The current state of the art emerging knowledge domains

Assignment Help Management Information Sys
Reference no: EM131996072

Assignment Description

The purpose of this assignment is to develop research and analyticalskills. In this assignment students will firstly learn how to develop knowledge based on the current state of the art emerging knowledge domains.

They will critically analyse three of the current or future security issues in this area and their countermeasures.

Internet of Things (IoT) is a network of ‘‘things''. The term ‘‘thing'' here can constitute any smart device ranging from home appliances, telecommunication, sensor devices used in vehicles/ agricultural sector/homeland security to health monitoring devices inside of (or connected with) a human body.

In fact, any device that has the ability to collect and transfer data across the network can be a part of an IoT system. With the introduction of smart cities, smart homes, smart office and smart devices, the Internet of Things (IoT) is an emerging area of incredible potential of growth.

However, most of these IoT devices are at risk of being hacked and compromised. Internet of Things (IoT) still have many security issues that need to be solved (i.e, RFID tag security, cyber security, wireless security, network transmission security and privacy protection etc). In this assignment student will work on the security issues and its countermeasures in the area of IoT.

This assignment includes three parts.

1. Literature review of Internet of Things (IoT):

Your review should be supported by at least three (3) academic (journal/conference) papers chosen from the current state of the art. The paper should not be older than four years. Your discussion should include:

i. Introduction to IoT

ii. Characteristics of IoT compared to the traditional network (please include the variety of devices that are used in IoT).

iii. Discuss three areas of applications for IoT.

2. Analyse critically, three current or future security issues in IoT and its countermeasures

In this section you will

i. Explain and analyse critically three security issues in IoT.

ii. Explain the countermeasures/mitigation techniques and tools used for each of the security issues mentioned in section i.

This section must be supported by at least three (3) references (good quality conference or journal paper such as IEEE/ACM/Springer).

3. Create a 3 - 5 minutes presentation and present your work during the Laboratory class.

You have to create a 3 - 5 minutes presentation to present your work in front of your class members and tutor during the Laboratory class in Weeks 11 and 12.

Reference no: EM131996072

Questions Cloud

Mixture of methanol and water : A water flow of 40.0 L / s flows in a pipe. At a given point, a mixture of methanol and water is injected with a 40.0% mass fraction of methanol.
Develop the basic procedures for the ken 7 windows : The procedure guide must contain the steps any Ken 7 Windows Limited personnel should take to evaluate and implement an access control change.
Should firms invest in money market securities : Should firms invest in money market securities? Does governance of firms affect the prices of their bonds?
Write an extended metaphor poem : Write an extended metaphor poem. You may write as many stanzas as you would like; however, your poem should be no less than 10 lines.
The current state of the art emerging knowledge domains : MN502 Overview of Network Security : Firstly learn how to develop knowledge based on the current state of the art emerging knowledge domains.
How will you gather the data from your sample : How will you gather the data from your sample (method)? Finally, what do you predict that you will find from this research?
Computech corporation is expanding rapidly : Computech Corporation is expanding rapidly and currently needs to retain all of its earnings; hence, it does not pay dividends.
Considering three-year expansion project : Wheel Industries is considering a three-year expansion project, Project A. what is the after tax cost of debt for the company?
What is the molarity of an hc2h3o2 solution : Concentrated acetic acid is 13 M. What is the molarity of an HC2H3O2 solution prepared by diluting 30 mL of concentrated acid to a total volume of 500 mL?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Division of computer software into operating systems and

division of computer software into operating systems and appdoes the division of computer software into operating

  Identify the existing gaps and issues within the environment

Identify the existing gaps and issues within the environment. Provide solutions for improvement associated to the gaps identified - zero cost and unlimited budget.

  Discuss the monitoring zones

When discussing security monitoring products, it is important to discuss the monitoring zones. "Monitoring zones are locations where the traffic in those areas.

  Describe any four rights of users of information systems

Describe any four rights of users of information systems. Explain the term virus and explain the differences between Trojan horses and worms. Support your answers with examples.

  Shopping for virtual products in virtual stores

Kimberly-Clark Corp: Shopping for Virtual Products in Virtual Stores. CASE SUMMARY: Summarize the top three points in the case in your own words

  Attack on the playstation network

Briefly summarize the details of the attack on the PlayStation Network, including the dates of when the attack started and was eventually uncovered

  What is the standard time for the task

What is the standard time for the task?- How many observations are needed to assure a 95% confidence level?

  Which is the feature of resource capacity management

CIS 500- Which process reviews operational-level agreements on a regular basis? Where would you expect incident resolution targets to be documented? Which of the following is the feature of Resource Capacity Management?

  What example of this vulnerability category did you find

Cabinet and drawers left unlocked and/or their keys unsecured (even if they are empty).What example of this vulnerability category did you find?

  Does the article provide an adequate literature review

Does it discuss current research on the problem and help to situate the author's own research through a clear analysis/presentation of the literature (think about how it connects to the problem statement)? Is the research question clear and/or pur..

  New ways of using internet for large companiesconsider a

new ways of using internet for large companiesconsider a large company with which you are somewhat familiar with

  Examine risks of going global with an e-commerce business

Compare the major advantages and disadvantages of starting an e-commerce business versus a traditional brick-and-mortar business. Examine the significant risks of going global with an e-Commerce business.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd