow and provided a level of interaction Delivered and provided a level of interaction Delivered No oral presentation

len1653666

9/22/2017 5:58:55 AM

Analyse Critically /6 Exceptional discussion on security vulnerabilities for the system. Identifying highly sophisticated and well referenced vulnerabilities Exceptional discussion on security vulnerabilities for the system. Discussion on three security vulnerabilities Discussion on Two security vulnerabilities Unable to identify security vulnerabilities Propose a possible solution /6 Advance discussion on threats mitigation using latest technologies and procedures Good discussion on threats mitigation using technologies and procedures Good discussion on threats and mitigation Discussion on threats and mitigation Lacking discussion on threats and mitigation

len1653666

9/22/2017 5:57:41 AM

Marking Rubric for Assignment #2: Total Marks 50 Grade Mark HD 40-50 DI 35-39 CR 30-34 P 25-29 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Literature Review /15 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available

len1653666

9/22/2017 5:57:32 AM

Report Layout The report should be written in IEEE conference format 5 Reference style Follow IEEE reference style 5 Presentation Slides The presentation slides should be well organised and clear. 4 Oral Presentation Delivery of the presentation 4 Total 50

len1653666

9/22/2017 5:57:23 AM

Submission Guidelines The assignment should be submitted on the Moodle in two separate files: 1. The report should be submitted as a Word file 2. The presentation should be submitted as a PPT file Marking criteria: Section to be included in the report Description of the section Marks Introduction Introduction of Internet of Things 5 Literature Review Literature review of Internet of Things 15 Analyse critically Analyse critically, three security vulnerabilities of Internet of Things. 6 Propose a possible solution Discuss a threat mitigation technique for one of the security vulnerability 6

Write a Review

Computer Networking Questions & Answers

  Explaining security domain boundaries for personal computer

Recognize and explain Trust/Security Domain boundaries that may be suitable to personal computer (workstation) security in a business context.

  How you have acquired the knowledge

Identify the Area of Knowledge topic that you have chosen to explainby entering the name of the Area of Knowledge topic in the box. Explain, in the expandable typing area, how you have acquired the knowledge and illustrate the depth of thatknowledge..

  Computer and technology

Assume a program has 510 bytes and will be loaded into page frames of256 bytes each, and the instruction to be used is at byte 377. Answer the following questions:

  A network engineer is making an implementation plan of

a network engineer is preparing an implementation plan of xumuc. she is not certain as to which layer of the cisco

  Identify one disadvantage of using point to point topology

Define each topology, Provide a scenario for using each topology, and Identify at least one disadvantage of using each topology.

  This assignment requires you to research into recent

this assignment requires you to research into recent advances in lsquobroadband adsl asymmetric digital subscriber line

  Mac destination address in ethernet header-arp payload

Describe the difference between MAC Destination Address in Ethernet header and one found in ARP payload.

  Perform a scan of your routers exterior using shieldsup

Perform a scan of your router's exterior using ShieldsUp! at http://www.grc.com/ (scroll down to the link or use the pull-down Services button).

  Xumuc is has the wan links in place to the new locations in

xumuc is has the wan links in place to the new locations in the houston region. xumuc currently has 2 other regions san

  Analyze the result obtained regarding http page response

Analyze the result we obtained regarding the HTTP page response time. Collect four other statistics, of your choice, and rerun the simulation of the Simple and the Busy network scenarios.

  What types of cable work to make connection in front office

Although loading dock is nowhere near shop floor, dock is 1100 feet from front office. What types of cable will work to make this connection? What type would you select and why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd