11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_1&paperId=2379284715&&att… 1/11
2719.202010 - FALL 2019 - ACCESS CONTROL (ISOL-531-08) - SECOND BI-TERM
Research Paper: IoT Security - Draft
Suma Reddy
on Sun, Nov 24 2019, 10:55 PM
65% highest match
Submission ID: 87817bbd-f9da-43ad-9f99-9f10168b7bbf
Attachments (1)
Reddy_Suma_IoT.docx
1 INTERNET OF THINGS
INTERNET OF THINGS (IOT) SUMA REDDY
2 UNIVERSITY OF CUMBERLANDS
Introduction:
2 INTERNET OF THINGS ALLOWS US TO CONNECT ELECTRONIC AND
EMBEDDED DEVICES AROUND US WITH INTERNET. The detailed answer is given
below. Internet of things is extension of internet connectivity on day to day devices. The
electronic devices can be connected to each other via internet and they can communicate with
each other, even remotely. So this allow us to handle electronic devices without being
physically present near device. As device is connected to internet and you can operate it
remotely using internet too. It allows automation. 2 IT CAN BE HELPFUL IN
MEDICAL AND HEALTHCARE, WHERE DIGITIZED HEALTHCARE SYSTEMS
ARE CREATED AND ALSO ALLOWS REMOTE HEALTH MONITORING AND
EMERGENCY NOTIFICATION ETC. IOT CAN ALSO BE USED IN TRANSPORT,
BUILDING AND HOME AUTOMATION, MANUFACTURING, ENVIRONMENTAL
(http://safeassign.blackboard.com/)
Reddy_Suma_IoT.docx
Word Count: 898
Attachment ID: 2379284715
65%
http://safeassign.blackboard.com/
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_1&paperId=2379284715&&att… 2/11
MONITORING AND MANY MORE FIELDS. (SHARMA, 2016) SECURITY
THREATS AND ISSUES WITH INTERNET OF THINGS:
IT HAS A SECURITY THREAT AND THEY CAN BE HACKED. FOR EXAMPLE,
CAMERAS CAN BE HACKED WHICH CAUSES INVASION OF PRIVACY. As
number of devices grows in an organization and organization uses IOT, the chance of
unprecedented attack increases that hampers security issue of an organization because what
attack over your data and devices you got today that may not be face by the organization
professionals never before. (Sharma, 2016) When digital speakers are turned off, they still use
voice control sometimes to turn back on. So the speakers still have access to any conversations
or any music or noise going on without even user realizing it. This can be used against the user
by hackers.
Data privacy: The Internet of Things represent collection of data, storage and investigation
systems to a more noteworthy scale. 3 THERE ARE AN EVER INCREASING
NUMBER OF DEVICES ASSOCIATED WITH THE INTERNET AND THERE ARE
ADDITIONALLY MORE COMPONENTS THAT REQUIRE SECURITY AND
PRIVACY: THE DEVICE ITSELF, THE SYSTEM, THE APPLICATION OR THE
STAGE THAT IT UTILIZING. 4 (MASUMSADIQUE, 2018) TECHNICAL
VULNERABILITIES IN AUTHENTICATION: 3 THE IOT WORKS WITH
DEVICES OF VARIOUS NATURE THAT WILL BE ASSOCIAT ...
