Implement appropriate countermeasures for network security

Assignment Help Computer Network Security
Reference no: EM131645659

Overview of Network Security

Assessment - Security Challenges in Emerging Networks

Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:

- Identify and report network threats, select and implement appropriate countermeasures for network security
- Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization
- Demonstrate professional and ethical behaviour with regard to network security.

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Internet of Things (IoT) is an emerging area in computer networking. Internet of Things could refer to a network of devices with embedded technology including Sensors, Radio Frequency Identification tags, actuators, with the ability to continuously sense and exchange data to perform a range of tasks.The IoT will have a major impact on aspects of everyday-lives and behaviour of users. Security of Internet of Things is a prime concern.

The assignment should be written in IEEE conference format:

This assignment includes four parts

1. Literature review on Internet of Things (IoT)

You need to write 800 word literature on IoT. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

2. Analyse critically,three current or future security issues in IoT.

In this section you will analyse critically, three security issues in Internet of Things. These issues could be taken from the current state of the art or could be evolved from your own independent innovative thinking. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section(2).

In this part you need to apply knowledge to the existing knowledge domain of IoT. You need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

Attachment:- Format.rar

Verified Expert

In this assignment a literature review on IoT is done. After that three current or future security issues in IoT are analyzed. Possible solution for one of the threats identified in second part is also included in this assignment.

Reference no: EM131645659

Questions Cloud

Behavior such as loadexam and also displayexam : Creating a class exam that will hold the actual exam and provide behavior such as loadExam and also displayExam.
Explain what is the best way to hire people in general : Write a well-organized persuasive essay. You may also argue a more general approach: what is the best way to hire people in general?
Protect their data on mobile devices : 1. What technologies can organizations use to protect their data on mobile devices?
Particular company a competitive edge : Research and give an example of how Big Data has given a particular company a competitive edge?
Implement appropriate countermeasures for network security : MN502
How the balanced scorecard with help management : In a minimum of 3 full pages, include the following information: Describe how the balanced scorecard with help management to identify information requirements.
Series of numbers entered by the user : The user should enter each number at the command prompt. The user will indicate that he or she is finished entering the number by entering the number 0.
How is the problem identified : How public policy is formed in the American system of government. How is the problem identified?
Dependencies and conflicts that can occur : Linux software packages have dependencies and conflicts that can occur for numerous reasons. Discuss at least 3 ways they can occur

Reviews

inf1645659

11/20/2017 4:47:11 AM

The solution provided has fit the criteria pretty well the first time around and I would be likely to use this service again in the future. Thank you!

inf1645659

11/20/2017 4:46:33 AM

please read all the instructions and tell me reasonable price for the assignment 24982333_1MN502 2017 T2 Assignment 2 MEL SYD V5.docx Helllo please read all instruction because this assignment cover 20% marks. So please follow a4 format, which i already sended you and i need ppt for 3-4 mins. Please reply asap Word limit of my assignmt is 1500-2000 and i also need ppt. Please reply if u can and then i ll make the payment. Please dont forget to send the plag. Report. Please follow all the instructions. I made the payment please follow all the instructions. This assignment is very important for me

len1645659

9/16/2017 8:50:11 AM

Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors Presentation slides /4 Well organised and resourceful Organised and resourceful Resourceful but could be better organised Resourceful slides Neither resourceful nor well organised Oral Presentation /4 Good delivery, easy to follow and good interaction Delivered, easy to follow and provided a level of interaction Delivered and provided a level of interaction Delivered No oral presentation

len1645659

9/16/2017 8:50:04 AM

Analyse Critically /6 Exceptional discussion on security vulnerabilities for the system. Identifying highly sophisticated and well referenced vulnerabilities Exceptional discussion on security vulnerabilities for the system. Discussion on three security vulnerabilities Discussion on Two security vulnerabilities Unable to identify security vulnerabilities Propose a possible solution /6 Advance discussion on threats mitigation using latest technologies and procedures Good discussion on threats mitigation using technologies and procedures Good discussion on threats and mitigation Discussion on threats and mitigation Lacking discussion on threats and mitigation Report Layout /5 Well designed layout and proper formatting in IEEE Conference Style Well designed layout in IEEE Conference style Layout in IEEE Conference style Report layout and formatted but not in IEEE Conference style Report lacks a proper layout

len1645659

9/16/2017 8:49:57 AM

Marking Rubric for Assignment #2: Total Marks 50 Grade Mark HD 40-50 DI 35-39 CR 30-34 P 25-29 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Literature Review /15 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available

len1645659

9/16/2017 8:49:40 AM

Propose a possible solution Discuss a threat mitigation technique for one of the security vulnerability 6 Report Layout The report should be written in IEEE conference format 5 Reference style Follow IEEE reference style 5 Presentation Slides The presentation slides should be well organised and clear. 4 Oral Presentation Delivery of the presentation 4 Total 50

len1645659

9/16/2017 8:49:33 AM

i send u two files one is assignmnt nd second one is format of assignmnt please read all instructions carefully and send me plag. report with this assignment thanks Marking criteria: Section to be included in the report Description of the section Marks Introduction Introduction of Internet of Things 5 Literature Review Literature review of Internet of Things 15 Analyse critically Analyse critically, three security vulnerabilities of Internet of Things. 6

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd