Wednesday, May 6, 2020

IOT Security Application-Free-Samples for Students-Myassignment

Question: Discuss about the IoT Security Application. Answer: IoT Security Application Internet of Things (IoT) is a discipline that involves the amalgamation of a variety of devices and networks to achieve a common set of goals and objectives. There is an involvement of numerous devices in the applications that are based on IoT such as computing devices, small and large electrical appliances, and mobile devices and may more. The IoT applications are being used in the business sectors and industries all across the globe. There are certain security issues that are associated with these applications and solutions. The reason behind the occurrence of the security events and occurrences is because of the involvement of varied devices and networks in the applications. This leads to the presence of a number of access points which allow the attackers to gain an easy entry to the application. The security risks and threats such as network security attacks, attacks on the database of the application and the threats to the devices are associated with these IoT applications. There are many solutions that have been developed in order to overcome the security attacks. However, the organizations need to integrate a number of different security solutions to resolve, detect, prevent and control these security risks and threats (Abomhara, 2015). Some of the common issues in association with the IoT application include the breaching of data and information. The malicious entities find it easy to breach into the application and its components that have an adverse impact on the privacy and confidentiality of th e application information. Many of the denial of service and flooding attacks are also executed on the application so that the availability of the application is hampered and the customer experience that is earned on the application is deteriorated. Many of the malware have been developed to cause damage to the information and data that is associated with the application (Bertino, 2016). There are also many threats that are associated with the devices that are involved in the application. These devices may get lost or the attackers may steal the devices from the device owners to have a negative impact on the application security. It is necessary to come up with an integrated solution comprising of different security mechanisms and protocols to control the security threats and attacks. IoT security application has therefore been proposed to be developed and deployed to provide an integrated IoT security solution. The solution will include the network security controls such as network monitoring tools and network based intrusion detection and prevention systems. These tools will automatically detect the activities that are carried on the networks and any attempt by the intruders to enter the networking channels. Also, the IoT security solution must comprise of the solutions to the database security. The advanced access control along with two-factor authentication will be included in the application to enhance the database related security. Other measures such as secure monitoring and control, maintenance of the logs and anti-denial and anti-malware tools will be included in the application to provide an integra ted solution. The solution shall also have automated tracking and monitoring tools present in it. These tools will be of great aid in case of stealing or loss of the devices (Zolanvari, 2016). Technology is an important aspect that has provided the users all across the globe with the ability to execute a number of operations and processes with much ease and simplicity. In case of the IoT applications, there is a large set of transformation that has been introduced for the home and business users. However, there are certain security issues that are associated with these tools and applications that shall be targeted and resolved. These issues have a direct impact on the information properties such as integrity, confidentiality and availability of the information. It also leads to loss of the organization reputation and deterioration of the customer satisfaction level (Marsan, 2015). IoT security application is an initiative that has been taken in order to make sure that such negative impacts are not resulted. It is an integrated solution that will also be extremely cost-effective in nature. The implementation of standalone security solutions proves to be extremely costly for the organizations. The integrated set overcome such issues and will also easily detect and prevent the security risks and attacks in association with the IoT applications. Progress Report Name: Student Name Project Title: IoT Security Application Week No: 1 Date: 18th August 2017 Planning Milestone Planned Actual Comment Project Plan A detailed plan comprising of the scope of the project along with project estimates and communication details A project plan document comprising of project scope, work breakdown structure, Gantt chart, project budget, allocation of roles and communication plan The project plan is successfully created and delivered Application Design and Source Code The design of the IoT Security application in the form of design diagrams and wireframes along with the source code for the application Design document comprising of the UI/UX screens, wireframes, use case diagrams, data flow diagrams and sequence diagrams. Source code of the application. In-process Closure Report The report comprising of the activities covered in the project along with lessons acquired and acceptance of sign offs A detailed closure report consisting of the step by step activities executed and the lessons acquired by the team members of project and details of sign offs To be started Issues Description Date Action/Results Finished (Y/N) Technical Feasibility Issues 18th August 2017 There are many sub-tools and applications that are to be integrated in the IoT security application that are required to be included in a single application. The technical feasibility includes the issues associated with the compatibility and inter-operatibility of the application. There are steps taken to bring all of these tools on a single platform. Y Planning and Analysis Issues 18th August 2017 There is an enhanced planning activity that shall be carried out in association with the application so that all of the activities shall be completed successfully. The automated tools were used in the planning phase to make the process easier. Y References Abomhara, M. (2015). Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks. Retrieved 18 August 2017, from https://www.riverpublishers.com/journal/journal_articles/RP_Journal_2245-1439_414.pdf Bertino, E. (2016). Data Security and Privacy in the IoT. Retrieved 18 August 2017, from https://openproceedings.org/2016/conf/edbt/paper-a.pdf Marsan, C. (2015). The Internet of Things: An Overview. Retrieved 18 August 2017, from https://www.internetsociety.org/sites/default/files/ISOC-IoT-Overview-20151014_0.pdf Zolanvari, M. (2016). IoT Security: A Survey. Retrieved 18 August 2017, from https://www.cse.wustl.edu/~jain/cse570-15/ftp/iot_sec.pdf

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.