1. 11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&att… 1/11
2719.202010 - FALL 2019 - ACCESS CONTROL (ISOL-531-
08) - SECOND BI-TERM
Research Paper: IoT Security - Draft
Suma Reddy
on Sun, Nov 24 2019, 10:55 PM
65% highest match
Submission ID: 87817bbd-f9da-43ad-9f99-9f10168b7bbf
Attachments (1)
Reddy_Suma_IoT.docx
1 INTERNET OF THINGS
INTERNET OF THINGS (IOT) SUMA REDDY
2 UNIVERSITY OF CUMBERLANDS
Introduction:
2 INTERNET OF THINGS ALLOWS US TO CONNECT
ELECTRONIC AND
EMBEDDED DEVICES AROUND US WITH INTERNET. The
2. detailed answer is given
below. Internet of things is extension of internet connectivity on
day to day devices. The
electronic devices can be connected to each other via internet
and they can communicate with
each other, even remotely. So this allow us to handle electronic
devices without being
physically present near device. As device is connected to
internet and you can operate it
remotely using internet too. It allows automation. 2 IT CAN BE
HELPFUL IN
MEDICAL AND HEALTHCARE, WHERE DIGITIZED
HEALTHCARE SYSTEMS
ARE CREATED AND ALSO ALLOWS REMOTE HEALTH
MONITORING AND
EMERGENCY NOTIFICATION ETC. IOT CAN ALSO BE
USED IN TRANSPORT,
BUILDING AND HOME AUTOMATION, MANUFACTURING,
ENVIRONMENTAL
(http://safeassign.blackboard.com/)
Reddy_Suma_IoT.docx
Word Count: 898
Attachment ID: 2379284715
65%
3. http://safeassign.blackboard.com/
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&att… 2/11
MONITORING AND MANY MORE FIELDS. (SHARMA, 2016)
SECURITY
THREATS AND ISSUES WITH INTERNET OF THINGS:
IT HAS A SECURITY THREAT AND THEY CAN BE
HACKED. FOR EXAMPLE,
CAMERAS CAN BE HACKED WHICH CAUSES INVASION
OF PRIVACY. As
number of devices grows in an organization and organization
uses IOT, the chance of
unprecedented attack increases that hampers security issue of an
organization because what
attack over your data and devices you got today that may not be
face by the organization
professionals never before. (Sharma, 2016) When digital
speakers are turned off, they still use
voice control sometimes to turn back on. So the speakers still
have access to any conversations
4. or any music or noise going on without even user realizing it.
This can be used against the user
by hackers.
Data privacy: The Internet of Things represent collection of
data, storage and investigation
systems to a more noteworthy scale. 3 THERE ARE AN EVER
INCREASING
NUMBER OF DEVICES ASSOCIATED WITH THE INTERNET
AND THERE ARE
ADDITIONALLY MORE COMPONENTS THAT REQUIRE
SECURITY AND
PRIVACY: THE DEVICE ITSELF, THE SYSTEM, THE
APPLICATION OR THE
STAGE THAT IT UTILIZING. 4 (MASUMSADIQUE, 2018)
TECHNICAL
VULNERABILITIES IN AUTHENTICATION: 3 THE IOT
WORKS WITH
DEVICES OF VARIOUS NATURE THAT WILL BE
ASSOCIATED WITH THE
INTERNET AND GATHER CLIENT DATA IN THE CLOUD
THROUGH THE
INSTRUMENT ITSELF. One errand to do is to work inside and
out on the verification
instruments to guarantee the protection of the user. (Park, 2019)
5. Human factor: 3 THE
INTERNET OF THINGS IS A GENERALLY NEW
INNOVATIVE DEVELOPMENT.
NUMBNESS OF IOT SECURITY, BOTH BY
ORGANIZATIONS AND INDIVIDUAL
CLIENTS, LIKEWISE EXPANDS THE RISK OF CYBER
SECURITY BECAUSE OF
ABSENCE OF EXPERIENCE AND THE HUMAN FACTOR.
Data encryption: the transmission of data by non-encoded
implies presents a significant
security issue. 3 CONSIDER ADDITIONALLY THE
SIGNIFICANCE OF SYSTEM
SECURITY, SINCE THE IOT IS COMMONLY CENTERED ON
CELL PHONES OF
DIFFERENT SORTS AND PREVALENTLY WIRELESS
NETWORKS.
(MasumSadique, 2018). Security and privacy always more in
digitally connected systems and
environments. (Fake companies, stolen identities). DATA and
Complexity risk is also there
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
6. BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&att… 3/11
because the IOT system generates huge amount of data so
generates complexity to manage
that.
Complex system: 3 THE MORE DEVICES, INDIVIDUALS,
COMMUNICATIONS
AND INTERFACES, THE MORE THE RISK FOR
INFORMATION SECURITY
ADDITIONALLY INCREMENTS. IT IMPLIES THAT THERE
IS MORE
ASSORTMENT AND DECENT VARIETY IN THE NETWORK,
SO THE TEST OF
DEALING WITH ALL FOCUSES IN THE SYSTEM TO BOOST
SECURITY. 4
THESE ARE JUST SOME OF THE CHALLENGES OF
EXTENDING IOT DEVICES
AND CLOUD APPLICATIONS AND THEIR SECURITY
RISKS. (MasumSadique,
2018) Steps to mitigate these risks:
5 THE STEPS TO BE TAKEN TO MITIGATE THE RISK
INCLUDES HAVING THE
MORE SECURE ARCHITECTURE AND DIFFICULT TO
HACK FOR HACKERS.
7. THE SAFETY SHOULD BE KEPT IN MIND WHILE
DEVELOPING APPLICATION
FOR DEVICE. SO IF A DEVICE FAIL OR ANY EXCEPTION
OCCUR, THE
PHYSICAL HARM SHOULDN'T BE DONE. 2 WE CAN ALSO
CONSIDER ENTIRE
IOT ECOSYSTEM. ADDING INTELLIGENCE TO DEVICES
CAN ALSO HELP. 4
PARTNERING WITH A SECURITY EXPERT CAN MAKE A
BIG DIFFERENCE
DURING YOUR IOT DEPLOYMENTS. AN IOT SECURITY
EXPERT WILL HAVE
THE KNOWLEDGE AND EXPERIENCE TO HELP YOU
COMPLETE THE
DETAILED IOT RISK ASSESSMENTS, UNCOVER IOT-
SPECIFIC
VULNERABILITIES, CONDUCT PEN TESTING OR ETHICAL
HACKING ON
YOUR NEW OR EXISTING IOT DEVICES, AND FUTURE-
PROOF YOUR IOT
EFFORTS. 6 EVEN WITH THE MOST HIGHER
TECHNOLOGY, THE MOST
EFFECTUAL SECURITY SYSTEMS, AND BEST INTENDED
PREVENTIVE
8. WHEEL, A COMPANY IS DATA WILL AT RELAX BE AT
SOME RISK. (PARK,
2019)NEW AND SOPHISTICATED CYBER-ATTACK ARE
SHAPED EVERY DAY,
WITH PRESSURE COMING FROM PROFIT FORCED
CRIMINALS, HACKERS
WITH VARIOUS AGENDAS, UNSCRUPULOUS
COMPETITORS, AND EVEN
FOREIGN GOVERNMENTS. But you have to move toward
your cyber security in a clever
and regular way, implement a strategic array of
countermeasures that keep many points of
weakness for your network, servers, desktops, and smart
phones.
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&att… 4/11
Implemented properly, you can very much decrease your
security risk to the point that you
can feel sure that you can prevent security breaches.
References
9. Ali, B. (2018). 7 CYBER AND PHYSICAL SECURITY
VULNERABILITY
ASSESSMENT FOR IOT-BASED SMART HOMES. MDPI.
Brous, P. (2019). 1 THE DUAL EFFECTS OF THE INTERNET
OF THINGS (IOT): A
systematic review of the benefits and risks of IoT adoption by
organizations. International
Journal of Information Management.
MasumSadique, K. (2018). 4 TOWARDS SECURITY ON
INTERNET OF THINGS: 1
APPLICATIONS AND CHALLENGES IN TECHNOLOGY.
International Journal of
Information Management.
Park, M. (2019). Security Risk Measurement for Information
Leakage in IoT-Based Smart
Homes from a Situational Awareness Perspective. NCBI.
Sharma, V. (2016). A review paper on “IOT” & It‟s Smart. 8
INTERNATIONAL
JOURNAL OF SCIENCE, ENGINEERING AND
TECHNOLOGY RESEARCH.
Citations (8/8)
1 https://en.wikipedia.org/wiki?curid=12057519
10. 2 Another student's paper
3 Another student's paper
4 Another student's paper
5 Another student's paper
6 Another student's paper
7 Another student's paper
8 Another student's paper
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&att… 5/11
Matched Text
Suspected Entry: 100% match
Uploaded - Reddy_Suma_IoT.docx
INTERNET OF THINGS
Source - https://en.wikipedia.org/wiki?
curid=12057519
Internet of things
Suspected Entry: 69% match
11. Uploaded - Reddy_Suma_IoT.docx
INTERNET OF THINGS (IOT) SUMA REDDY
Source - https://en.wikipedia.org/wiki?
curid=12057519
"Internet of Things (IoT)
Suspected Entry: 70% match
Uploaded - Reddy_Suma_IoT.docx
THE DUAL EFFECTS OF THE INTERNET OF
THINGS (IOT)
Source - https://en.wikipedia.org/wiki?
curid=12057519
"Internet of Things (IoT)
Suspected Entry: 63% match
Uploaded - Reddy_Suma_IoT.docx
APPLICATIONS AND CHALLENGES IN
TECHNOLOGY
Source - https://en.wikipedia.org/wiki?
curid=12057519
Challenges, Advances, and Applications
Suspected Entry: 100% match
Uploaded - Reddy_Suma_IoT.docx
UNIVERSITY OF CUMBERLANDS
Source - Another student's paper
12. University of the Cumberlands
Suspected Entry: 85% match
Uploaded - Reddy_Suma_IoT.docx
INTERNET OF THINGS ALLOWS US TO CONNECT
ELECTRONIC AND EMBEDDED DEVICES
AROUND US WITH INTERNET
Source - Another student's paper
IOT allows us to connect electronic and embedded
devices around us with internet
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&att… 6/11
Suspected Entry: 77% match
Uploaded - Reddy_Suma_IoT.docx
IT CAN BE HELPFUL IN MEDICAL AND
HEALTHCARE, WHERE DIGITIZED HEALTHCARE
SYSTEMS ARE CREATED AND ALSO ALLOWS
REMOTE HEALTH MONITORING AND
EMERGENCY NOTIFICATION ETC
Source - Another student's paper
It allows automation and it can help in medical,
healthcare, where digitized healthcare systems create
and allows remote health monitoring and emergency
notification
13. Suspected Entry: 100% match
Uploaded - Reddy_Suma_IoT.docx
IOT CAN ALSO BE USED IN TRANSPORT,
BUILDING AND HOME AUTOMATION,
MANUFACTURING, ENVIRONMENTAL
MONITORING AND MANY MORE FIELDS
Source - Another student's paper
IOT can also be used in transport, building and home
automation, manufacturing, environmental monitoring
and many more fields
Suspected Entry: 64% match
Uploaded - Reddy_Suma_IoT.docx
(SHARMA, 2016) SECURITY THREATS AND
ISSUES WITH INTERNET OF THINGS
Source - Another student's paper
Security risks and issues with internet of things
Suspected Entry: 99% match
Uploaded - Reddy_Suma_IoT.docx
IT HAS A SECURITY THREAT AND THEY CAN BE
HACKED
Source - Another student's paper
· It has a security threat and they can be hacked
Suspected Entry: 87% match
Uploaded - Reddy_Suma_IoT.docx
FOR EXAMPLE, CAMERAS CAN BE HACKED
WHICH CAUSES INVASION OF PRIVACY
14. Source - Another student's paper
For example cameras can be hacked which causes
raid of privacy
Suspected Entry: 100% match
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&att… 7/11
Uploaded - Reddy_Suma_IoT.docx
WE CAN ALSO CONSIDER ENTIRE IOT
ECOSYSTEM
Source - Another student's paper
We can also consider the entire IOT ecosystem
Suspected Entry: 100% match
Uploaded - Reddy_Suma_IoT.docx
ADDING INTELLIGENCE TO DEVICES CAN ALSO
HELP
Source - Another student's paper
Adding intelligence to devices can also help
Suspected Entry: 81% match
Uploaded - Reddy_Suma_IoT.docx
THERE ARE AN EVER INCREASING NUMBER OF
DEVICES ASSOCIATED WITH THE INTERNET
15. AND THERE ARE ADDITIONALLY MORE
COMPONENTS THAT REQUIRE SECURITY AND
PRIVACY
Source - Another student's paper
There are an ever increasing number of gadgets
associated with the Internet and there are likewise
more components that require security
Suspected Entry: 68% match
Uploaded - Reddy_Suma_IoT.docx
THE DEVICE ITSELF, THE SYSTEM, THE
APPLICATION OR THE STAGE THAT IT UTILIZING
Source - Another student's paper
the gadget itself, the system, the application or the
stage that it employments
Suspected Entry: 88% match
Uploaded - Reddy_Suma_IoT.docx
THE IOT WORKS WITH DEVICES OF VARIOUS
NATURE THAT WILL BE ASSOCIATED WITH THE
INTERNET AND GATHER CLIENT DATA IN THE
CLOUD THROUGH THE INSTRUMENT ITSELF
Source - Another student's paper
The IoT works with gadgets of various nature that will
be associated with the Internet and gather client
information in the cloud through the instrument itself
Suspected Entry: 79% match
Uploaded - Reddy_Suma_IoT.docx
THE INTERNET OF THINGS IS A GENERALLY
16. NEW INNOVATIVE DEVELOPMENT
Source - Another student's paper
The Internet of Things is a generally new mechanical
development
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&att… 8/11
Suspected Entry: 85% match
Uploaded - Reddy_Suma_IoT.docx
NUMBNESS OF IOT SECURITY, BOTH BY
ORGANIZATIONS AND INDIVIDUAL CLIENTS,
LIKEWISE EXPANDS THE RISK OF CYBER
SECURITY BECAUSE OF ABSENCE OF
EXPERIENCE AND THE HUMAN FACTOR
Source - Another student's paper
Numbness of IoT security, both by organizations and
individual clients, likewise expands the dangers of
cybersecurity because of absence of experience and
the human factor
Suspected Entry: 73% match
Uploaded - Reddy_Suma_IoT.docx
CONSIDER ADDITIONALLY THE SIGNIFICANCE
OF SYSTEM SECURITY, SINCE THE IOT IS
COMMONLY CENTERED ON CELL PHONES OF
DIFFERENT SORTS AND PREVALENTLY
17. WIRELESS NETWORKS
Source - Another student's paper
Consider likewise the significance of system security,
since the IoT is commonly centered around cell
phones of different kinds and prevalently remote
systems
Suspected Entry: 71% match
Uploaded - Reddy_Suma_IoT.docx
THE MORE DEVICES, INDIVIDUALS,
COMMUNICATIONS AND INTERFACES, THE
MORE THE RISK FOR INFORMATION SECURITY
ADDITIONALLY INCREMENTS
Source - Another student's paper
the more gadgets, individuals, communications and
interfaces, the more the hazard for information
security likewise increments
Suspected Entry: 82% match
Uploaded - Reddy_Suma_IoT.docx
IT IMPLIES THAT THERE IS MORE ASSORTMENT
AND DECENT VARIETY IN THE NETWORK, SO
THE TEST OF DEALING WITH ALL FOCUSES IN
THE SYSTEM TO BOOST SECURITY
Source - Another student's paper
It implies that there is more assortment and decent
variety in the framework, so the test of dealing with all
focuses in the system to amplify security likewise
increments
Suspected Entry: 73% match
18. Uploaded - Reddy_Suma_IoT.docx Source - Another student's
paper
Technical vulnerabilities in authentication
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&att… 9/11
(MASUMSADIQUE, 2018) TECHNICAL
VULNERABILITIES IN AUTHENTICATION
Suspected Entry: 97% match
Uploaded - Reddy_Suma_IoT.docx
THESE ARE JUST SOME OF THE CHALLENGES
OF EXTENDING IOT DEVICES AND CLOUD
APPLICATIONS AND THEIR SECURITY RISKS
Source - Another student's paper
These are just some of the challenges and security
risks of extending IoT devices and cloud applications
Suspected Entry: 100% match
Uploaded - Reddy_Suma_IoT.docx
PARTNERING WITH A SECURITY EXPERT CAN
MAKE A BIG DIFFERENCE DURING YOUR IOT
DEPLOYMENTS
Source - Another student's paper
Partnering with a security expert can make a big
19. difference during your IoT deployments
Suspected Entry: 100% match
Uploaded - Reddy_Suma_IoT.docx
AN IOT SECURITY EXPERT WILL HAVE THE
KNOWLEDGE AND EXPERIENCE TO HELP YOU
COMPLETE THE DETAILED IOT RISK
ASSESSMENTS, UNCOVER IOT-SPECIFIC
VULNERABILITIES, CONDUCT PEN TESTING OR
ETHICAL HACKING ON YOUR NEW OR EXISTING
IOT DEVICES, AND FUTURE-PROOF YOUR IOT
EFFORTS
Source - Another student's paper
An IoT security expert will have the knowledge and
experience to help you complete the detailed IoT risk
assessments, uncover IoT-specific vulnerabilities,
conduct pen testing or ethical hacking on your new or
existing IoT devices, and future-proof your IoT efforts
Suspected Entry: 74% match
Uploaded - Reddy_Suma_IoT.docx
TOWARDS SECURITY ON INTERNET OF THINGS
Source - Another student's paper
Security of the Internet of Things
Suspected Entry: 95% match
Uploaded - Reddy_Suma_IoT.docx
THE STEPS TO BE TAKEN TO MITIGATE THE
RISK INCLUDES HAVING THE MORE SECURE
Source - Another student's paper
20. Mitigations The steps to be taken to mitigate the risk
includes having the more secure architecture and
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&a… 10/11
