Purpose IoT is becoming prevalent in a number of technology systems and scena

Important - Read this before proceeding

These instructions reflect a task our writers previously completed for another student. Should you require assistance with the same assignment, please submit your homework details to our writers’ platform. This will ensure you receive an original paper, you can submit as your own. For further guidance, visit our ‘How It Works’ page.

 
Purpose
IoT is becoming prevalent in a number of technology systems and scenarios. This assignment allows you to explore a single scenario in detail with regard to the security vulnerabilities present and the types of mitigation strategies that could be used in a specific scenario or system.
Assignment Instructions
Choose one from the following broad scenarios/systems:
Identification and Tracking Technologies (RFID)
Health Care wearable recording devices worn by patients that transmit data back to a physician.
IoT use in Smart Cities
IoT use in Smart Homes
IoT in Automated Factories
IoT used in environmental monitoring.
You can discuss the broad scenario or select a specific type of device from within this type of system.
Apply the concepts learned in your reading and through research on the Internet to discuss security issues that are unique to the chosen system/scenario. Support what you discuss with specific examples. 
For your chosen scenario, discuss security issues and threats in the following layers of the IoT: 

perception layer
network layer 
application layer 

For your chosen scenario, discuss challenges related to: 

Authentication
Authorization
Access Control (including physical access)

Recommend appropriate mitigation strategies for your chosen scenario. 
 Be sure to cite your sources and provide a reference list.
Assignment Requirements
The paper should be 5–6 pages, use 12 pt. Times New Roman, and be in APA format.

Leave a Comment