logo Use CA10RAM to get 10%* Discount.
Order Nowlogo
(5/5)

Internet of Things (IoT) is not a new paradigm; the technological capabilities of society have enabled its immense progression

INSTRUCTIONS TO CANDIDATES
ANSWER ALL QUESTIONS

Introduction

The Internet of Things (IoT) is not a new paradigm; the technological capabilities of society have enabled its immense progression and increased utilisation. Increasingly, there are applications of these varying Internet-enabled ‘things’ in everyday life including automation of many day-to-day operations, healthcare, data analytics, smart buildings, and wearable technology. Worryingly, with IoT devices, practically anything can be connected to the Internet or to another ‘thing’– in many instances we are creating our own problems and a larger attack surface with inherent underlying security issues. For security, “one size fits all” does not work for the complex IoT ecosystem - interoperability issues are important. Secure by Design, Default and in Deployment is imperative in future implementations of such interconnected ‘things’.

You are introducing a new smart device into your network but want to ensure the current network has no vulnerabilities. You are to design and implement a security application to find out information about the network that may be useful for an attacker, and then create a security policy for the network. Device security, network security and introducing future ‘things’ should be considered.

 Learning Outcome to be assessed

 

1. Critically evaluate a complex computer security problem.

2. Apply complex skills relating to security techniques and tools to secure a computer system.

Details of the task Part 1: Implementation

In order to assess the viability of the network in its current form, create a program (in Java) that comprises the following functionality:

Allows the user to scan for devices on the network

Identifies port information and socket information (e.g. domain, type, protocol, hostname)

Saves all information to a file that is encrypted/decrypted with a password

Include guidance for user of the program

Part 2: Design

Detail your design and implementation choices including encryption method used

Consider ways upon which your tool could be extended to include further features

Part 3: Security policy

A Security policy is a statement that partitions the states of a system into a set of authorized or secure states and a set of unauthorized or non-secure states. Now that you have created a program that can find out network information, create a security policy to ensure the network information found by the program are secure, and also focus on ensuring future ‘things’ being introduced into the network are secure.

 

 

(5/5)
Attachments:

Expert's Answer

310 Times Downloaded

Related Questions

. Introgramming & Unix Fall 2018, CRN 44882, Oakland University Homework Assignment 6 - Using Arrays and Functions in C

DescriptionIn this final assignment, the students will demonstrate their ability to apply two ma

. The standard path finding involves finding the (shortest) path from an origin to a destination, typically on a map. This is an

Path finding involves finding a path from A to B. Typically we want the path to have certain properties,such as being the shortest or to avoid going t

. Develop a program to emulate a purchase transaction at a retail store. This program will have two classes, a LineItem class and a Transaction class. The LineItem class will represent an individual

Develop a program to emulate a purchase transaction at a retail store. Thisprogram will have two classes, a LineItem class and a Transaction class. Th

. SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of Sea Ports. Here are the classes and their instance variables we wish to define:

1 Project 1 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of

. Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of Sea Ports. Here are the classes and their instance variables we wish to define:

1 Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of

310 Times Downloaded

Ask This Question To Be Solved By Our ExpertsGet A+ Grade Solution Guaranteed

expert
Atharva PatilComputer science

965 Answers

Hire Me
expert
Chrisantus MakokhaComputer science

538 Answers

Hire Me
expert
AyooluwaEducation

938 Answers

Hire Me
expert
RIZWANAMathematics

610 Answers

Hire Me

Get Free Quote!

265 Experts Online