IT Security Assignment-2.docx - Student Name Sandeep Kumar Kosuri Student No 44742 MITS5004 IT SECURITY Securing the Internet of Things(IOT A Security

IT Security Assignment-2.docx - Student Name Sandeep Kumar...

This preview shows page 1 - 4 out of 6 pages.

Student Name: Sandeep Kumar Kosuri Student No: 44742 MITS5004 IT SECURITY Securing the Internet of Things (IOT): A Security Taxonomy for IOT – Syed S Rizvi, Joseph Pfeffer, Andrew Kurtz Due Date: Session-9 Lecturer: Ibrahim Abdallah Campus: Melbourne SANDEEP KUMAR KOSURI, 44742 1
Image of page 1
INTRODUCTION The main objective of this report is to study and analyze various aspects of internet of things (IoT) and to propose and deploy highly optimal solutions to its various concerned limitations and challenges. Therefore, a highly relevant research paper is taken into account for conducting this research and the name of the nominated research paper is “Securing the internet of things”. In order to analyze various aspects and characteristic features of IoT technology, this report is divided into various significant sections and each section describes a different aspect and perspective of the author internet of things and it various positive and negative aspects. The first section in this report describes intention and main objective of the author to conduct a research on internet of things. First section also describes in brief the overall summary of entire research paper created by the author. Then it is followed by mentioning and describing of a suitable approach and methodology that is taken into consideration by the author to mitigate various security issues associated with IoT based technology. In the end various significant results and conclusions are drawn by the author after observing and validating various aspects of internet of things and its relevant issues. INTENT AND CONTENT The main intention of the author in the nominated research paper is to analyze the currently existing IoT security threats and the actual security requirements of this technology. Author also emphasizes on evaluating the critical domain and sector where IoT technology is being heavily used and implemented. The author initiates with the extensive description and functionalities of various architectural layers of IoT technology namely perception layer, application layer and network layer. In addition, various relationships and connections are also mentioned by the author in this research paper. Then it is followed by the depiction and explanation of various security challenges and risk threats concerned with the IoT technology such as DDoS attack, malware, tamper attack and reverse engineering methodology. After this, author extensively explains the concept and aspect of misconfiguration in accordance with internet of things technology. It is a model that describes trust level and connectivity between various architectural layers of IoT technology. Various factors that come under the misconfiguration concept includes SANDEEP KUMAR KOSURI, 44742 2
Image of page 2
reliability, availability and privacy. Privacy means the extent up to which customer data and
Image of page 3
Image of page 4

You've reached the end of your free preview.

Want to read all 6 pages?

  • Spring '19
  • Sridhar

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes
A+ icon
Ask Expert Tutors