ARCHITECTURE AND DIFFICULT TO HACK FOR
HACKERS
difficult to hack for hackers
Suspected Entry: 99% match
Uploaded - Reddy_Suma_IoT.docx
THE SAFETY SHOULD BE KEPT IN MIND WHILE
DEVELOPING APPLICATION FOR DEVICE
Source - Another student's paper
The safety should be kept in mind while developing
application for device
Suspected Entry: 100% match
Uploaded - Reddy_Suma_IoT.docx
SO IF A DEVICE FAIL OR ANY EXCEPTION
OCCUR, THE PHYSICAL HARM SHOULDN'T BE
DONE
Source - Another student's paper
So, if a device fail or any exception occur, the
physical harm shouldn't be done
21. Suspected Entry: 62% match
Uploaded - Reddy_Suma_IoT.docx
EVEN WITH THE MOST HIGHER TECHNOLOGY,
THE MOST EFFECTUAL SECURITY SYSTEMS,
AND BEST INTENDED PREVENTIVE WHEEL, A
COMPANY IS DATA WILL AT RELAX BE AT SOME
RISK
Source - Another student's paper
Even with the most advanced technology, the most
effective security systems, and best-planned
preventative controls, a company’s data will still be at
some risk
Suspected Entry: 76% match
Uploaded - Reddy_Suma_IoT.docx
(PARK, 2019)NEW AND SOPHISTICATED CYBER-
ATTACK ARE SHAPED EVERY DAY, WITH
PRESSURE COMING FROM PROFIT FORCED
CRIMINALS, HACKERS WITH VARIOUS
AGENDAS, UNSCRUPULOUS COMPETITORS,
AND EVEN FOREIGN GOVERNMENTS
Source - Another student's paper
New and sophisticated cyber-attacks are created
every day, with threats coming from profit-motivated
criminals, hackers with various agendas,
unscrupulous competitors, and even foreign
governments (Scheetz,2012)
Suspected Entry: 100% match
Uploaded - Reddy_Suma_IoT.docx Source - Another student's
22. paper
11/27/2019 SafeAssign Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReportPrint?course_id=_110806_
1&paperId=2379284715&&a… 11/11
CYBER AND PHYSICAL SECURITY
VULNERABILITY ASSESSMENT FOR IOT-BASED
SMART HOMES
Cyber and Physical Security Vulnerability Assessment
for IoT- Based Smart Homes
Suspected Entry: 81% match
Uploaded - Reddy_Suma_IoT.docx
INTERNATIONAL JOURNAL OF SCIENCE,
ENGINEERING AND TECHNOLOGY RESEARCH
Source - Another student's paper
International Journal Of Engineering Sciences and
Research Technology
Running head: SHORTENED TITLE UP TO 50 CHARACTERS
1
SHORTENED TITLE UP TO 50 CHARACTERS
2
Add Title Here, up to 12 Words, on One to Two Lines
Author Name(s), First M. Last, Omit Titles and Degrees
Institutional Affiliation(s)Author Note
23. Include any grant/funding information and a complete
correspondence address.
Abstract
The abstract should be one paragraph of between 150 and 250
words. It is not indented. Section titles, such as the word
Abstract above, are not considered headings so they don’t use
bold heading format. Instead, use the Section Title style. This
style automatically starts your section on a new page, so you
don’t have to add page breaks. (To see your document with
pagination, on the View tab, click Reading View.) Note that all
text styles for this template are available on the Home tab of the
ribbon, in the Styles gallery.
Keywords: Add keywords here. To replace this (or any) tip text
with your own, just select it and then start typing. Don’t include
space to the right or left of the characters in your selection.
Add Title Here, up to 12 Words, on One to Two Lines
The body of your paper uses a half-inch first line indent and is
double-spaced. APA style provides for up to five heading
levels, shown in the paragraphs that follow. Note that the word
Introduction should not be used as an initial heading, as it’s
assumed that your paper begins with an introduction.Literature
Review
The first two heading levels get their own paragraph, as shown
here. Headings 3, 4, and 5 are run-in headings used at the
beginning of the paragraph.
Heading 21
For APA formatting requirements, it’s easy to just type your
own footnote references and notes. To format a footnote
reference, select the number and then, on the Home tab, in the
Styles gallery, click Footnote Reference.
Heading 3.
Include a period at the end of a run-in heading. Note that you
can include consecutive paragraphs with their own headings,
where appropriate. Heading 4.
When using headings, don’t skip levels. If you need a heading
24. 3, 4, or 5 with no text following it before the next heading, just
add a period at the end of the heading and then start a new
paragraph for the subheading and its text. (Last Name,
Year)Heading 5.
Like all sections of your paper, references start on their own
page, as you see on the page that follows. Just type in-text
citations as you do any text of your paper, as shown at the end
of this paragraph and the preceding paragraph. (Last Name,
Year)Discussion
The first two heading levels get their own paragraph, as shown
here. Headings 3, 4, and 5 are run-in headings used at the
beginning of the paragraph.
Heading 21
For APA formatting requirements, it’s easy to just type your
own footnote references and notes. To format a footnote
reference, select the number and then, on the Home tab, in the
Styles gallery, click Footnote Reference.
Heading 3.
Include a period at the end of a run-in heading. Note that you
can include consecutive paragraphs with their own headings,
where appropriate. Heading 4.
When using headings, don’t skip levels. If you need a heading
3, 4, or 5 with no text following it before the next heading, just
add a period at the end of the heading and then start a new
paragraph for the subheading and its text. (Last Name,
Year)Heading 5.
Like all sections of your paper, references start on their own
page, as you see on the page that follows. Just type in-text
citations as you do any text of your paper, as shown at the end
of this paragraph and the preceding paragraph. (Last Name,
Year)
Conclusion and Future Study
The first two heading levels get their own paragraph, as shown
here. Headings 3, 4, and 5 are run-in headings used at the
25. beginning of the paragraph.
Heading 21
For APA formatting requirements, it’s easy to just type your
own footnote references and notes. To format a footnote
reference, select the number and then, on the Home tab, in the
Styles gallery, click Footnote Reference.
Heading 3.
Include a period at the end of a run-in heading. Note that you
can include consecutive paragraphs with their own headings,
where appropriate. Heading 4.
When using headings, don’t skip levels. If you need a heading
3, 4, or 5 with no text following it before the next heading, just
add a period at the end of the heading and then start a new
paragraph for the subheading and its text. (Last Name,
Year)Heading 5.
Like all sections of your paper, references start on their own
page, as you see on the page that follows. Just type in-text
citations as you do any text of your paper, as shown at the end
of this paragraph and the preceding paragraph. (Last Name,
Year)
References
Last Name, F. M. (Year). Article Title. Journal Title, Pages
From - To.
Last Name, F. M. (Year). Book Title. City Name: Publisher
Name
Footnotes
1Add footnotes, if any, on their own page following references.
The body of a footnote, such as this example, uses the Normal
text style. (Note: If you delete this sample footnote, don’t forget
to delete its in-text reference as well. That’s at the end of the
sample Heading 2 paragraph on the first page of body content in
this template.)
Appendix A
26. Table 1
Table TitleColumn HeadColumn HeadColumn HeadColumn
HeadColumn HeadRow Head123123123123Row
Head456456456456Row Head789789789789Row
Head123123123123Row Head456456456456Row
Head789789789789
Note: Place all tables for your paper in a tables section,
following references (and, if applicable, footnotes). Start a new
page for each table, include a table number and table title for
each, as shown on this page. All explanatory text appears in a
table note that follows the table, such as this one. Use the
Table/Figure style, available on the Home tab, in the Styles
gallery, to get the spacing between table and note. Tables in
APA format can use single or 1.5-line spacing. Include a
heading for every row and column, even if the content seems
obvious. A table style has been setup for this template that fits
APA guidelines. To insert a table, on the Insert tab, click Table.
Appendix BFigures
Figure 1. Include all figures in their own section, following
references (and footnotes and tables, if applicable). Include a
numbered caption for each figure. Use the Table/Figure style
for easy spacing between figure and caption.
For more information about all elements of APA formatting,
please consult the APA Style Manual, 6th Edition.