SlideShare a Scribd company logo
1 of 26
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&att… 1/11
2719.202010 - FALL 2019 - ACCESS CONTROL (ISOL-531-
08) - SECOND BI-TERM
Research Paper: IoT Security - Draft
Suma Reddy
on Sun, Nov 24 2019, 10:55 PM
65% highest match
Submission ID: 87817bbd-f9da-43ad-9f99-9f10168b7bbf
Attachments (1)
Reddy_Suma_IoT.docx
1 INTERNET OF THINGS
INTERNET OF THINGS (IOT) SUMA REDDY
2 UNIVERSITY OF CUMBERLANDS
Introduction:
2 INTERNET OF THINGS ALLOWS US TO CONNECT
ELECTRONIC AND
EMBEDDED DEVICES AROUND US WITH INTERNET. The
detailed answer is given
below. Internet of things is extension of internet connectivity on
day to day devices. The
electronic devices can be connected to each other via internet
and they can communicate with
each other, even remotely. So this allow us to handle electronic
devices without being
physically present near device. As device is connected to
internet and you can operate it
remotely using internet too. It allows automation. 2 IT CAN BE
HELPFUL IN
MEDICAL AND HEALTHCARE, WHERE DIGITIZED
HEALTHCARE SYSTEMS
ARE CREATED AND ALSO ALLOWS REMOTE HEALTH
MONITORING AND
EMERGENCY NOTIFICATION ETC. IOT CAN ALSO BE
USED IN TRANSPORT,
BUILDING AND HOME AUTOMATION, MANUFACTURING,
ENVIRONMENTAL
(http://safeassign.blackboard.com/)
Reddy_Suma_IoT.docx
Word Count: 898
Attachment ID: 2379284715
65%
http://safeassign.blackboard.com/
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&att… 2/11
MONITORING AND MANY MORE FIELDS. (SHARMA, 2016)
SECURITY
THREATS AND ISSUES WITH INTERNET OF THINGS:
IT HAS A SECURITY THREAT AND THEY CAN BE
HACKED. FOR EXAMPLE,
CAMERAS CAN BE HACKED WHICH CAUSES INVASION
OF PRIVACY. As
number of devices grows in an organization and organization
uses IOT, the chance of
unprecedented attack increases that hampers security issue of an
organization because what
attack over your data and devices you got today that may not be
face by the organization
professionals never before. (Sharma, 2016) When digital
speakers are turned off, they still use
voice control sometimes to turn back on. So the speakers still
have access to any conversations
or any music or noise going on without even user realizing it.
This can be used against the user
by hackers.
Data privacy: The Internet of Things represent collection of
data, storage and investigation
systems to a more noteworthy scale. 3 THERE ARE AN EVER
INCREASING
NUMBER OF DEVICES ASSOCIATED WITH THE INTERNET
AND THERE ARE
ADDITIONALLY MORE COMPONENTS THAT REQUIRE
SECURITY AND
PRIVACY: THE DEVICE ITSELF, THE SYSTEM, THE
APPLICATION OR THE
STAGE THAT IT UTILIZING. 4 (MASUMSADIQUE, 2018)
TECHNICAL
VULNERABILITIES IN AUTHENTICATION: 3 THE IOT
WORKS WITH
DEVICES OF VARIOUS NATURE THAT WILL BE
ASSOCIATED WITH THE
INTERNET AND GATHER CLIENT DATA IN THE CLOUD
THROUGH THE
INSTRUMENT ITSELF. One errand to do is to work inside and
out on the verification
instruments to guarantee the protection of the user. (Park, 2019)
Human factor: 3 THE
INTERNET OF THINGS IS A GENERALLY NEW
INNOVATIVE DEVELOPMENT.
NUMBNESS OF IOT SECURITY, BOTH BY
ORGANIZATIONS AND INDIVIDUAL
CLIENTS, LIKEWISE EXPANDS THE RISK OF CYBER
SECURITY BECAUSE OF
ABSENCE OF EXPERIENCE AND THE HUMAN FACTOR.
Data encryption: the transmission of data by non-encoded
implies presents a significant
security issue. 3 CONSIDER ADDITIONALLY THE
SIGNIFICANCE OF SYSTEM
SECURITY, SINCE THE IOT IS COMMONLY CENTERED ON
CELL PHONES OF
DIFFERENT SORTS AND PREVALENTLY WIRELESS
NETWORKS.
(MasumSadique, 2018). Security and privacy always more in
digitally connected systems and
environments. (Fake companies, stolen identities). DATA and
Complexity risk is also there
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&att… 3/11
because the IOT system generates huge amount of data so
generates complexity to manage
that.
Complex system: 3 THE MORE DEVICES, INDIVIDUALS,
COMMUNICATIONS
AND INTERFACES, THE MORE THE RISK FOR
INFORMATION SECURITY
ADDITIONALLY INCREMENTS. IT IMPLIES THAT THERE
IS MORE
ASSORTMENT AND DECENT VARIETY IN THE NETWORK,
SO THE TEST OF
DEALING WITH ALL FOCUSES IN THE SYSTEM TO BOOST
SECURITY. 4
THESE ARE JUST SOME OF THE CHALLENGES OF
EXTENDING IOT DEVICES
AND CLOUD APPLICATIONS AND THEIR SECURITY
RISKS. (MasumSadique,
2018) Steps to mitigate these risks:
5 THE STEPS TO BE TAKEN TO MITIGATE THE RISK
INCLUDES HAVING THE
MORE SECURE ARCHITECTURE AND DIFFICULT TO
HACK FOR HACKERS.
THE SAFETY SHOULD BE KEPT IN MIND WHILE
DEVELOPING APPLICATION
FOR DEVICE. SO IF A DEVICE FAIL OR ANY EXCEPTION
OCCUR, THE
PHYSICAL HARM SHOULDN'T BE DONE. 2 WE CAN ALSO
CONSIDER ENTIRE
IOT ECOSYSTEM. ADDING INTELLIGENCE TO DEVICES
CAN ALSO HELP. 4
PARTNERING WITH A SECURITY EXPERT CAN MAKE A
BIG DIFFERENCE
DURING YOUR IOT DEPLOYMENTS. AN IOT SECURITY
EXPERT WILL HAVE
THE KNOWLEDGE AND EXPERIENCE TO HELP YOU
COMPLETE THE
DETAILED IOT RISK ASSESSMENTS, UNCOVER IOT-
SPECIFIC
VULNERABILITIES, CONDUCT PEN TESTING OR ETHICAL
HACKING ON
YOUR NEW OR EXISTING IOT DEVICES, AND FUTURE-
PROOF YOUR IOT
EFFORTS. 6 EVEN WITH THE MOST HIGHER
TECHNOLOGY, THE MOST
EFFECTUAL SECURITY SYSTEMS, AND BEST INTENDED
PREVENTIVE
WHEEL, A COMPANY IS DATA WILL AT RELAX BE AT
SOME RISK. (PARK,
2019)NEW AND SOPHISTICATED CYBER-ATTACK ARE
SHAPED EVERY DAY,
WITH PRESSURE COMING FROM PROFIT FORCED
CRIMINALS, HACKERS
WITH VARIOUS AGENDAS, UNSCRUPULOUS
COMPETITORS, AND EVEN
FOREIGN GOVERNMENTS. But you have to move toward
your cyber security in a clever
and regular way, implement a strategic array of
countermeasures that keep many points of
weakness for your network, servers, desktops, and smart
phones.
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&att… 4/11
Implemented properly, you can very much decrease your
security risk to the point that you
can feel sure that you can prevent security breaches.
References
Ali, B. (2018). 7 CYBER AND PHYSICAL SECURITY
VULNERABILITY
ASSESSMENT FOR IOT-BASED SMART HOMES. MDPI.
Brous, P. (2019). 1 THE DUAL EFFECTS OF THE INTERNET
OF THINGS (IOT): A
systematic review of the benefits and risks of IoT adoption by
organizations. International
Journal of Information Management.
MasumSadique, K. (2018). 4 TOWARDS SECURITY ON
INTERNET OF THINGS: 1
APPLICATIONS AND CHALLENGES IN TECHNOLOGY.
International Journal of
Information Management.
Park, M. (2019). Security Risk Measurement for Information
Leakage in IoT-Based Smart
Homes from a Situational Awareness Perspective. NCBI.
Sharma, V. (2016). A review paper on “IOT” & It‟s Smart. 8
INTERNATIONAL
JOURNAL OF SCIENCE, ENGINEERING AND
TECHNOLOGY RESEARCH.
Citations (8/8)
1 https://en.wikipedia.org/wiki?curid=12057519
2 Another student's paper
3 Another student's paper
4 Another student's paper
5 Another student's paper
6 Another student's paper
7 Another student's paper
8 Another student's paper
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&att… 5/11
Matched Text
Suspected Entry: 100% match
Uploaded - Reddy_Suma_IoT.docx
INTERNET OF THINGS
Source - https://en.wikipedia.org/wiki?
curid=12057519
Internet of things
Suspected Entry: 69% match
Uploaded - Reddy_Suma_IoT.docx
INTERNET OF THINGS (IOT) SUMA REDDY
Source - https://en.wikipedia.org/wiki?
curid=12057519
"Internet of Things (IoT)
Suspected Entry: 70% match
Uploaded - Reddy_Suma_IoT.docx
THE DUAL EFFECTS OF THE INTERNET OF
THINGS (IOT)
Source - https://en.wikipedia.org/wiki?
curid=12057519
"Internet of Things (IoT)
Suspected Entry: 63% match
Uploaded - Reddy_Suma_IoT.docx
APPLICATIONS AND CHALLENGES IN
TECHNOLOGY
Source - https://en.wikipedia.org/wiki?
curid=12057519
Challenges, Advances, and Applications
Suspected Entry: 100% match
Uploaded - Reddy_Suma_IoT.docx
UNIVERSITY OF CUMBERLANDS
Source - Another student's paper
University of the Cumberlands
Suspected Entry: 85% match
Uploaded - Reddy_Suma_IoT.docx
INTERNET OF THINGS ALLOWS US TO CONNECT
ELECTRONIC AND EMBEDDED DEVICES
AROUND US WITH INTERNET
Source - Another student's paper
IOT allows us to connect electronic and embedded
devices around us with internet
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&att… 6/11
Suspected Entry: 77% match
Uploaded - Reddy_Suma_IoT.docx
IT CAN BE HELPFUL IN MEDICAL AND
HEALTHCARE, WHERE DIGITIZED HEALTHCARE
SYSTEMS ARE CREATED AND ALSO ALLOWS
REMOTE HEALTH MONITORING AND
EMERGENCY NOTIFICATION ETC
Source - Another student's paper
It allows automation and it can help in medical,
healthcare, where digitized healthcare systems create
and allows remote health monitoring and emergency
notification
Suspected Entry: 100% match
Uploaded - Reddy_Suma_IoT.docx
IOT CAN ALSO BE USED IN TRANSPORT,
BUILDING AND HOME AUTOMATION,
MANUFACTURING, ENVIRONMENTAL
MONITORING AND MANY MORE FIELDS
Source - Another student's paper
IOT can also be used in transport, building and home
automation, manufacturing, environmental monitoring
and many more fields
Suspected Entry: 64% match
Uploaded - Reddy_Suma_IoT.docx
(SHARMA, 2016) SECURITY THREATS AND
ISSUES WITH INTERNET OF THINGS
Source - Another student's paper
Security risks and issues with internet of things
Suspected Entry: 99% match
Uploaded - Reddy_Suma_IoT.docx
IT HAS A SECURITY THREAT AND THEY CAN BE
HACKED
Source - Another student's paper
· It has a security threat and they can be hacked
Suspected Entry: 87% match
Uploaded - Reddy_Suma_IoT.docx
FOR EXAMPLE, CAMERAS CAN BE HACKED
WHICH CAUSES INVASION OF PRIVACY
Source - Another student's paper
For example cameras can be hacked which causes
raid of privacy
Suspected Entry: 100% match
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&att… 7/11
Uploaded - Reddy_Suma_IoT.docx
WE CAN ALSO CONSIDER ENTIRE IOT
ECOSYSTEM
Source - Another student's paper
We can also consider the entire IOT ecosystem
Suspected Entry: 100% match
Uploaded - Reddy_Suma_IoT.docx
ADDING INTELLIGENCE TO DEVICES CAN ALSO
HELP
Source - Another student's paper
Adding intelligence to devices can also help
Suspected Entry: 81% match
Uploaded - Reddy_Suma_IoT.docx
THERE ARE AN EVER INCREASING NUMBER OF
DEVICES ASSOCIATED WITH THE INTERNET
AND THERE ARE ADDITIONALLY MORE
COMPONENTS THAT REQUIRE SECURITY AND
PRIVACY
Source - Another student's paper
There are an ever increasing number of gadgets
associated with the Internet and there are likewise
more components that require security
Suspected Entry: 68% match
Uploaded - Reddy_Suma_IoT.docx
THE DEVICE ITSELF, THE SYSTEM, THE
APPLICATION OR THE STAGE THAT IT UTILIZING
Source - Another student's paper
the gadget itself, the system, the application or the
stage that it employments
Suspected Entry: 88% match
Uploaded - Reddy_Suma_IoT.docx
THE IOT WORKS WITH DEVICES OF VARIOUS
NATURE THAT WILL BE ASSOCIATED WITH THE
INTERNET AND GATHER CLIENT DATA IN THE
CLOUD THROUGH THE INSTRUMENT ITSELF
Source - Another student's paper
The IoT works with gadgets of various nature that will
be associated with the Internet and gather client
information in the cloud through the instrument itself
Suspected Entry: 79% match
Uploaded - Reddy_Suma_IoT.docx
THE INTERNET OF THINGS IS A GENERALLY
NEW INNOVATIVE DEVELOPMENT
Source - Another student's paper
The Internet of Things is a generally new mechanical
development
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&att… 8/11
Suspected Entry: 85% match
Uploaded - Reddy_Suma_IoT.docx
NUMBNESS OF IOT SECURITY, BOTH BY
ORGANIZATIONS AND INDIVIDUAL CLIENTS,
LIKEWISE EXPANDS THE RISK OF CYBER
SECURITY BECAUSE OF ABSENCE OF
EXPERIENCE AND THE HUMAN FACTOR
Source - Another student's paper
Numbness of IoT security, both by organizations and
individual clients, likewise expands the dangers of
cybersecurity because of absence of experience and
the human factor
Suspected Entry: 73% match
Uploaded - Reddy_Suma_IoT.docx
CONSIDER ADDITIONALLY THE SIGNIFICANCE
OF SYSTEM SECURITY, SINCE THE IOT IS
COMMONLY CENTERED ON CELL PHONES OF
DIFFERENT SORTS AND PREVALENTLY
WIRELESS NETWORKS
Source - Another student's paper
Consider likewise the significance of system security,
since the IoT is commonly centered around cell
phones of different kinds and prevalently remote
systems
Suspected Entry: 71% match
Uploaded - Reddy_Suma_IoT.docx
THE MORE DEVICES, INDIVIDUALS,
COMMUNICATIONS AND INTERFACES, THE
MORE THE RISK FOR INFORMATION SECURITY
ADDITIONALLY INCREMENTS
Source - Another student's paper
the more gadgets, individuals, communications and
interfaces, the more the hazard for information
security likewise increments
Suspected Entry: 82% match
Uploaded - Reddy_Suma_IoT.docx
IT IMPLIES THAT THERE IS MORE ASSORTMENT
AND DECENT VARIETY IN THE NETWORK, SO
THE TEST OF DEALING WITH ALL FOCUSES IN
THE SYSTEM TO BOOST SECURITY
Source - Another student's paper
It implies that there is more assortment and decent
variety in the framework, so the test of dealing with all
focuses in the system to amplify security likewise
increments
Suspected Entry: 73% match
Uploaded - Reddy_Suma_IoT.docx Source - Another student's
paper
Technical vulnerabilities in authentication
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&att… 9/11
(MASUMSADIQUE, 2018) TECHNICAL
VULNERABILITIES IN AUTHENTICATION
Suspected Entry: 97% match
Uploaded - Reddy_Suma_IoT.docx
THESE ARE JUST SOME OF THE CHALLENGES
OF EXTENDING IOT DEVICES AND CLOUD
APPLICATIONS AND THEIR SECURITY RISKS
Source - Another student's paper
These are just some of the challenges and security
risks of extending IoT devices and cloud applications
Suspected Entry: 100% match
Uploaded - Reddy_Suma_IoT.docx
PARTNERING WITH A SECURITY EXPERT CAN
MAKE A BIG DIFFERENCE DURING YOUR IOT
DEPLOYMENTS
Source - Another student's paper
Partnering with a security expert can make a big
difference during your IoT deployments
Suspected Entry: 100% match
Uploaded - Reddy_Suma_IoT.docx
AN IOT SECURITY EXPERT WILL HAVE THE
KNOWLEDGE AND EXPERIENCE TO HELP YOU
COMPLETE THE DETAILED IOT RISK
ASSESSMENTS, UNCOVER IOT-SPECIFIC
VULNERABILITIES, CONDUCT PEN TESTING OR
ETHICAL HACKING ON YOUR NEW OR EXISTING
IOT DEVICES, AND FUTURE-PROOF YOUR IOT
EFFORTS
Source - Another student's paper
An IoT security expert will have the knowledge and
experience to help you complete the detailed IoT risk
assessments, uncover IoT-specific vulnerabilities,
conduct pen testing or ethical hacking on your new or
existing IoT devices, and future-proof your IoT efforts
Suspected Entry: 74% match
Uploaded - Reddy_Suma_IoT.docx
TOWARDS SECURITY ON INTERNET OF THINGS
Source - Another student's paper
Security of the Internet of Things
Suspected Entry: 95% match
Uploaded - Reddy_Suma_IoT.docx
THE STEPS TO BE TAKEN TO MITIGATE THE
RISK INCLUDES HAVING THE MORE SECURE
Source - Another student's paper
Mitigations The steps to be taken to mitigate the risk
includes having the more secure architecture and
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&a… 10/11
ARCHITECTURE AND DIFFICULT TO HACK FOR
HACKERS
difficult to hack for hackers
Suspected Entry: 99% match
Uploaded - Reddy_Suma_IoT.docx
THE SAFETY SHOULD BE KEPT IN MIND WHILE
DEVELOPING APPLICATION FOR DEVICE
Source - Another student's paper
The safety should be kept in mind while developing
application for device
Suspected Entry: 100% match
Uploaded - Reddy_Suma_IoT.docx
SO IF A DEVICE FAIL OR ANY EXCEPTION
OCCUR, THE PHYSICAL HARM SHOULDN'T BE
DONE
Source - Another student's paper
So, if a device fail or any exception occur, the
physical harm shouldn't be done
Suspected Entry: 62% match
Uploaded - Reddy_Suma_IoT.docx
EVEN WITH THE MOST HIGHER TECHNOLOGY,
THE MOST EFFECTUAL SECURITY SYSTEMS,
AND BEST INTENDED PREVENTIVE WHEEL, A
COMPANY IS DATA WILL AT RELAX BE AT SOME
RISK
Source - Another student's paper
Even with the most advanced technology, the most
effective security systems, and best-planned
preventative controls, a company’s data will still be at
some risk
Suspected Entry: 76% match
Uploaded - Reddy_Suma_IoT.docx
(PARK, 2019)NEW AND SOPHISTICATED CYBER-
ATTACK ARE SHAPED EVERY DAY, WITH
PRESSURE COMING FROM PROFIT FORCED
CRIMINALS, HACKERS WITH VARIOUS
AGENDAS, UNSCRUPULOUS COMPETITORS,
AND EVEN FOREIGN GOVERNMENTS
Source - Another student's paper
New and sophisticated cyber-attacks are created
every day, with threats coming from profit-motivated
criminals, hackers with various agendas,
unscrupulous competitors, and even foreign
governments (Scheetz,2012)
Suspected Entry: 100% match
Uploaded - Reddy_Suma_IoT.docx Source - Another student's
paper
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&a… 11/11
CYBER AND PHYSICAL SECURITY
VULNERABILITY ASSESSMENT FOR IOT-BASED
SMART HOMES
Cyber and Physical Security Vulnerability Assessment
for IoT- Based Smart Homes
Suspected Entry: 81% match
Uploaded - Reddy_Suma_IoT.docx
INTERNATIONAL JOURNAL OF SCIENCE,
ENGINEERING AND TECHNOLOGY RESEARCH
Source - Another student's paper
International Journal Of Engineering Sciences and
Research Technology
Running head: SHORTENED TITLE UP TO 50 CHARACTERS
1
SHORTENED TITLE UP TO 50 CHARACTERS
2
Add Title Here, up to 12 Words, on One to Two Lines
Author Name(s), First M. Last, Omit Titles and Degrees
Institutional Affiliation(s)Author Note
Include any grant/funding information and a complete
correspondence address.
Abstract
The abstract should be one paragraph of between 150 and 250
words. It is not indented. Section titles, such as the word
Abstract above, are not considered headings so they don’t use
bold heading format. Instead, use the Section Title style. This
style automatically starts your section on a new page, so you
don’t have to add page breaks. (To see your document with
pagination, on the View tab, click Reading View.) Note that all
text styles for this template are available on the Home tab of the
ribbon, in the Styles gallery.
Keywords: Add keywords here. To replace this (or any) tip text
with your own, just select it and then start typing. Don’t include
space to the right or left of the characters in your selection.
Add Title Here, up to 12 Words, on One to Two Lines
The body of your paper uses a half-inch first line indent and is
double-spaced. APA style provides for up to five heading
levels, shown in the paragraphs that follow. Note that the word
Introduction should not be used as an initial heading, as it’s
assumed that your paper begins with an introduction.Literature
Review
The first two heading levels get their own paragraph, as shown
here. Headings 3, 4, and 5 are run-in headings used at the
beginning of the paragraph.
Heading 21
For APA formatting requirements, it’s easy to just type your
own footnote references and notes. To format a footnote
reference, select the number and then, on the Home tab, in the
Styles gallery, click Footnote Reference.
Heading 3.
Include a period at the end of a run-in heading. Note that you
can include consecutive paragraphs with their own headings,
where appropriate. Heading 4.
When using headings, don’t skip levels. If you need a heading
3, 4, or 5 with no text following it before the next heading, just
add a period at the end of the heading and then start a new
paragraph for the subheading and its text. (Last Name,
Year)Heading 5.
Like all sections of your paper, references start on their own
page, as you see on the page that follows. Just type in-text
citations as you do any text of your paper, as shown at the end
of this paragraph and the preceding paragraph. (Last Name,
Year)Discussion
The first two heading levels get their own paragraph, as shown
here. Headings 3, 4, and 5 are run-in headings used at the
beginning of the paragraph.
Heading 21
For APA formatting requirements, it’s easy to just type your
own footnote references and notes. To format a footnote
reference, select the number and then, on the Home tab, in the
Styles gallery, click Footnote Reference.
Heading 3.
Include a period at the end of a run-in heading. Note that you
can include consecutive paragraphs with their own headings,
where appropriate. Heading 4.
When using headings, don’t skip levels. If you need a heading
3, 4, or 5 with no text following it before the next heading, just
add a period at the end of the heading and then start a new
paragraph for the subheading and its text. (Last Name,
Year)Heading 5.
Like all sections of your paper, references start on their own
page, as you see on the page that follows. Just type in-text
citations as you do any text of your paper, as shown at the end
of this paragraph and the preceding paragraph. (Last Name,
Year)
Conclusion and Future Study
The first two heading levels get their own paragraph, as shown
here. Headings 3, 4, and 5 are run-in headings used at the
beginning of the paragraph.
Heading 21
For APA formatting requirements, it’s easy to just type your
own footnote references and notes. To format a footnote
reference, select the number and then, on the Home tab, in the
Styles gallery, click Footnote Reference.
Heading 3.
Include a period at the end of a run-in heading. Note that you
can include consecutive paragraphs with their own headings,
where appropriate. Heading 4.
When using headings, don’t skip levels. If you need a heading
3, 4, or 5 with no text following it before the next heading, just
add a period at the end of the heading and then start a new
paragraph for the subheading and its text. (Last Name,
Year)Heading 5.
Like all sections of your paper, references start on their own
page, as you see on the page that follows. Just type in-text
citations as you do any text of your paper, as shown at the end
of this paragraph and the preceding paragraph. (Last Name,
Year)
References
Last Name, F. M. (Year). Article Title. Journal Title, Pages
From - To.
Last Name, F. M. (Year). Book Title. City Name: Publisher
Name
Footnotes
1Add footnotes, if any, on their own page following references.
The body of a footnote, such as this example, uses the Normal
text style. (Note: If you delete this sample footnote, don’t forget
to delete its in-text reference as well. That’s at the end of the
sample Heading 2 paragraph on the first page of body content in
this template.)
Appendix A
Table 1
Table TitleColumn HeadColumn HeadColumn HeadColumn
HeadColumn HeadRow Head123123123123Row
Head456456456456Row Head789789789789Row
Head123123123123Row Head456456456456Row
Head789789789789
Note: Place all tables for your paper in a tables section,
following references (and, if applicable, footnotes). Start a new
page for each table, include a table number and table title for
each, as shown on this page. All explanatory text appears in a
table note that follows the table, such as this one. Use the
Table/Figure style, available on the Home tab, in the Styles
gallery, to get the spacing between table and note. Tables in
APA format can use single or 1.5-line spacing. Include a
heading for every row and column, even if the content seems
obvious. A table style has been setup for this template that fits
APA guidelines. To insert a table, on the Insert tab, click Table.
Appendix BFigures
Figure 1. Include all figures in their own section, following
references (and footnotes and tables, if applicable). Include a
numbered caption for each figure. Use the Table/Figure style
for easy spacing between figure and caption.
For more information about all elements of APA formatting,
please consult the APA Style Manual, 6th Edition.

More Related Content

Similar to 11272019 SafeAssign Originality Reporthttpsucumberlan.docx

Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxvoversbyobersby
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksIRJET Journal
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...IJCNCJournal
 
IRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future InternetIRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future InternetIRJET Journal
 
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET Journal
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxvrickens
 
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupApplication Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupEswar Publications
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliverMadison Oliver
 
76 s201913
76 s20191376 s201913
76 s201913IJRAT
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - ciscoMITEF México
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsIRJET Journal
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTvishal dineshkumar soni
 

Similar to 11272019 SafeAssign Originality Reporthttpsucumberlan.docx (20)

Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
Recent trends in cloud computing articles
Recent trends in cloud computing articlesRecent trends in cloud computing articles
Recent trends in cloud computing articles
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
IRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future InternetIRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future Internet
 
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVM
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 
188
188188
188
 
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupApplication Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise Setup
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
 
76 s201913
76 s20191376 s201913
76 s201913
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 

More from aulasnilda

1. Analyze the case and determine the factors that have made KFC a s.docx
1. Analyze the case and determine the factors that have made KFC a s.docx1. Analyze the case and determine the factors that have made KFC a s.docx
1. Analyze the case and determine the factors that have made KFC a s.docxaulasnilda
 
1. A.Discuss how the concept of health has changed over time. B.Di.docx
1. A.Discuss how the concept of health has changed over time. B.Di.docx1. A.Discuss how the concept of health has changed over time. B.Di.docx
1. A.Discuss how the concept of health has changed over time. B.Di.docxaulasnilda
 
1. Abstract2. Introduction to Bitcoin and Ethereum3..docx
1. Abstract2. Introduction to Bitcoin and Ethereum3..docx1. Abstract2. Introduction to Bitcoin and Ethereum3..docx
1. Abstract2. Introduction to Bitcoin and Ethereum3..docxaulasnilda
 
1. A. Compare vulnerable populations. B. Describe an example of one .docx
1. A. Compare vulnerable populations. B. Describe an example of one .docx1. A. Compare vulnerable populations. B. Describe an example of one .docx
1. A. Compare vulnerable populations. B. Describe an example of one .docxaulasnilda
 
1. A highly capable brick and mortar electronics retailer with a l.docx
1. A highly capable brick and mortar electronics retailer with a l.docx1. A highly capable brick and mortar electronics retailer with a l.docx
1. A highly capable brick and mortar electronics retailer with a l.docxaulasnilda
 
1. A. Research the delivery, finance, management, and sustainabili.docx
1. A. Research the delivery, finance, management, and sustainabili.docx1. A. Research the delivery, finance, management, and sustainabili.docx
1. A. Research the delivery, finance, management, and sustainabili.docxaulasnilda
 
1. All of the following artists except for ONE used nudity as part.docx
1. All of the following artists except for ONE used nudity as part.docx1. All of the following artists except for ONE used nudity as part.docx
1. All of the following artists except for ONE used nudity as part.docxaulasnilda
 
1. According to the article, what is myth and how does it functi.docx
1. According to the article, what is myth and how does it functi.docx1. According to the article, what is myth and how does it functi.docx
1. According to the article, what is myth and how does it functi.docxaulasnilda
 
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docxaulasnilda
 
1. A.Compare independent variables, B.dependent variables, and C.ext.docx
1. A.Compare independent variables, B.dependent variables, and C.ext.docx1. A.Compare independent variables, B.dependent variables, and C.ext.docx
1. A.Compare independent variables, B.dependent variables, and C.ext.docxaulasnilda
 
1. According to the Court, why is death a proportionate penalty for .docx
1. According to the Court, why is death a proportionate penalty for .docx1. According to the Court, why is death a proportionate penalty for .docx
1. According to the Court, why is death a proportionate penalty for .docxaulasnilda
 
1- Prisonization  What if  . . . you were sentenced to prison .docx
1- Prisonization  What if  . . . you were sentenced to prison .docx1- Prisonization  What if  . . . you were sentenced to prison .docx
1- Prisonization  What if  . . . you were sentenced to prison .docxaulasnilda
 
1. 250+ word count What is cultural and linguistic competence H.docx
1. 250+ word count What is cultural and linguistic competence H.docx1. 250+ word count What is cultural and linguistic competence H.docx
1. 250+ word count What is cultural and linguistic competence H.docxaulasnilda
 
1. 200 words How valuable is a having a LinkedIn profile Provid.docx
1. 200 words How valuable is a having a LinkedIn profile Provid.docx1. 200 words How valuable is a having a LinkedIn profile Provid.docx
1. 200 words How valuable is a having a LinkedIn profile Provid.docxaulasnilda
 
1. According to recent surveys, China, India, and the Philippines ar.docx
1. According to recent surveys, China, India, and the Philippines ar.docx1. According to recent surveys, China, India, and the Philippines ar.docx
1. According to recent surveys, China, India, and the Philippines ar.docxaulasnilda
 
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docxaulasnilda
 
1. A vulnerability refers to a known weakness of an asset (resou.docx
1. A vulnerability refers to a known weakness of an asset (resou.docx1. A vulnerability refers to a known weakness of an asset (resou.docx
1. A vulnerability refers to a known weakness of an asset (resou.docxaulasnilda
 
1. According to the readings, philosophy began in ancient Egypt an.docx
1. According to the readings, philosophy began in ancient Egypt an.docx1. According to the readings, philosophy began in ancient Egypt an.docx
1. According to the readings, philosophy began in ancient Egypt an.docxaulasnilda
 
1-Explain what you understood from the paper with (one paragraph).docx
1-Explain what you understood from the paper with (one paragraph).docx1-Explain what you understood from the paper with (one paragraph).docx
1-Explain what you understood from the paper with (one paragraph).docxaulasnilda
 
1-Explanation of how healthcare policy can impact the advanced p.docx
1-Explanation of how healthcare policy can impact the advanced p.docx1-Explanation of how healthcare policy can impact the advanced p.docx
1-Explanation of how healthcare policy can impact the advanced p.docxaulasnilda
 

More from aulasnilda (20)

1. Analyze the case and determine the factors that have made KFC a s.docx
1. Analyze the case and determine the factors that have made KFC a s.docx1. Analyze the case and determine the factors that have made KFC a s.docx
1. Analyze the case and determine the factors that have made KFC a s.docx
 
1. A.Discuss how the concept of health has changed over time. B.Di.docx
1. A.Discuss how the concept of health has changed over time. B.Di.docx1. A.Discuss how the concept of health has changed over time. B.Di.docx
1. A.Discuss how the concept of health has changed over time. B.Di.docx
 
1. Abstract2. Introduction to Bitcoin and Ethereum3..docx
1. Abstract2. Introduction to Bitcoin and Ethereum3..docx1. Abstract2. Introduction to Bitcoin and Ethereum3..docx
1. Abstract2. Introduction to Bitcoin and Ethereum3..docx
 
1. A. Compare vulnerable populations. B. Describe an example of one .docx
1. A. Compare vulnerable populations. B. Describe an example of one .docx1. A. Compare vulnerable populations. B. Describe an example of one .docx
1. A. Compare vulnerable populations. B. Describe an example of one .docx
 
1. A highly capable brick and mortar electronics retailer with a l.docx
1. A highly capable brick and mortar electronics retailer with a l.docx1. A highly capable brick and mortar electronics retailer with a l.docx
1. A highly capable brick and mortar electronics retailer with a l.docx
 
1. A. Research the delivery, finance, management, and sustainabili.docx
1. A. Research the delivery, finance, management, and sustainabili.docx1. A. Research the delivery, finance, management, and sustainabili.docx
1. A. Research the delivery, finance, management, and sustainabili.docx
 
1. All of the following artists except for ONE used nudity as part.docx
1. All of the following artists except for ONE used nudity as part.docx1. All of the following artists except for ONE used nudity as part.docx
1. All of the following artists except for ONE used nudity as part.docx
 
1. According to the article, what is myth and how does it functi.docx
1. According to the article, what is myth and how does it functi.docx1. According to the article, what is myth and how does it functi.docx
1. According to the article, what is myth and how does it functi.docx
 
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx
 
1. A.Compare independent variables, B.dependent variables, and C.ext.docx
1. A.Compare independent variables, B.dependent variables, and C.ext.docx1. A.Compare independent variables, B.dependent variables, and C.ext.docx
1. A.Compare independent variables, B.dependent variables, and C.ext.docx
 
1. According to the Court, why is death a proportionate penalty for .docx
1. According to the Court, why is death a proportionate penalty for .docx1. According to the Court, why is death a proportionate penalty for .docx
1. According to the Court, why is death a proportionate penalty for .docx
 
1- Prisonization  What if  . . . you were sentenced to prison .docx
1- Prisonization  What if  . . . you were sentenced to prison .docx1- Prisonization  What if  . . . you were sentenced to prison .docx
1- Prisonization  What if  . . . you were sentenced to prison .docx
 
1. 250+ word count What is cultural and linguistic competence H.docx
1. 250+ word count What is cultural and linguistic competence H.docx1. 250+ word count What is cultural and linguistic competence H.docx
1. 250+ word count What is cultural and linguistic competence H.docx
 
1. 200 words How valuable is a having a LinkedIn profile Provid.docx
1. 200 words How valuable is a having a LinkedIn profile Provid.docx1. 200 words How valuable is a having a LinkedIn profile Provid.docx
1. 200 words How valuable is a having a LinkedIn profile Provid.docx
 
1. According to recent surveys, China, India, and the Philippines ar.docx
1. According to recent surveys, China, India, and the Philippines ar.docx1. According to recent surveys, China, India, and the Philippines ar.docx
1. According to recent surveys, China, India, and the Philippines ar.docx
 
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx
 
1. A vulnerability refers to a known weakness of an asset (resou.docx
1. A vulnerability refers to a known weakness of an asset (resou.docx1. A vulnerability refers to a known weakness of an asset (resou.docx
1. A vulnerability refers to a known weakness of an asset (resou.docx
 
1. According to the readings, philosophy began in ancient Egypt an.docx
1. According to the readings, philosophy began in ancient Egypt an.docx1. According to the readings, philosophy began in ancient Egypt an.docx
1. According to the readings, philosophy began in ancient Egypt an.docx
 
1-Explain what you understood from the paper with (one paragraph).docx
1-Explain what you understood from the paper with (one paragraph).docx1-Explain what you understood from the paper with (one paragraph).docx
1-Explain what you understood from the paper with (one paragraph).docx
 
1-Explanation of how healthcare policy can impact the advanced p.docx
1-Explanation of how healthcare policy can impact the advanced p.docx1-Explanation of how healthcare policy can impact the advanced p.docx
1-Explanation of how healthcare policy can impact the advanced p.docx
 

Recently uploaded

Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 

Recently uploaded (20)

Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

11272019 SafeAssign Originality Reporthttpsucumberlan.docx

  • 1. 11/27/2019 SafeAssign Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_ 1&paperId=2379284715&&att… 1/11 2719.202010 - FALL 2019 - ACCESS CONTROL (ISOL-531- 08) - SECOND BI-TERM Research Paper: IoT Security - Draft Suma Reddy on Sun, Nov 24 2019, 10:55 PM 65% highest match Submission ID: 87817bbd-f9da-43ad-9f99-9f10168b7bbf Attachments (1) Reddy_Suma_IoT.docx 1 INTERNET OF THINGS INTERNET OF THINGS (IOT) SUMA REDDY 2 UNIVERSITY OF CUMBERLANDS Introduction: 2 INTERNET OF THINGS ALLOWS US TO CONNECT ELECTRONIC AND EMBEDDED DEVICES AROUND US WITH INTERNET. The
  • 2. detailed answer is given below. Internet of things is extension of internet connectivity on day to day devices. The electronic devices can be connected to each other via internet and they can communicate with each other, even remotely. So this allow us to handle electronic devices without being physically present near device. As device is connected to internet and you can operate it remotely using internet too. It allows automation. 2 IT CAN BE HELPFUL IN MEDICAL AND HEALTHCARE, WHERE DIGITIZED HEALTHCARE SYSTEMS ARE CREATED AND ALSO ALLOWS REMOTE HEALTH MONITORING AND EMERGENCY NOTIFICATION ETC. IOT CAN ALSO BE USED IN TRANSPORT, BUILDING AND HOME AUTOMATION, MANUFACTURING, ENVIRONMENTAL (http://safeassign.blackboard.com/) Reddy_Suma_IoT.docx Word Count: 898 Attachment ID: 2379284715 65%
  • 3. http://safeassign.blackboard.com/ 11/27/2019 SafeAssign Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_ 1&paperId=2379284715&&att… 2/11 MONITORING AND MANY MORE FIELDS. (SHARMA, 2016) SECURITY THREATS AND ISSUES WITH INTERNET OF THINGS: IT HAS A SECURITY THREAT AND THEY CAN BE HACKED. FOR EXAMPLE, CAMERAS CAN BE HACKED WHICH CAUSES INVASION OF PRIVACY. As number of devices grows in an organization and organization uses IOT, the chance of unprecedented attack increases that hampers security issue of an organization because what attack over your data and devices you got today that may not be face by the organization professionals never before. (Sharma, 2016) When digital speakers are turned off, they still use voice control sometimes to turn back on. So the speakers still have access to any conversations
  • 4. or any music or noise going on without even user realizing it. This can be used against the user by hackers. Data privacy: The Internet of Things represent collection of data, storage and investigation systems to a more noteworthy scale. 3 THERE ARE AN EVER INCREASING NUMBER OF DEVICES ASSOCIATED WITH THE INTERNET AND THERE ARE ADDITIONALLY MORE COMPONENTS THAT REQUIRE SECURITY AND PRIVACY: THE DEVICE ITSELF, THE SYSTEM, THE APPLICATION OR THE STAGE THAT IT UTILIZING. 4 (MASUMSADIQUE, 2018) TECHNICAL VULNERABILITIES IN AUTHENTICATION: 3 THE IOT WORKS WITH DEVICES OF VARIOUS NATURE THAT WILL BE ASSOCIATED WITH THE INTERNET AND GATHER CLIENT DATA IN THE CLOUD THROUGH THE INSTRUMENT ITSELF. One errand to do is to work inside and out on the verification instruments to guarantee the protection of the user. (Park, 2019)
  • 5. Human factor: 3 THE INTERNET OF THINGS IS A GENERALLY NEW INNOVATIVE DEVELOPMENT. NUMBNESS OF IOT SECURITY, BOTH BY ORGANIZATIONS AND INDIVIDUAL CLIENTS, LIKEWISE EXPANDS THE RISK OF CYBER SECURITY BECAUSE OF ABSENCE OF EXPERIENCE AND THE HUMAN FACTOR. Data encryption: the transmission of data by non-encoded implies presents a significant security issue. 3 CONSIDER ADDITIONALLY THE SIGNIFICANCE OF SYSTEM SECURITY, SINCE THE IOT IS COMMONLY CENTERED ON CELL PHONES OF DIFFERENT SORTS AND PREVALENTLY WIRELESS NETWORKS. (MasumSadique, 2018). Security and privacy always more in digitally connected systems and environments. (Fake companies, stolen identities). DATA and Complexity risk is also there 11/27/2019 SafeAssign Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-
  • 6. BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_ 1&paperId=2379284715&&att… 3/11 because the IOT system generates huge amount of data so generates complexity to manage that. Complex system: 3 THE MORE DEVICES, INDIVIDUALS, COMMUNICATIONS AND INTERFACES, THE MORE THE RISK FOR INFORMATION SECURITY ADDITIONALLY INCREMENTS. IT IMPLIES THAT THERE IS MORE ASSORTMENT AND DECENT VARIETY IN THE NETWORK, SO THE TEST OF DEALING WITH ALL FOCUSES IN THE SYSTEM TO BOOST SECURITY. 4 THESE ARE JUST SOME OF THE CHALLENGES OF EXTENDING IOT DEVICES AND CLOUD APPLICATIONS AND THEIR SECURITY RISKS. (MasumSadique, 2018) Steps to mitigate these risks: 5 THE STEPS TO BE TAKEN TO MITIGATE THE RISK INCLUDES HAVING THE MORE SECURE ARCHITECTURE AND DIFFICULT TO HACK FOR HACKERS.
  • 7. THE SAFETY SHOULD BE KEPT IN MIND WHILE DEVELOPING APPLICATION FOR DEVICE. SO IF A DEVICE FAIL OR ANY EXCEPTION OCCUR, THE PHYSICAL HARM SHOULDN'T BE DONE. 2 WE CAN ALSO CONSIDER ENTIRE IOT ECOSYSTEM. ADDING INTELLIGENCE TO DEVICES CAN ALSO HELP. 4 PARTNERING WITH A SECURITY EXPERT CAN MAKE A BIG DIFFERENCE DURING YOUR IOT DEPLOYMENTS. AN IOT SECURITY EXPERT WILL HAVE THE KNOWLEDGE AND EXPERIENCE TO HELP YOU COMPLETE THE DETAILED IOT RISK ASSESSMENTS, UNCOVER IOT- SPECIFIC VULNERABILITIES, CONDUCT PEN TESTING OR ETHICAL HACKING ON YOUR NEW OR EXISTING IOT DEVICES, AND FUTURE- PROOF YOUR IOT EFFORTS. 6 EVEN WITH THE MOST HIGHER TECHNOLOGY, THE MOST EFFECTUAL SECURITY SYSTEMS, AND BEST INTENDED PREVENTIVE
  • 8. WHEEL, A COMPANY IS DATA WILL AT RELAX BE AT SOME RISK. (PARK, 2019)NEW AND SOPHISTICATED CYBER-ATTACK ARE SHAPED EVERY DAY, WITH PRESSURE COMING FROM PROFIT FORCED CRIMINALS, HACKERS WITH VARIOUS AGENDAS, UNSCRUPULOUS COMPETITORS, AND EVEN FOREIGN GOVERNMENTS. But you have to move toward your cyber security in a clever and regular way, implement a strategic array of countermeasures that keep many points of weakness for your network, servers, desktops, and smart phones. 11/27/2019 SafeAssign Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_ 1&paperId=2379284715&&att… 4/11 Implemented properly, you can very much decrease your security risk to the point that you can feel sure that you can prevent security breaches. References
  • 9. Ali, B. (2018). 7 CYBER AND PHYSICAL SECURITY VULNERABILITY ASSESSMENT FOR IOT-BASED SMART HOMES. MDPI. Brous, P. (2019). 1 THE DUAL EFFECTS OF THE INTERNET OF THINGS (IOT): A systematic review of the benefits and risks of IoT adoption by organizations. International Journal of Information Management. MasumSadique, K. (2018). 4 TOWARDS SECURITY ON INTERNET OF THINGS: 1 APPLICATIONS AND CHALLENGES IN TECHNOLOGY. International Journal of Information Management. Park, M. (2019). Security Risk Measurement for Information Leakage in IoT-Based Smart Homes from a Situational Awareness Perspective. NCBI. Sharma, V. (2016). A review paper on “IOT” & It‟s Smart. 8 INTERNATIONAL JOURNAL OF SCIENCE, ENGINEERING AND TECHNOLOGY RESEARCH. Citations (8/8) 1 https://en.wikipedia.org/wiki?curid=12057519
  • 10. 2 Another student's paper 3 Another student's paper 4 Another student's paper 5 Another student's paper 6 Another student's paper 7 Another student's paper 8 Another student's paper 11/27/2019 SafeAssign Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_ 1&paperId=2379284715&&att… 5/11 Matched Text Suspected Entry: 100% match Uploaded - Reddy_Suma_IoT.docx INTERNET OF THINGS Source - https://en.wikipedia.org/wiki? curid=12057519 Internet of things Suspected Entry: 69% match
  • 11. Uploaded - Reddy_Suma_IoT.docx INTERNET OF THINGS (IOT) SUMA REDDY Source - https://en.wikipedia.org/wiki? curid=12057519 "Internet of Things (IoT) Suspected Entry: 70% match Uploaded - Reddy_Suma_IoT.docx THE DUAL EFFECTS OF THE INTERNET OF THINGS (IOT) Source - https://en.wikipedia.org/wiki? curid=12057519 "Internet of Things (IoT) Suspected Entry: 63% match Uploaded - Reddy_Suma_IoT.docx APPLICATIONS AND CHALLENGES IN TECHNOLOGY Source - https://en.wikipedia.org/wiki? curid=12057519 Challenges, Advances, and Applications Suspected Entry: 100% match Uploaded - Reddy_Suma_IoT.docx UNIVERSITY OF CUMBERLANDS Source - Another student's paper
  • 12. University of the Cumberlands Suspected Entry: 85% match Uploaded - Reddy_Suma_IoT.docx INTERNET OF THINGS ALLOWS US TO CONNECT ELECTRONIC AND EMBEDDED DEVICES AROUND US WITH INTERNET Source - Another student's paper IOT allows us to connect electronic and embedded devices around us with internet 11/27/2019 SafeAssign Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_ 1&paperId=2379284715&&att… 6/11 Suspected Entry: 77% match Uploaded - Reddy_Suma_IoT.docx IT CAN BE HELPFUL IN MEDICAL AND HEALTHCARE, WHERE DIGITIZED HEALTHCARE SYSTEMS ARE CREATED AND ALSO ALLOWS REMOTE HEALTH MONITORING AND EMERGENCY NOTIFICATION ETC Source - Another student's paper It allows automation and it can help in medical, healthcare, where digitized healthcare systems create and allows remote health monitoring and emergency notification
  • 13. Suspected Entry: 100% match Uploaded - Reddy_Suma_IoT.docx IOT CAN ALSO BE USED IN TRANSPORT, BUILDING AND HOME AUTOMATION, MANUFACTURING, ENVIRONMENTAL MONITORING AND MANY MORE FIELDS Source - Another student's paper IOT can also be used in transport, building and home automation, manufacturing, environmental monitoring and many more fields Suspected Entry: 64% match Uploaded - Reddy_Suma_IoT.docx (SHARMA, 2016) SECURITY THREATS AND ISSUES WITH INTERNET OF THINGS Source - Another student's paper Security risks and issues with internet of things Suspected Entry: 99% match Uploaded - Reddy_Suma_IoT.docx IT HAS A SECURITY THREAT AND THEY CAN BE HACKED Source - Another student's paper · It has a security threat and they can be hacked Suspected Entry: 87% match Uploaded - Reddy_Suma_IoT.docx FOR EXAMPLE, CAMERAS CAN BE HACKED WHICH CAUSES INVASION OF PRIVACY
  • 14. Source - Another student's paper For example cameras can be hacked which causes raid of privacy Suspected Entry: 100% match 11/27/2019 SafeAssign Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_ 1&paperId=2379284715&&att… 7/11 Uploaded - Reddy_Suma_IoT.docx WE CAN ALSO CONSIDER ENTIRE IOT ECOSYSTEM Source - Another student's paper We can also consider the entire IOT ecosystem Suspected Entry: 100% match Uploaded - Reddy_Suma_IoT.docx ADDING INTELLIGENCE TO DEVICES CAN ALSO HELP Source - Another student's paper Adding intelligence to devices can also help Suspected Entry: 81% match Uploaded - Reddy_Suma_IoT.docx THERE ARE AN EVER INCREASING NUMBER OF DEVICES ASSOCIATED WITH THE INTERNET
  • 15. AND THERE ARE ADDITIONALLY MORE COMPONENTS THAT REQUIRE SECURITY AND PRIVACY Source - Another student's paper There are an ever increasing number of gadgets associated with the Internet and there are likewise more components that require security Suspected Entry: 68% match Uploaded - Reddy_Suma_IoT.docx THE DEVICE ITSELF, THE SYSTEM, THE APPLICATION OR THE STAGE THAT IT UTILIZING Source - Another student's paper the gadget itself, the system, the application or the stage that it employments Suspected Entry: 88% match Uploaded - Reddy_Suma_IoT.docx THE IOT WORKS WITH DEVICES OF VARIOUS NATURE THAT WILL BE ASSOCIATED WITH THE INTERNET AND GATHER CLIENT DATA IN THE CLOUD THROUGH THE INSTRUMENT ITSELF Source - Another student's paper The IoT works with gadgets of various nature that will be associated with the Internet and gather client information in the cloud through the instrument itself Suspected Entry: 79% match Uploaded - Reddy_Suma_IoT.docx THE INTERNET OF THINGS IS A GENERALLY
  • 16. NEW INNOVATIVE DEVELOPMENT Source - Another student's paper The Internet of Things is a generally new mechanical development 11/27/2019 SafeAssign Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_ 1&paperId=2379284715&&att… 8/11 Suspected Entry: 85% match Uploaded - Reddy_Suma_IoT.docx NUMBNESS OF IOT SECURITY, BOTH BY ORGANIZATIONS AND INDIVIDUAL CLIENTS, LIKEWISE EXPANDS THE RISK OF CYBER SECURITY BECAUSE OF ABSENCE OF EXPERIENCE AND THE HUMAN FACTOR Source - Another student's paper Numbness of IoT security, both by organizations and individual clients, likewise expands the dangers of cybersecurity because of absence of experience and the human factor Suspected Entry: 73% match Uploaded - Reddy_Suma_IoT.docx CONSIDER ADDITIONALLY THE SIGNIFICANCE OF SYSTEM SECURITY, SINCE THE IOT IS COMMONLY CENTERED ON CELL PHONES OF DIFFERENT SORTS AND PREVALENTLY
  • 17. WIRELESS NETWORKS Source - Another student's paper Consider likewise the significance of system security, since the IoT is commonly centered around cell phones of different kinds and prevalently remote systems Suspected Entry: 71% match Uploaded - Reddy_Suma_IoT.docx THE MORE DEVICES, INDIVIDUALS, COMMUNICATIONS AND INTERFACES, THE MORE THE RISK FOR INFORMATION SECURITY ADDITIONALLY INCREMENTS Source - Another student's paper the more gadgets, individuals, communications and interfaces, the more the hazard for information security likewise increments Suspected Entry: 82% match Uploaded - Reddy_Suma_IoT.docx IT IMPLIES THAT THERE IS MORE ASSORTMENT AND DECENT VARIETY IN THE NETWORK, SO THE TEST OF DEALING WITH ALL FOCUSES IN THE SYSTEM TO BOOST SECURITY Source - Another student's paper It implies that there is more assortment and decent variety in the framework, so the test of dealing with all focuses in the system to amplify security likewise increments Suspected Entry: 73% match
  • 18. Uploaded - Reddy_Suma_IoT.docx Source - Another student's paper Technical vulnerabilities in authentication 11/27/2019 SafeAssign Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_ 1&paperId=2379284715&&att… 9/11 (MASUMSADIQUE, 2018) TECHNICAL VULNERABILITIES IN AUTHENTICATION Suspected Entry: 97% match Uploaded - Reddy_Suma_IoT.docx THESE ARE JUST SOME OF THE CHALLENGES OF EXTENDING IOT DEVICES AND CLOUD APPLICATIONS AND THEIR SECURITY RISKS Source - Another student's paper These are just some of the challenges and security risks of extending IoT devices and cloud applications Suspected Entry: 100% match Uploaded - Reddy_Suma_IoT.docx PARTNERING WITH A SECURITY EXPERT CAN MAKE A BIG DIFFERENCE DURING YOUR IOT DEPLOYMENTS Source - Another student's paper Partnering with a security expert can make a big
  • 19. difference during your IoT deployments Suspected Entry: 100% match Uploaded - Reddy_Suma_IoT.docx AN IOT SECURITY EXPERT WILL HAVE THE KNOWLEDGE AND EXPERIENCE TO HELP YOU COMPLETE THE DETAILED IOT RISK ASSESSMENTS, UNCOVER IOT-SPECIFIC VULNERABILITIES, CONDUCT PEN TESTING OR ETHICAL HACKING ON YOUR NEW OR EXISTING IOT DEVICES, AND FUTURE-PROOF YOUR IOT EFFORTS Source - Another student's paper An IoT security expert will have the knowledge and experience to help you complete the detailed IoT risk assessments, uncover IoT-specific vulnerabilities, conduct pen testing or ethical hacking on your new or existing IoT devices, and future-proof your IoT efforts Suspected Entry: 74% match Uploaded - Reddy_Suma_IoT.docx TOWARDS SECURITY ON INTERNET OF THINGS Source - Another student's paper Security of the Internet of Things Suspected Entry: 95% match Uploaded - Reddy_Suma_IoT.docx THE STEPS TO BE TAKEN TO MITIGATE THE RISK INCLUDES HAVING THE MORE SECURE Source - Another student's paper
  • 20. Mitigations The steps to be taken to mitigate the risk includes having the more secure architecture and 11/27/2019 SafeAssign Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_ 1&paperId=2379284715&&a… 10/11 ARCHITECTURE AND DIFFICULT TO HACK FOR HACKERS difficult to hack for hackers Suspected Entry: 99% match Uploaded - Reddy_Suma_IoT.docx THE SAFETY SHOULD BE KEPT IN MIND WHILE DEVELOPING APPLICATION FOR DEVICE Source - Another student's paper The safety should be kept in mind while developing application for device Suspected Entry: 100% match Uploaded - Reddy_Suma_IoT.docx SO IF A DEVICE FAIL OR ANY EXCEPTION OCCUR, THE PHYSICAL HARM SHOULDN'T BE DONE Source - Another student's paper So, if a device fail or any exception occur, the physical harm shouldn't be done
