VU21990 Recognise the need for cyber security

Assignment Help Computer Network Security
Reference no: EM133150660

VU21990 Recognise the need for cyber security in an organisation - Victoria University

Assessment - IoT Implementation

Business and Arts - IT Studies

IoT Implementation

This assessment will require tasks to be completed on a Raspberry Pi, communicating within a group as well as several written questions to complete. You will need to address the points within this document.

In this assessment you will cover the following topics:

- IoT Devices

Scenario

Business Background
Jim's Trade Supplies (JTS) is a small supply company providingtradies with the tools, fasteners and industrial supplies they need.
JTSstock a number of trusted brands, like Bolle, Paslode, Powers, Bostik, Lufkin, Makita, and ProSafety, to suit tradies needs perfectly. Frequently putting our trade supplies products through onsite testing as well as controlled environment testing to make sure that we understand its capabilities.
JTS believe that a sale does not end as soon as you walk out. Their customers are not just lost in the system - JTS follow it through from beginning to end, recordingallpurchases. In the unlikely event of a warranty claim or theft, customers are covered; JTS have recordsof all purchases from years ago, meaning customers do not have to find them to prove proof of purchase.
JTS ask that you sit back, relax and enjoy the experience in dealing with a reputable, honest South Australian Company who delivers on their promises and listens to you.
Our customers can have complete confidence in their purchases.
JTS comprise of the
• Owner (Manager) - Jim Strutz
• Admin Support x 2
• Sales Team x 3
• Delivery Driver x 2

Requirements
JTS has just won a tender to supply stock to the Australia Defence Force. As part of final sign-off, JTS must ensure that their ICT infrastructure meets the required ADFsecurity levels.
As the IT Works "Desktop Specialist", you will be working with JTS to implement the needed ICT Infrastructure changes to meet the required ADF security standards.

Task A - IOT Device 1 -Create ISP Internet Speed Monitoring Device

Jim from JTS and his team have been experiencing internet speed issues which are causing problems for standard business operations. Jim has spoken with the iiNet support team but has been told that he needs to provide some speed net data prior to the issue being resolved. The ITWorks manager has had a great idea that he / she thinks you can have a bit of fun with as it involves some IoT technology.
You need to:
• Briefly describe your understanding of theISP Internet Speed Monitoring DeviceProject.(approx. 100 - 150 words)
• Program the Raspberry PI to capture ISP speeds using the Speednet site resource as the guide.
• Create a csv output file demonstrating the captured data of the working ISP Internet Speed Monitoring Device. Save it as JTS_speedtest_YOURINITIALS.csv.
• Create a directory named JTS_speedtest_YOURINITIALS to store the file locally.
• Automate the process using crontab run the script every 30 minutes.
NOTE: You will need to thoroughly collate the above images and present them using the following organisation document (exampledoc for basic layout etc), including the speednet csv file and upload to Learn for assessment.

Task B- IOT Device 2 - CreateIOT Device of your choice:

The ITWorks manager was impressed with what you have been able to do with the internet speed monitoring device. Your manager wants you to collaborate with your ITWorks peers to come up with and agree on another IoT project.
Your need to:
• Work in a small group of 2 - 3 people researching and discussing some Raspberry Pi projects that would be beneficial to JTS (external students will be assigned groups - please email your lecturer for details).
o IMPORTANT: Use the Student-Subject Forum to reach out to other students within the subject to make groups. This is done by either responding to a student post request link or by creating your own post by clicking the ‘Add a new discussion topic'. If you get stuck please contact your subject lecturer to assist and they will add you to a group.
• All communication needs to be recorded, kept and included with your submission which can be either:
o Group emails.
o Group Skype text chat.
o NOTE: All students need to actively contribute to the discussion by voicing opinionsregarding project ideas etc.
• Once you have mutually decided on a project you then need to individually:
o Briefly describe your understanding of the IoT Project you have chosen (approx. 100 - 150 words).
o Configure the device to the project requirements, thoroughly recording your steps with screen captures along the way.
o Provide screen captures demonstrating your working IoT device
• You need to provide a link within the submission document to the project details you followed.
• IMPORTANT: You need to include details that indicates it's your own work egstudentID/FirstNameLastName for output folders and file names etc.

Attachment:- Recognise the need for cyber security in an organisation.rar

Reference no: EM133150660

Questions Cloud

Calculate the fixed and variable costs allocated : A company incurred $40,000 of common fixed costs and $60,000 of common variable costs. Calculate the fixed and variable costs allocated
Who lives in the neighborhood : Write an essay about a neighborhood in Southern California that you love. Some of your audience members have probably visited it, but you can't assume that ever
Do you have the entrepreneurial spirit : Good afternoon, Could you please answer these questions as a few paragraph for each discussion?
Compute sheridan company accounts receivable turnover : In 2022, Sheridan Company has net credit sales of $1,692,000 for the year. Compute Sheridan Company's accounts receivable turnover
VU21990 Recognise the need for cyber security : VU21990 Recognise the need for cyber security in an organisation Assignment Help and Solution, Victoria University - Assessment Writing Service
Calculate the accounts receivable turnover : Presented here is basic financial information (in millions) from the annual reports of Oriole and Sheffield. Calculate the accounts receivable turnover
Why is carbon dioxide considered the main greenhouse gas : -Why is carbon dioxide considered the main greenhouse gas? How could an increase in water vapour create either a positive or negative feedback effect?
Describe elements of spirit airlines mission and vision : -Describe elements of Spirit Airlines Mission and Vision statements that reflect the organization's commitment to the greater social good
How did the american economy change after 1973 : "Reinventing the American Dream"-Christopher Jencks How did the American economy change after 1973?

Reviews

len3150660

5/25/2022 12:01:26 AM

Hi, It is an Internet of things assessment that includes two tasks using Raspberry Pi, I need it done asap I have attached an activity document that would help in the first task

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd