Security challenges in emerging networks

Assignment Help Computer Networking
Reference no: EM131642978

Assessment - Security Challenges in Emerging Networks

Purpose of the assessment

The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:

a. Identify and report network threats, select and implement appropriate countermeasures for network security

b. Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization

c. Demonstrate professional and ethical behaviour with regard to network security.

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Internet of Things (IoT) is an emerging area in computer networking. Internet of Things could refer to a network of devices with embedded technology including Sensors, Radio Frequency Identification tags, actuators, with the ability to continuously sense and exchange data to perform a range of tasks.The IoT will have a major impact on aspects of everyday-lives and behaviour of users. Security of Internet of Things is a prime concern.

This assignment includes four parts

1. Literature review on Internet of Things (IoT)

You need to write 800 word literature on IoT. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

2. Analyse critically, three current or future security issues in IoT.

In this section you will analyse critically, three security issues in Internet of Things. These issues could be taken from the current state of the art or could be evolved from your own independent innovative thinking. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section(2).

In this part you need to apply knowledge to the existing knowledge domain of IoT. You need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11.

Verified Expert

The work is in 2000 words in IEEE format in MS word and PPT where the focus is on handling the IoT and handle the measures which includes the different issues related to the working of the system, security and the privacy measures. this IoT also works with the enhancement of the system level and the practices.

Reference no: EM131642978

Questions Cloud

Define appropriate for the nurse to perform : To ensure safe postoperative care of a client after a total hip arthroplasty, what actions are most appropriate for the nurse to perform
What were the major findings and how were they supported : Summarize what you've learned about the content of the article. What were the major findings? How were they supported?
What would be the consequences for the unemployed : What would be very wrong about government unemployment insurance payments failing to rise during a recession?
Define a patient has been diagnosed as having global aphasia : A patient has been diagnosed as having global aphasia. The nurse recognizes that the patient will be unable to do which of the following actions
Security challenges in emerging networks : Identify and report network threats, select and implement appropriate countermeasures for network security - Security Challenges in Emerging Networks
What security measures are currently in place : What security measures are currently in place in Transportation Logistics Management? Are they effective? Why or why not?
Differentiate among the theory-based teaching strategies : Differentiate among the theory-based teaching strategies, Choose one theory and discuss its application to nursing research and management
Prepare a system flowchart of the sales procedures : HI5019 STRATEGIC INFORMATION SYSTEMS LITERATURE REVIEW ASSIGNMENT. Describes and prepare a system flowchart of the sales procedures
Discuss the effect of the unemployment rate : Discuss the likely effect of each of the following on the unemployment rate: The length of time workers are eligible to receive unemployment insurance payments.

Reviews

len1642978

9/15/2017 1:56:55 AM

Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors Presentation slides /4 Well organised and resourceful Organised and resourceful Resourceful but could be better organised Resourceful slides Neither resourceful nor well organised Oral Presentation /4 Good delivery, easy to follow and good interaction Delivered, easy to follow and provided a level of interaction Delivered and provided a level of interaction Delivered No oral presentation

len1642978

9/15/2017 1:56:47 AM

Analyse Critically /6 Exceptional discussion on security vulnerabilities for the system. Identifying highly sophisticated and well referenced vulnerabilities Exceptional discussion on security vulnerabilities for the system. Discussion on three security vulnerabilities Discussion on Two security vulnerabilities Unable to identify security vulnerabilities Propose a possible solution /6 Advance discussion on threats mitigation using latest technologies and procedures Good discussion on threats mitigation using technologies and procedures Good discussion on threats and mitigation Discussion on threats and mitigation Lacking discussion on threats and mitigation Report Layout /5 Well designed layout and proper formatting in IEEE Conference Style Well designed layout in IEEE Conference style Layout in IEEE Conference style Report layout and formatted but not in IEEE Conference style Report lacks a proper layout

len1642978

9/15/2017 1:56:40 AM

Marking Rubric for Assignment #2: Total Marks 50 Grade Mark HD 40-50 DI 35-39 CR 30-34 P 25-29 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Literature Review /15 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available

len1642978

9/15/2017 1:56:32 AM

Submission Guidelines The assignment should be submitted on the Moodle in two separate files: 1. The report should be submitted as a Word file 2. The presentation should be submitted as a PPT file Marking criteria: Section to be included in the report Description of the section Marks Introduction Introduction of Internet of Things 5 Literature Review Literature review of Internet of Things 15 Analyse critically Analyse critically, three security vulnerabilities of Internet of Things. 6 Propose a possible solution Discuss a threat mitigation technique for one of the security vulnerability 6 Report Layout The report should be written in IEEE conference format 5 Reference style Follow IEEE reference style 5 Presentation Slides The presentation slides should be well organised and clear. 4 Oral Presentation Delivery of the presentation 4 Total 50

len1642978

9/15/2017 1:56:26 AM

• All work must be submitted on Moodle by the due date along with a title Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  Show the bit sequence transmitted for the four-char form

A channel has a bit rate of 4 kbps and a propagation delay of 20 msec. For what range of frame sizes does stop-and-wait give an efficiency of at least 50 percent?

  What is harmonic distortion

In what way would the topic of "harmonic distortion" be applicable to sinusoid generation?

  What are likely reasons for the differences between two

What are the costs of thin client versus thick client architectures? Search the Web for at least two different studies and be sure to report your sources. What are the likely reasons for the differences between the two?

  What windows utility programs arranges

What Windows utility programs arranges pieces of files on your hard drive to allow for faster access?

  Under what conditions should the page be copied locally

That page is initially remote, and it takes C nsec to copy it locally. Under what conditions should the page be copied locally in the absence of significant use by other processors?

  Non-technical analogy for channel partitioning protocols

Provide a non-technical analogy for each of the following, which would allow someone with no computer knowledge to understand the topics: Channel Partitioning Protocols and Random Access Protocols

  Develop a requirements matrix associated with the management

List at least five steps to take to develop a requirements matrix associated with the management of network components and functions.

  What command line assign correct dns server ip address

While troubleshooting a network connection problem for a coworker, you discover the computer is querying a nonexistent DNS server.

  Explain use of windows server network operating system

It has already decided to use Windows Server 2003 network operating system. What type of LAN will your team design for this company?

  Define the repositoryusernames and passwords

Configure the repository and define the repositoryusernames and passwords. Implement configuration and runtime options that in-crease security-explaining why your choices increase security.

  The new subnet mask after the subnetting

Pick a network address from the list below. Everybody must pick a unique network address and number of subnet. Don't select a network address that somebody else already selected. For each of them, I need the following information: The new subnet ma..

  If the same number six of springs are used but uniform

a shaft rotating at 1440 rpm drives a coaxial shaft through a twin-plate disc clutch - i.e. there are 4 frictional

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd