Security policies to manage operational security

Assignment Help Computer Networking
Reference no: EM131647335

Assessment - Security Challenges in Emerging Networks

Purpose of the assessment

The purpose of this assignment is to develop skills to independently think of innovation and able to complete the following ULOs:

a. Identify and report network threats, select and implement appropriate countermeasures for network security

b. Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization

c. Demonstrate professional and ethical behaviour with regard to network security.

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assessment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Internet of Things (IoT) is an emerging area in computer networking. Internet of Things could refer to a network of devices with embedded technology including Sensors, Radio Frequency Identification tags, actuators, with the ability to continuously sense and exchange data to perform a range of tasks. The IoT will have a major impact on aspects of everyday-lives and behaviour of users. Security of Internet of Things is a prime concern.

This assignment includes four major parts

1. Literature review on Internet of Things (IoT)

You need to write 800 word literature on IoT. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

2. Analyse critically, three current or future security issues in IoT.

In this section you will analyse critically, three security issues in Internet of Things. These issues could be taken from the current state of the art or could be evolved from your own independent innovative thinking. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section (2).

In this part you need to apply knowledge to the existing knowledge domain of IoT. You need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the presentation session.

You have to create a 3 - 5 minutes presentation to present your work

Reference no: EM131647335

Questions Cloud

What modes of communication will we use : What modes of communication will we use? Where will we communicate? What are the expectations for equitable contributions from each team member?
Financial decisions in the short run : Can the things that a person does to adjust their financial decisions in the short run (anticipated costs like rent, food, car, etc.
What will your monthly payments be : You want to buy a new sports coupe for $93,500, and the finance office at the dealership has quoted you an APR of 7.5 percent for a 48 month loan to buy the car
What is the present value : An investment will pay you $41,000 in 10 years. If the appropriate discount rate is 6.8 percent compounded daily, what is the present value?
Security policies to manage operational security : MN502 - Overview of Network Security - Security Challenges in Emerging Networks - Identify and report network threats, select and implement
Can makeup damage fetal development : Can makeup damage fetal development? Many cosmetics contain a class of chemicals called phthalates. Studies that exposed some laboratory animals.
Banks and financial institutions : Discuss how poor risk management and corporate governance practices could impose risks and other negative externalities not only on the banks.
Percent compounded daily on its savings accounts : Fowler Credit Bank is offering 6.9 percent compounded daily on its savings accounts. You deposit $5,300 today.
The use in the criminal justice system : Compare the differences between its use in the private sector and the use in the criminal justice system.

Reviews

len1647335

9/18/2017 6:33:46 AM

• The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. • Plagiarism rate should be below than 5% overall. • The assignment should be written in IEEE conference format. • Should be completely relevant and All topics are pertinent and covered in depth.

len1647335

9/18/2017 6:33:33 AM

The assignment should be submitted in two separate files: 1. The report should be submitted as a Word file 2. The presentation should be submitted as a PPT file Section to be included in the report; Section to be included in the report Description of the section Introduction Introduction of Internet of Things Literature Review Literature review of Internet of Things Analyse critically Analyse critically, three security vulnerabilities of Internet of Things. Propose a possible solution Discuss a threat mitigation technique for one of the security vulnerability Report Layout The report should be written in IEEE conference format Reference style Follow IEEE reference style Presentation Slides The presentation slides should be well organised and clear. Oral Presentation Delivery of the presentation Total

Write a Review

Computer Networking Questions & Answers

  How does packet switching use the mac address

How does packet switching use the MAC address? Reference other material that aided you in your understanding

  Illustrate the difference between the customer relationship

what is the difference between customer relationship management supplier relationship management and employee

  Aalyze the security mechanisms needed to protect the dms

write a three to four 3-4 page paper in which you analyze the security mechanisms needed to protect the dms systems

  Using microsofts threat analysis amp modelling tool create

using microsofts threat analysis amp modelling tool create a threat model for your own blog setup. additionally explain

  1a critical review of theories of the nature of

1.a critical review of theories of the nature of organisational culture including how it may impact on innovation and

  Networking with tcp/ip

Using Wireshark tool capture the packets at the same time that you download Lecture 1 from the COIT20229 Course Webpage. Before you undertake this task, you should have Wireshark installed in your home computer/notebook and connected to the Internet

  Calculate the ultimate gain and period of oscillation

Calculate the ultimate gain and period of oscillation for a proportional analyzer controller installed on the blending tank of.

  Implement client and server programs on bank atm application

Implement client and server programs on bank ATM application. Give error checking if amount is legal and userID/password (created in the 1st time).

  Analyze the following data and identify the red x pink x

analyze the following data and identify the red x pink x and pale x for the component search. the parts were

  Given that alpha is a primitive root mod p

Given that alpha is a primitive root mod p. Prove prove alpha^x is congruent to alpha^y mod p if and only if x is congruent to y mod p-1

  What is the main purposes of the kali linux distribution

Kali Linux is a unique distribution of Linux in that it is designed specifically for enhancing the security of a network.

  Integrate the nursing school network

Your network solution should address the need to integrate the nursing school network into your newly designed campus network. The nursing school network needs to be redesigned with the following devices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd