Recent Question/Assignment

Assessment Details:
Internet-of-Things (IOT) has been considered as a necessary part of our daily life with billions of IoT devices collecting data through wireless technology and can interoperate within the existing Internet infrastructure. IoTs play important role in many applications including; smart home, smart cities, environmental monitoring, health care, and smart businesses. It is expected the number of IoT devices will surpass 50 billion by 2020. This drawn the attention of attackers who seek to exploit them for their own benefit. Basically, IoT brings along a plethora of potential security and privacy risks to the end-users. The risk to IoT devices from a network attack has increased exponentially.
Threats to IoT can occur at any point on the internet where there is a potential weakness that hackers can exploit using different types malware. As the number of devices grows, the potential for attack and disruption increases.
Assume you are working as an IT security consultant at the IT department of ABC company. The company uses different types of IoT devices to collect very important data. As an IT consultant, you want to study the security and privacy challenges for IoTs. In this context write a report including the following sections:
1. Introduction of IoT devices, types and its applications.
2. Discussion and compare three recent variants of attacks against IoT devices. You comparisons must include table summarize the main points.
3. Identify and evaluate the three various countermeasures and formal security protection techniques against IoT attacks.
4. Discussion of two authentication protocols specified to IoT devices.
5. Summary
6. References in Harvard style.
Marking Criteria and Rubric: The assessment will be marked out of 100 and will be weighted 20% of the total unit mark

Looking for answers ?


Recent Questions

ECONOMICS FOR BUSINESS STUDIES (ECO745)CASE STUDYAnswer both case studies provided below (Total: 100 marks).CASE STUDY 1:AIRASIA INDIA: CLASH FOR THE INDIAN SKIESOn May 7, 2014, AirAsia’s founder received...Prepare 15 minute presentation of your assigned topic.Provide outline,Provide 4 reference one must be text book.( attached – Also attached page content must be used in presentation as appropriate).Power...Students are required to Discuss safety hazards for the scenario below. When managing a construction site, we need to control the hazards associated with the work undertaken. Write a report on the following...ASSESSMENT BRIEFSubject Code and Name STAT6003 : Statistics for Financial DecisionsAssessment Assessment 2: PresentationIndividual/Group IndividualLength Max 10 slides/ 5 mins presentation to the classLearning...Written AssignmentBusiness Management Skills(DIPMB3_AS_v3)Student identification (student to complete)Please complete the fields shaded grey.Student numberWritten Assignment result (assessor to complete)Result...Ground and Water Studies 2 Tutorial 1Question 1i) Explain the purpose of “Mohr’s stress circles”. Sketch a Mohr’s stress circle diagram for the situation where a triaxial compression test on a cylindrical...Assessment DetailsQualification Code/Title FNS60215- Advanced Diploma of AccountingAssessment Type Assessment -2 Time allowedDue Date Location AHIC Term / YearUnit of CompetencyNational Code/Title FNSINC602-Interpret...Show All Questions