Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Assignment Description

The purpose of this assignment is to develop research and analytical skills. In this assignment students will firstly learn how to develop knowledge based on the current state of the art emerging knowledge domains. They will critically analyse three of the current or future security issues in this area and their countermeasures. Internet of Things (IoT) is a network of ‘‘things''.

The term ‘‘thing'' here can constitute any smart device ranging from home appliances, telecommunication, sensor devices used in vehicles/ agricultural sector/homeland security to health monitoring devices inside of (or connected with) a human body.

In fact, any device that has the ability to collect and transfer data across the network can be a part of an IoT system. With the introduction of smart cities, smart homes, smart office and smart devices, the Internet of Things (IoT) is an emerging area of incredible potential of growth.

However, most of these IoT devices are at risk of being hacked and compromised. Internet of Things (IoT) still have many security issues that need to be solved (i.e, RFID tag security, cyber security, wireless security, network transmission security and privacy protection etc). In this assignment student will work on the security issues and its countermeasures in the area of IoT.

This assignment includes three parts.

1. Literature review of Internet of Things (IoT): Your review should be supported by at least three (3) academic (journal/conference) papers chosen from the current state of the art. The paper should not be older than four years. Your discussion should include:

i. Introduction to IoT

ii. Characteristics of IoT compared to the traditional network (please include the variety of devices that are used in IoT).

iii. Discuss three areas of applications for IoT.

2. Analyse critically, three current or future security issues in IoT and its countermeasures In this section you will

i. Explain and analyse critically three security issues in IoT.

ii. Explain the countermeasures/mitigation techniques and tools used for each of the security issues mentioned in section i. This section must be supported by at least three (3) references (good quality conference or journal paper such as IEEE/ACM/Springer).

3. Create a 3 - 5 minutes presentation and present your work during the Laboratory class. You have to create a 3 - 5 minutes presentation to present your work in front of your class members and tutor during the Laboratory class in Weeks 11 and 12.

Submission Guidelines

The assignment should be submitted on the Moodle in two separate files:

1. The report should be submitted as a Word file.

2. The presentation should be submitted as a PPT file.

Marking criteria:

Section to be included in the report

1. Introduction : Introduction of IoT. Introduction should also contain what this report covers and any background information that is needed for marker to understand the report.

2. Literature Review: Literature review of IoT.

3. Security Threats: Analyse critically, three security threats of IoT.

4. Threat Mitigation Techniques and tools: Discuss the threat mitigation techniques and tools used for each one of the security vulnerabilities mentioned in the report.

5. Report Layout : The report layout should be appropriate (following the submission guidelines and containing all the sections mentioned above).

6. Reference style: Follow IEEE reference style.

7. Presentation Slides: The presentation slides should be well organised and clear. Oral Presentation Delivery of the presentation (which includes quality of the presentation, depth of knowledge on the material presented and ability to answer questions asked by the audience)

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92832482

Have any Question?


Related Questions in Management Information System

Suppose host a wants to send a file of size f 1500 bytes

Suppose Host A wants to send a file of size F = 1500 bytes to Host B. The path from Host A to Host B has three links having rates R 1 = 500 kbps, R 2 = 1 kbps, and R 3 = 2 Mbps, respectively. Assume there is no other tra ...

Write two-page 1000 words paper1 articulate your own point

Write two-page [1000 words] paper: 1. Articulate your own point of view on how the network neutrality issue should be addressed and regulated? 2. What are the effects of the current network neutrality regulations on the ...

Read cybercrime deterrence and international legislation

Read "Cybercrime Deterrence and International Legislation: Evidence From Distributed Denial of Service Attacks," by Hui, Kim, and Wang, from MIS Quarterly (2017). Refer to this reading when completing Topic 8 DQ1. Read " ...

Assignment erm roadmapthe following material may be useful

Assignment : ERM Roadmap The following material may be useful for the completion of this assignment. You may refer to the documents titled "Embracing Enterprise Risk Management: Practical Approaches for Getting Started" ...

Your company wants to develop special resources for project

Your company wants to develop special resources for project managers in its new project management office. There are many approaches to financial analysis of prospective projects. Having an idea of how project budgets ca ...

Discussion1 300 word discussion apa format no plagiarism2-3

Discussion1: 300 word discussion. APA format. No Plagiarism.2-3 references. APA citation. Question 1: What are the challenges which are inherent in emerging technologies that scenario planning address? Question 2: What a ...

Create an infographic using an infographic maker such as

Create an infographic using an infographic maker, such as Piktochart, Venngage, or Canva, displaying an organization chart showing the following: The job titles provided in your summary and how they fit in with the exist ...

Question 1 explain about the scenario planning challenges

Question : 1. Explain about the scenario planning challenges in disruptive Technologies? 2. What are the key traps to avoid when scenario planinng?

Problem i answer each piece in 75-150 words with reference

Problem I (Answer each piece in 75-150 words with reference but do not quote) What is data mining? In your answer, address the following: - Is it another fad? - Out of the three pre-requisite data science skills (databas ...

Q1 explain how managers strive to understand customers

Q1: Explain how managers strive to understand customers' preferences in the Lumpy market for new technologies? Q2: What are the constraints faced by companies as they strive to meet customers' needs in a lumpy market? Ea ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As