SlideShare a Scribd company logo
Assignment Description
After the discussion has been completed concerning with the
networking manager of your organization concerning the
integration effort, you have actions items to provide 3-5 pages
of requirements addressing the security concerns present when
IoT devices communicate. Organizations attempting IoT
communications will need to bring their security posture to a
new level of depth if they are use the benefits of IoT
communications, therefore this documentation to be given to the
networking is critical to the overall productivity and data
security.
The priority will be to provide an explanation of at least 1 page
concerning the security concepts present when IoT devices
network and communicate.
Provide details for IoT device security: endpoint hardening,
protecting against vulnerabilities, encryption and device trust
using PKI.
Provide details for IoT network security: context aware user
authentication/access control, sophisticated password
importance, and network and transport layer encryption
Provide 10 "shall" security requirements associated with the IoT
device network communications required for the networking
manager to follow when configuring and allowing the IoT
devices to communicate on the corporate network. For example,
provide at least the depth of the following requirements:
"XYZ Corporation shall provide a security layer performing
encryption/decryption and ensuring data integrity and privacy"
"The XYZ corporate network administrator shall be capable of
placing owner controls or restrictions on the kinds of devices
that can connect to it."
Identify how the organization can provide audit trails, endpoint
anomaly detection and a forensic security capability to ensure a
stable security posture.
Notice these are considered Tier 1 requirements, and do not
need to be testable. All requirements should be clear, and
unambiguous. The security discussion and requirements should
be applied to the "network" and "device application" levels. For
example, clients use DTLS (Datagram Transport Layer Security)
at the Application level.

More Related Content

Similar to Assignment DescriptionAfter the discussion has been complete.docx

Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
IJERA Editor
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET Journal
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
ardexateam
 
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
Muhammad Ahad
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
International Communications Corporation
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
International Communications Corporation
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET Journal
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
ijtsrd
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
vivatechijri
 
Part 1discuss with management the options the corporations w.docx
Part 1discuss with management the options the corporations w.docxPart 1discuss with management the options the corporations w.docx
Part 1discuss with management the options the corporations w.docx
smile790243
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
Rupesh930637
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Kresimir Popovic
 
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlock Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for Telcom
BlockArmour1
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
Joseph Holbrook, Chief Learning Officer (CLO)
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
 
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
IJCNCJournal
 
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
IJCNCJournal
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
Fast Lane Consulting and Education, Inc.
 

Similar to Assignment DescriptionAfter the discussion has been complete.docx (20)

Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
Part 1discuss with management the options the corporations w.docx
Part 1discuss with management the options the corporations w.docxPart 1discuss with management the options the corporations w.docx
Part 1discuss with management the options the corporations w.docx
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlock Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for Telcom
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
 
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 

More from standfordabbot

Discuss the evolution of law enforcement in terms of forensic scienc.docx
Discuss the evolution of law enforcement in terms of forensic scienc.docxDiscuss the evolution of law enforcement in terms of forensic scienc.docx
Discuss the evolution of law enforcement in terms of forensic scienc.docx
standfordabbot
 
Discuss the ethics of medianews reporting matters of national.docx
Discuss the ethics of medianews reporting matters of national.docxDiscuss the ethics of medianews reporting matters of national.docx
Discuss the ethics of medianews reporting matters of national.docx
standfordabbot
 
Discuss the ethics of using unconscious nudges to alter peoples beh.docx
Discuss the ethics of using unconscious nudges to alter peoples beh.docxDiscuss the ethics of using unconscious nudges to alter peoples beh.docx
Discuss the ethics of using unconscious nudges to alter peoples beh.docx
standfordabbot
 
Discuss the ethical implications of a leaders role in the socia.docx
Discuss the ethical implications of a leaders role in the socia.docxDiscuss the ethical implications of a leaders role in the socia.docx
Discuss the ethical implications of a leaders role in the socia.docx
standfordabbot
 
discuss the differences between Virtualization and Cloud Computi.docx
discuss the differences between Virtualization and Cloud Computi.docxdiscuss the differences between Virtualization and Cloud Computi.docx
discuss the differences between Virtualization and Cloud Computi.docx
standfordabbot
 
Discuss the differences between substantive law, procedural law,.docx
Discuss the differences between substantive law, procedural law,.docxDiscuss the differences between substantive law, procedural law,.docx
Discuss the differences between substantive law, procedural law,.docx
standfordabbot
 
Discuss the differences between the three major approaches surroundi.docx
Discuss the differences between the three major approaches surroundi.docxDiscuss the differences between the three major approaches surroundi.docx
Discuss the differences between the three major approaches surroundi.docx
standfordabbot
 
