Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Security Challenges in Emerging Networks - Overview of Network Security

Purpose of the assessment:

The purpose of this assignment is to develop research and analytical skills. In this assignment students will first learn how to develop knowledge on current state of the art of an emerging knowledge domain. Students will then critically analyse three current or future security issues in this area and its countermeasures. Students should be able to demonstrate their achievements in the following unit learning outcomes:

c. Explain the major methodologies for secure networks and what threats they address;

d. Identify and report network threats, select and implement appropriate countermeasures for network security;

Submission Guidelines

- All work must be submitted on Moodle by the due date along with a title Page.
- The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings.
- Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Assignment Description

The purpose of this assignment is to develop research and analytical skills. In this assignment students will firstly learn how to develop knowledge based on the current state of the art emerging knowledge domains. They will critically analyse three of the current or future security issues in this area and their countermeasures.

Internet of Things (IoT) is a network of ‘‘things''. The term ‘‘thing'' here can constitute any smart device ranging from home appliances, telecommunication, sensor devices used in vehicles/ agricultural sector/homeland security to health monitoring devices inside of (or connected with) a human body. In fact, any device that has the ability to collect and transfer data across the network can be a part of an IoT system. With the introduction of smart cities, smart homes, smart office and smart devices, the Internet of Things (IoT) is an emerging area of incredible potential of growth. However, most of these IoT devices are at risk of being hacked and compromised. Internet of Things (IoT) still have many security issues that need to be solved (i.e, RFID tag security, cyber security, wireless security, network transmission security and privacy protection etc). In this assignment student will work on the security issues and its countermeasures in the area of IoT.

This assignment includes three parts.

1. Literature review of Internet of Things (IoT):

Your review should be supported by at least three (3) academic (journal/conference) papers chosen from the current state of the art. The paper should not be older than four years.

Your discussion should include:

i. Introduction to IoT
ii. Characteristics of IoT compared to the traditional network (please include the variety of devices that are used in IoT).
iii. Discuss three areas of applications for IoT.
2. Analyse critically, three current or future security issues in IoT and its countermeasures In this section you will
i. Explain and analyse critically three security issues in IoT.
ii. Explain the countermeasures/mitigation techniques and tools used for each of the security issues mentioned in section i.

This section must be supported by at least three (3) references (good quality conference or journal paper such as IEEE/ACM/Springer).

3. Create a 3 - 5 minutes presentation and present your work during the Laboratory class.

You have to create a 3 - 5 minutes presentation to present your work in front of your class members and tutor during the Laboratory class in Weeks 11 and 12.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92841722
  • Price:- $80

Guranteed 48 Hours Delivery, In Price:- $80

Have any Question?


Related Questions in Computer Network & Security

It networking assignment -major lab scenario -assessment

IT Networking Assignment - Major Lab Scenario - Assessment Requirements: Subnet an address space with given requirements. Assign appropriate addresses to interfaces and document them in the address table. Build the netwo ...

What comparison of means test was used to answer the

What comparison of means test was used to answer the question I need it now is there a relationship between parents highest level of education and socioeconomic status\need the entire script

From the product designed expanded as follows1 from your

From the product designed expanded as follows. 1. From your list of possible responses to the threat, choose one that you will focus on in this product. Create the requirements for your product by completely identifying ...

This is from a practical exercise the answers are below but

This is from a practical exercise. The answers are below BUT, I do not know how they came up with them. I'd like a step-by-step explanation of how they got the answers. Practical Exercise 1: Assume the demand for teacher ...

Describe 2 variables a government will look at to predict

Describe 2 variables a government will look at to predict where the economy will be in the next six months.

Toms income is 480and he spends it on two goods x and y his

Tom's income is $480and he spends it on two goods, X and Y. His utility function is U = XY. Both X and Y sells for $8 per unit.   a. Use lagrangian function to calculate Tom's utility-maximizing purchases of X and Y.  b. ...

Sip encodingwhy does the session initiation protocol sip

SIP, ENCODING Why does the session initiation protocol SIP allow the sender and receiver to choose two different multimedia encoding schemes? Describe a scenario where it makes sense to use different protocols for sender ...

Prof gs farmer friend claims that aliens made crop circles

Prof G's farmer friend claims that aliens made crop circles in his farm. Using economic theory, prove his farmer friend wrong.

Discussion bulldefine a packet analyzer and describe its

Discussion: • Define a packet analyzer and describe its use • List commonly used packet analyzers (beyond WireShark) • List best practices for analyzing packets • Describe uses (good and bad, ie. hacker) of a packetanaly ...

Overview of network security assessment - security

Overview of Network Security Assessment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As