  • 21. Suspected Entry: 62% match Uploaded - Reddy_Suma_IoT.docx EVEN WITH THE MOST HIGHER TECHNOLOGY, THE MOST EFFECTUAL SECURITY SYSTEMS, AND BEST INTENDED PREVENTIVE WHEEL, A COMPANY IS DATA WILL AT RELAX BE AT SOME RISK Source - Another student's paper Even with the most advanced technology, the most effective security systems, and best-planned preventative controls, a company’s data will still be at some risk Suspected Entry: 76% match Uploaded - Reddy_Suma_IoT.docx (PARK, 2019)NEW AND SOPHISTICATED CYBER- ATTACK ARE SHAPED EVERY DAY, WITH PRESSURE COMING FROM PROFIT FORCED CRIMINALS, HACKERS WITH VARIOUS AGENDAS, UNSCRUPULOUS COMPETITORS, AND EVEN FOREIGN GOVERNMENTS Source - Another student's paper New and sophisticated cyber-attacks are created every day, with threats coming from profit-motivated criminals, hackers with various agendas, unscrupulous competitors, and even foreign governments (Scheetz,2012) Suspected Entry: 100% match Uploaded - Reddy_Suma_IoT.docx Source - Another student's
  • 22. paper 11/27/2019 SafeAssign Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_ 1&paperId=2379284715&&a… 11/11 CYBER AND PHYSICAL SECURITY VULNERABILITY ASSESSMENT FOR IOT-BASED SMART HOMES Cyber and Physical Security Vulnerability Assessment for IoT- Based Smart Homes Suspected Entry: 81% match Uploaded - Reddy_Suma_IoT.docx INTERNATIONAL JOURNAL OF SCIENCE, ENGINEERING AND TECHNOLOGY RESEARCH Source - Another student's paper International Journal Of Engineering Sciences and Research Technology Running head: SHORTENED TITLE UP TO 50 CHARACTERS 1 SHORTENED TITLE UP TO 50 CHARACTERS 2 Add Title Here, up to 12 Words, on One to Two Lines Author Name(s), First M. Last, Omit Titles and Degrees Institutional Affiliation(s)Author Note
  • 23. Include any grant/funding information and a complete correspondence address. Abstract The abstract should be one paragraph of between 150 and 250 words. It is not indented. Section titles, such as the word Abstract above, are not considered headings so they don’t use bold heading format. Instead, use the Section Title style. This style automatically starts your section on a new page, so you don’t have to add page breaks. (To see your document with pagination, on the View tab, click Reading View.) Note that all text styles for this template are available on the Home tab of the ribbon, in the Styles gallery. Keywords: Add keywords here. To replace this (or any) tip text with your own, just select it and then start typing. Don’t include space to the right or left of the characters in your selection. Add Title Here, up to 12 Words, on One to Two Lines The body of your paper uses a half-inch first line indent and is double-spaced. APA style provides for up to five heading levels, shown in the paragraphs that follow. Note that the word Introduction should not be used as an initial heading, as it’s assumed that your paper begins with an introduction.Literature Review The first two heading levels get their own paragraph, as shown here. Headings 3, 4, and 5 are run-in headings used at the beginning of the paragraph. Heading 21 For APA formatting requirements, it’s easy to just type your own footnote references and notes. To format a footnote reference, select the number and then, on the Home tab, in the Styles gallery, click Footnote Reference. Heading 3. Include a period at the end of a run-in heading. Note that you can include consecutive paragraphs with their own headings, where appropriate. Heading 4. When using headings, don’t skip levels. If you need a heading
  • 24. 3, 4, or 5 with no text following it before the next heading, just add a period at the end of the heading and then start a new paragraph for the subheading and its text. (Last Name, Year)Heading 5. Like all sections of your paper, references start on their own page, as you see on the page that follows. Just type in-text citations as you do any text of your paper, as shown at the end of this paragraph and the preceding paragraph. (Last Name, Year)Discussion The first two heading levels get their own paragraph, as shown here. Headings 3, 4, and 5 are run-in headings used at the beginning of the paragraph. Heading 21 For APA formatting requirements, it’s easy to just type your own footnote references and notes. To format a footnote reference, select the number and then, on the Home tab, in the Styles gallery, click Footnote Reference. Heading 3. Include a period at the end of a run-in heading. Note that you can include consecutive paragraphs with their own headings, where appropriate. Heading 4. When using headings, don’t skip levels. If you need a heading 3, 4, or 5 with no text following it before the next heading, just add a period at the end of the heading and then start a new paragraph for the subheading and its text. (Last Name, Year)Heading 5. Like all sections of your paper, references start on their own page, as you see on the page that follows. Just type in-text citations as you do any text of your paper, as shown at the end of this paragraph and the preceding paragraph. (Last Name, Year) Conclusion and Future Study The first two heading levels get their own paragraph, as shown here. Headings 3, 4, and 5 are run-in headings used at the
  • 25. beginning of the paragraph. Heading 21 For APA formatting requirements, it’s easy to just type your own footnote references and notes. To format a footnote reference, select the number and then, on the Home tab, in the Styles gallery, click Footnote Reference. Heading 3. Include a period at the end of a run-in heading. Note that you can include consecutive paragraphs with their own headings, where appropriate. Heading 4. When using headings, don’t skip levels. If you need a heading 3, 4, or 5 with no text following it before the next heading, just add a period at the end of the heading and then start a new paragraph for the subheading and its text. (Last Name, Year)Heading 5. Like all sections of your paper, references start on their own page, as you see on the page that follows. Just type in-text citations as you do any text of your paper, as shown at the end of this paragraph and the preceding paragraph. (Last Name, Year) References Last Name, F. M. (Year). Article Title. Journal Title, Pages From - To. Last Name, F. M. (Year). Book Title. City Name: Publisher Name Footnotes 1Add footnotes, if any, on their own page following references. The body of a footnote, such as this example, uses the Normal text style. (Note: If you delete this sample footnote, don’t forget to delete its in-text reference as well. That’s at the end of the sample Heading 2 paragraph on the first page of body content in this template.) Appendix A
  • 26. Table 1 Table TitleColumn HeadColumn HeadColumn HeadColumn HeadColumn HeadRow Head123123123123Row Head456456456456Row Head789789789789Row Head123123123123Row Head456456456456Row Head789789789789 Note: Place all tables for your paper in a tables section, following references (and, if applicable, footnotes). Start a new page for each table, include a table number and table title for each, as shown on this page. All explanatory text appears in a table note that follows the table, such as this one. Use the Table/Figure style, available on the Home tab, in the Styles gallery, to get the spacing between table and note. Tables in APA format can use single or 1.5-line spacing. Include a heading for every row and column, even if the content seems obvious. A table style has been setup for this template that fits APA guidelines. To insert a table, on the Insert tab, click Table. Appendix BFigures Figure 1. Include all figures in their own section, following references (and footnotes and tables, if applicable). Include a numbered caption for each figure. Use the Table/Figure style for easy spacing between figure and caption. For more information about all elements of APA formatting, please consult the APA Style Manual, 6th Edition.