Discuss the differences between Unitary and confederal systems of go.docx
Discuss the differences between Unitary and confederal systems of go.docxDiscuss the differences between Unitary and confederal systems of go.docx
Discuss the differences between Unitary and confederal systems of go.docx
standfordabbot
 
Discuss the differences between the systems development life c.docx
Discuss the differences between the systems development life c.docxDiscuss the differences between the systems development life c.docx
Discuss the differences between the systems development life c.docx
standfordabbot
 
Discuss the differences between substantive law, procedural law, c.docx
Discuss the differences between substantive law, procedural law, c.docxDiscuss the differences between substantive law, procedural law, c.docx
Discuss the differences between substantive law, procedural law, c.docx
standfordabbot
 
Discuss the differences between communism socialism and capitalism.docx
Discuss the differences between communism socialism and capitalism.docxDiscuss the differences between communism socialism and capitalism.docx
Discuss the differences between communism socialism and capitalism.docx
standfordabbot
 
Discuss the differences between civil and criminal courts. Is the li.docx
Discuss the differences between civil and criminal courts. Is the li.docxDiscuss the differences between civil and criminal courts. Is the li.docx
Discuss the differences between civil and criminal courts. Is the li.docx
standfordabbot
 
Discuss the difference between normative economic analysis and posit.docx
Discuss the difference between normative economic analysis and posit.docxDiscuss the difference between normative economic analysis and posit.docx
Discuss the difference between normative economic analysis and posit.docx
standfordabbot
 
Discuss the difference between external and internal evidence as it .docx
Discuss the difference between external and internal evidence as it .docxDiscuss the difference between external and internal evidence as it .docx
Discuss the difference between external and internal evidence as it .docx
standfordabbot
 
Discuss the difference between an income tax expense and an in.docx
Discuss the difference between an income tax expense and an in.docxDiscuss the difference between an income tax expense and an in.docx
Discuss the difference between an income tax expense and an in.docx
standfordabbot
 
Discuss the development of political and social structures that prod.docx
Discuss the development of political and social structures that prod.docxDiscuss the development of political and social structures that prod.docx
Discuss the development of political and social structures that prod.docx
standfordabbot
 
Discuss the development of coronary artery disease (CAD) and the lin.docx
Discuss the development of coronary artery disease (CAD) and the lin.docxDiscuss the development of coronary artery disease (CAD) and the lin.docx
Discuss the development of coronary artery disease (CAD) and the lin.docx
standfordabbot
 
Discuss the data visualization in the attached file below (Data Visu.docx
Discuss the data visualization in the attached file below (Data Visu.docxDiscuss the data visualization in the attached file below (Data Visu.docx
Discuss the data visualization in the attached file below (Data Visu.docx
standfordabbot
 
Discuss the data set and the following topics.How effective .docx
Discuss the data set and the following topics.How effective .docxDiscuss the data set and the following topics.How effective .docx
Discuss the data set and the following topics.How effective .docx
standfordabbot
 
Discuss the case study of Ciba-Geigy p.docx
Discuss the case study of Ciba-Geigy p.docxDiscuss the case study of Ciba-Geigy p.docx
Discuss the case study of Ciba-Geigy p.docx
standfordabbot
 

More from standfordabbot (20)

Discuss the evolution of law enforcement in terms of forensic scienc.docx
Discuss the evolution of law enforcement in terms of forensic scienc.docxDiscuss the evolution of law enforcement in terms of forensic scienc.docx
Discuss the evolution of law enforcement in terms of forensic scienc.docx
 
Discuss the ethics of medianews reporting matters of national.docx
Discuss the ethics of medianews reporting matters of national.docxDiscuss the ethics of medianews reporting matters of national.docx
Discuss the ethics of medianews reporting matters of national.docx
 
Discuss the ethics of using unconscious nudges to alter peoples beh.docx
Discuss the ethics of using unconscious nudges to alter peoples beh.docxDiscuss the ethics of using unconscious nudges to alter peoples beh.docx
Discuss the ethics of using unconscious nudges to alter peoples beh.docx
 
Discuss the ethical implications of a leaders role in the socia.docx
Discuss the ethical implications of a leaders role in the socia.docxDiscuss the ethical implications of a leaders role in the socia.docx
Discuss the ethical implications of a leaders role in the socia.docx
 
discuss the differences between Virtualization and Cloud Computi.docx
discuss the differences between Virtualization and Cloud Computi.docxdiscuss the differences between Virtualization and Cloud Computi.docx
discuss the differences between Virtualization and Cloud Computi.docx
 
Discuss the differences between substantive law, procedural law,.docx
Discuss the differences between substantive law, procedural law,.docxDiscuss the differences between substantive law, procedural law,.docx
Discuss the differences between substantive law, procedural law,.docx
 
Discuss the differences between the three major approaches surroundi.docx
Discuss the differences between the three major approaches surroundi.docxDiscuss the differences between the three major approaches surroundi.docx
Discuss the differences between the three major approaches surroundi.docx
 
Discuss the differences between Unitary and confederal systems of go.docx
Discuss the differences between Unitary and confederal systems of go.docxDiscuss the differences between Unitary and confederal systems of go.docx
Discuss the differences between Unitary and confederal systems of go.docx
 
Discuss the differences between the systems development life c.docx
Discuss the differences between the systems development life c.docxDiscuss the differences between the systems development life c.docx
Discuss the differences between the systems development life c.docx
 
Discuss the differences between substantive law, procedural law, c.docx
Discuss the differences between substantive law, procedural law, c.docxDiscuss the differences between substantive law, procedural law, c.docx
Discuss the differences between substantive law, procedural law, c.docx
 
Discuss the differences between communism socialism and capitalism.docx
Discuss the differences between communism socialism and capitalism.docxDiscuss the differences between communism socialism and capitalism.docx
Discuss the differences between communism socialism and capitalism.docx
 
Discuss the differences between civil and criminal courts. Is the li.docx
Discuss the differences between civil and criminal courts. Is the li.docxDiscuss the differences between civil and criminal courts. Is the li.docx
Discuss the differences between civil and criminal courts. Is the li.docx
 
Discuss the difference between normative economic analysis and posit.docx
Discuss the difference between normative economic analysis and posit.docxDiscuss the difference between normative economic analysis and posit.docx
Discuss the difference between normative economic analysis and posit.docx
 
Discuss the difference between external and internal evidence as it .docx
Discuss the difference between external and internal evidence as it .docxDiscuss the difference between external and internal evidence as it .docx
Discuss the difference between external and internal evidence as it .docx
 
Discuss the difference between an income tax expense and an in.docx
Discuss the difference between an income tax expense and an in.docxDiscuss the difference between an income tax expense and an in.docx
Discuss the difference between an income tax expense and an in.docx
 
Discuss the development of political and social structures that prod.docx
Discuss the development of political and social structures that prod.docxDiscuss the development of political and social structures that prod.docx
Discuss the development of political and social structures that prod.docx
 
Discuss the development of coronary artery disease (CAD) and the lin.docx
Discuss the development of coronary artery disease (CAD) and the lin.docxDiscuss the development of coronary artery disease (CAD) and the lin.docx
Discuss the development of coronary artery disease (CAD) and the lin.docx
 
Discuss the data visualization in the attached file below (Data Visu.docx
Discuss the data visualization in the attached file below (Data Visu.docxDiscuss the data visualization in the attached file below (Data Visu.docx
Discuss the data visualization in the attached file below (Data Visu.docx
 
Discuss the data set and the following topics.How effective .docx
Discuss the data set and the following topics.How effective .docxDiscuss the data set and the following topics.How effective .docx
Discuss the data set and the following topics.How effective .docx
 
Discuss the case study of Ciba-Geigy p.docx
Discuss the case study of Ciba-Geigy p.docxDiscuss the case study of Ciba-Geigy p.docx
Discuss the case study of Ciba-Geigy p.docx
 

Recently uploaded

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 

Assignment DescriptionAfter the discussion has been complete.docx

  • 1. Assignment Description After the discussion has been completed concerning with the networking manager of your organization concerning the integration effort, you have actions items to provide 3-5 pages of requirements addressing the security concerns present when IoT devices communicate. Organizations attempting IoT communications will need to bring their security posture to a new level of depth if they are use the benefits of IoT communications, therefore this documentation to be given to the networking is critical to the overall productivity and data security. The priority will be to provide an explanation of at least 1 page concerning the security concepts present when IoT devices network and communicate. Provide details for IoT device security: endpoint hardening, protecting against vulnerabilities, encryption and device trust using PKI. Provide details for IoT network security: context aware user authentication/access control, sophisticated password importance, and network and transport layer encryption Provide 10 "shall" security requirements associated with the IoT device network communications required for the networking manager to follow when configuring and allowing the IoT devices to communicate on the corporate network. For example,
  • 2. provide at least the depth of the following requirements: "XYZ Corporation shall provide a security layer performing encryption/decryption and ensuring data integrity and privacy" "The XYZ corporate network administrator shall be capable of placing owner controls or restrictions on the kinds of devices that can connect to it." Identify how the organization can provide audit trails, endpoint anomaly detection and a forensic security capability to ensure a stable security posture. Notice these are considered Tier 1 requirements, and do not need to be testable. All requirements should be clear, and unambiguous. The security discussion and requirements should be applied to the "network" and "device application" levels. For example, clients use DTLS (Datagram Transport Layer Security) at the Application level.