Explain the major methodologies for secure networks

Assignment Help Management Information Sys
Reference no: EM132005233

The purpose of this assignment is to develop research and analytical skills. In this assignment students will first learn how to develop knowledge on current state of the art of an emerging knowledge domain.

Students will then critically analyse three current or future security issues in this area and its countermeasures.

Students should be able to demonstrate their achievements in the following unit learning outcomes:

a. Explain the major methodologies for secure networks and what threats they address;

b. Identify and report network threats, select and implement appropriate countermeasures for network security;

Assignment Description

The purpose of this assignment is to develop research and analyticalskills. In this assignment students will firstly learn how to develop knowledge based on the current state of the art emerging knowledge domains. They will critically analyse three of the current or future security issues in this area and their countermeasures.

Internet of Things (IoT) is a network of ‘‘things''. The term ‘‘thing'' here can constitute any smart device ranging from home appliances, telecommunication, sensor devices used in vehicles/ agricultural sector/homeland security to health monitoring devices inside of (or connected with) a human body.

In fact, any device that has the ability to collect and transfer data across the network can be a part of an IoT system. With the introduction of smart cities, smart homes, smart office and smart devices, the Internet of Things (IoT) is an emerging area of incredible potential of growth.

However, most of these IoT devices are at risk of being hacked and compromised. Internet of Things (IoT) still have many security issues that need to be solved (i.e, RFID tag security, cyber security, wireless security, network transmission security and privacy protection etc). In this assignment student will work on the security issues and its countermeasures in the area of IoT.

This assignment includes three parts.

1. Literature review of Internet of Things (IoT):

Your review should be supported by at least three (3) academic (journal/conference) papers chosen from the current state of the art. The paper should not be older than four years.

Your discussion should include:

i. Introduction to IoT

ii. Characteristics of IoT compared to the traditional network (please include the variety of devices that are used in IoT).

iii. Discuss three areas of applications for IoT.

2. Analyse critically, three current or future security issues in IoT and its countermeasures

In this section you will

i. Explain and analyse critically three security issues in IoT.

ii. Explain the countermeasures/mitigation techniques and tools used for each of the security issues mentioned in section i.

This section must be supported by at least three (3) references (good quality conference or journal paper such as IEEE/ACM/Springer).

3. Create a 3 - 5 minutes presentation and present your work during the Laboratory class.

You have to create a 3 - 5 minutes presentation to present your work in front of your class members and tutor during the Laboratory class in Weeks 11 and 12.

Reference no: EM132005233

Questions Cloud

Write a memo for the tax files in response to ms bell : Does Owl have to include the dividends in its computation of ACE, thus avoiding any AMT? Write a memo for the tax files in response to Ms. Bell
Write about political factors for a business case : You need to write about Political, Economic, Social, Technological Factors. For a business case that attached. and also for more information please check
How much would be in your savings account in eight years : How much would be in your savings account in eight years after depositing $210 today if the bank pays 8 percent per year?
Determine the amount of net income before tax for company : The company paid $36,000 of previous inventory purchases on account. Determine the amount of net income before tax for the company
Explain the major methodologies for secure networks : MN502:Explain the major methodologies for secure networks and what threats they address;
Find what is the aftertax cost of debt : Mudvayne, Inc., is trying to determine its cost of debt. The firm has a debt issue outstanding with 18 years to maturity that is quoted at 107 percent of face.
Compute the current ratio and the receivables turnover ratio : Compute the current ratio and the receivables turnover ratio for Horn at December 31, 2010. Use these measures to analyze Horn's liquidity
How has the us dollar fared against a basket of currencies : Suppose the US trades only with Canada, the Eurozone, and China, and the shares of trade with them are 40%, 30%, and 30% respectively.
Image of god before the fall : Who wrote On the Dignity of Man which stated that man was made in the image of God before the fall and as Christ after the Resurrection.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd