System updates needed to complete this solution

Assignment Help Basic Computer Science
Reference no: EM133162473

Overview

For the purposes of this activity, you are currently working as an IoT systems engineer and are tasked with reviewing the given IoT Architecture Diagram to determine any errors that may arise in the implementation or usage of the system. By reviewing this diagram, you can inform the IoT architect of the changes that need to be made.

Prompt

Create a document to inform your team of the architectural design errors. In your writing:

• Identify at least 3 errors that may arise with the system. You must address the following for each potential error in the design you encounter:

1. What IoT device is the main component in this error? Are there multiple devices?

2. Is this design error something that requires a redesign of the system? Why or why not?

3. Can this system operate and function without addressing this error? Why or why not?

• Then provide at least one alternative solution for each potential error you found. It is suggested that you prepare a paragraph for each solution to send to the IoT architect. Explain the potential error and the solution that they can use to alter the diagram. To complete this step, you must address the following for each error:

1. What do you think is the best solution to address this potential error? What are the device changes or system updates needed to complete this solution?

2. Does this solution address any issues with confidentiality, integrity, or availability of data within the system? Explain how it does or doesn't.

Reference no: EM133162473

Questions Cloud

Topologies and OS vs NOS : Explain five major networking differences between Windows Server and any of the Linux editions and releases. Describe the topology?
Using E-mail Address to Determine Network Operating System : Based on this information, write a report explaining the relevance these items have. What recommendations, if any, might you give to Alexander Rocco management?
Foundations Of Emergency Management : Why is evacuation planning so difficult? What kinds of things can go wrong during an actual evacuation?
Systems development life cycle and security life cycle : Discuss the differences between the systems development life cycle (SDLC) and the security life cycle.
System updates needed to complete this solution : What do you think is the best solution to address this potential error? What are the device changes or system updates needed to complete this solution?
Important step in dissertation is theoretical basis : An important step in a dissertation is the theoretical basis that might help explain and shed light on why the problem is happening
Discuss the theoretical framework : Discuss the theoretical framework you think helps explains your topic and problem you will address in your dissertation.
Network protocol analyzer : Wireshark is one of the most widely-used network protocol analyzer.
Information security standards organizations : Pick one of the many information security standards organizations and describe what they do and what type of standards they are responsible for.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Efficient frontier analysis to evaluate risks of portfolio

Assume you are the project lead for the analysis team that uses Efficient Frontier Analysis to evaluate risks of the portfolio presented in chapter 25

  Determining the concept of array

The above code copies the character from s2 to s1 using the concept of array, in the strcopy function. Implement another function strcopy2

  Difference between descriptive analytics-predictive analytic

What is the difference between descriptive analytics, predictive analytics, and prescriptive analytics? Provide examples of each.

  Modify the social networking features

Based on what you learned in this chapter, write about 200 words in which you describe current developments in social networking that Lego will need to understand as it decides whether to continue, remove, or modify the social networking features ..

  What is the coase theorem

What is the Coase Theorem? What is a price ceiling? What is a price floor?

  Appreciated or devalued against the mark

Assume that a bank has assets located in London worth £150 million on which it earns an average of 8 percent per year. The bank has £100 million in liabilities on which it pays an average of 6 percent per year. The current spot exchange rate is £1..

  Algorithm to solve version of the problem

Suppose that walls in the maze can be knocked down, with a penalty of P squares. P is speci?ed as a parameter to the algorithm. (If the penalty is 0, then the problem is trivial.) Describe an algorithm to solve this version of the problem. What is..

  Classify occurrences as an incident or disaster

Classify each of the following occurrences as an incident or disaster. If an occurrence is a disaster, determine whether or not business continuity plans would be called into play.

  Antivirus protection

How often should you update your antivirus protection? Is the manual quick scan good enough protection for a system?

  Paper regarding development of an effective approach

Using the required readings and any other resources you might find helpful, write a paper regarding development of an effective approach to integration of cryptography for your project organization. Be sure to cover the following topics:

  Summarize the six stages of critical thinkers

In a 500 word essay, summarize the six stages of critical thinkers that are presented by Paul and Elder. Explain which of the six stages describes your current level and why you put yourself at that level.

  Adequate measures to mitigate futures incidence

Design all-inclusive plan of action on weaknesses of chain-link fence in organization and adequate measures to mitigate futures incidence.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd