SlideShare a Scribd company logo
Final Project - IoT Security Research
Attached Files:
Personal data breaches and securing IoT devices.docx
(55.866 KB)
What are the Challenges of IoT Security.docx
(17.965 KB)
IoT References.docx
(13.394 KB)
Final Research Project - IoT.docx
(51.345 KB)
Final Assignment - Project Plan (Deliverables):
Securing IoT Devices: What are the Challenges?
Security practitioners suggest that key IoT security steps
include:
1) Make people aware that there is a threat to security;
2) Design a technical solution to reduce security vulnerabilities;
3) Align the legal and regulatory frameworks; and
4) Develop a workforce with the skills to handle IoT security.
Final Assignment - Project Plan (Deliverables):
1) Address each of the FOUR IoT security steps listed above in
terms of IoT devices by explaining in a step-by-step guide, how
to make people more aware of the problems associated with the
use of IoT devices.
2) If you owned a large company like RING, SimpliSafe,
MedicalAlert or NEST that experienced a data breach due to
faulty security settings on one of your IoT devices (such as a
video doorbell or medical alert bracelet or a similar device)
what would you tell your business partners and customers?
Prepare a letter to send to your customers explaining the
situation and what you plan to do about it. Keep in mind you
want to do all you can to avoid losing business over this breach.

More Related Content

Similar to Final Project - IoT Security ResearchAttached Files P

A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practiceteam-WIBU
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts#essaywriting
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)Eswar Publications
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedTiffany Graham
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTvishal dineshkumar soni
 
IoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and securityIoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and securityDeniseFerniza
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptxSyedSaqlain32
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureIJAEMSJORNAL
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
 

Similar to Final Project - IoT Security ResearchAttached Files P (20)

A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
 
sample assignment
sample assignmentsample assignment
sample assignment
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
ITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet ENITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet EN
 
IoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and securityIoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and security
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptx
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT Infrastructure
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 

More from depoerossie

Transmission of Genetic MaterialComplete the discussions on the fo.docx
Transmission of Genetic MaterialComplete the discussions on the fo.docxTransmission of Genetic MaterialComplete the discussions on the fo.docx
Transmission of Genetic MaterialComplete the discussions on the fo.docxdepoerossie
 
Translating Theories and Research into PracticeIntroductio.docx
Translating Theories and Research into PracticeIntroductio.docxTranslating Theories and Research into PracticeIntroductio.docx
Translating Theories and Research into PracticeIntroductio.docxdepoerossie
 
Treating people fairly (e.g no discrimination, harassment, absence o.docx
Treating people fairly (e.g no discrimination, harassment, absence o.docxTreating people fairly (e.g no discrimination, harassment, absence o.docx
Treating people fairly (e.g no discrimination, harassment, absence o.docxdepoerossie
 
Transparency in the WorkplaceIt is not a surprise that transpar.docx
Transparency in the WorkplaceIt is not a surprise that transpar.docxTransparency in the WorkplaceIt is not a surprise that transpar.docx
Transparency in the WorkplaceIt is not a surprise that transpar.docxdepoerossie
 
Translating Theory Into PracticeWhen water is in a solid state.docx
Translating Theory Into PracticeWhen water is in a solid state.docxTranslating Theory Into PracticeWhen water is in a solid state.docx
Translating Theory Into PracticeWhen water is in a solid state.docxdepoerossie
 
translate the attached code in matlab to ansi C.It is required to .docx
translate the attached code in matlab to ansi C.It is required to .docxtranslate the attached code in matlab to ansi C.It is required to .docx
translate the attached code in matlab to ansi C.It is required to .docxdepoerossie
 
Transportation has played a tremendous role in shaping the economy a.docx
Transportation has played a tremendous role in shaping the economy a.docxTransportation has played a tremendous role in shaping the economy a.docx
Transportation has played a tremendous role in shaping the economy a.docxdepoerossie
 
Transition into AdulthoodThe transition into adulthood may dif.docx
Transition into AdulthoodThe transition into adulthood may dif.docxTransition into AdulthoodThe transition into adulthood may dif.docx
Transition into AdulthoodThe transition into adulthood may dif.docxdepoerossie
 
Transform at least 4 Renaissance masters into a cast of superheroes .docx
Transform at least 4 Renaissance masters into a cast of superheroes .docxTransform at least 4 Renaissance masters into a cast of superheroes .docx
Transform at least 4 Renaissance masters into a cast of superheroes .docxdepoerossie
 
Traditionally, mental illness was considered a biological problem, e.docx
Traditionally, mental illness was considered a biological problem, e.docxTraditionally, mental illness was considered a biological problem, e.docx
Traditionally, mental illness was considered a biological problem, e.docxdepoerossie
 
Tragedy Across the Mediterranean Consider The Tale of Sohrab” fr.docx
Tragedy Across the Mediterranean Consider The Tale of Sohrab” fr.docxTragedy Across the Mediterranean Consider The Tale of Sohrab” fr.docx
Tragedy Across the Mediterranean Consider The Tale of Sohrab” fr.docxdepoerossie
 
Trace the patterns of international migration since 1970, with refer.docx
Trace the patterns of international migration since 1970, with refer.docxTrace the patterns of international migration since 1970, with refer.docx
Trace the patterns of international migration since 1970, with refer.docxdepoerossie
 
Topic:Food Access and Health Outcomes in AmericanIntroduction.docx
Topic:Food Access and Health Outcomes in AmericanIntroduction.docxTopic:Food Access and Health Outcomes in AmericanIntroduction.docx
Topic:Food Access and Health Outcomes in AmericanIntroduction.docxdepoerossie
 
Tourism Development in Kuwait Reality and FutureThe gover.docx
Tourism Development in Kuwait Reality and FutureThe gover.docxTourism Development in Kuwait Reality and FutureThe gover.docx
Tourism Development in Kuwait Reality and FutureThe gover.docxdepoerossie
 
Topic Securing the crime scene and crime scene searchResear.docx
Topic Securing the crime scene and crime scene searchResear.docxTopic Securing the crime scene and crime scene searchResear.docx
Topic Securing the crime scene and crime scene searchResear.docxdepoerossie
 
Topic Worldview AnalysisQuestionPrompt After reviewing the .docx
Topic Worldview AnalysisQuestionPrompt After reviewing the .docxTopic Worldview AnalysisQuestionPrompt After reviewing the .docx
Topic Worldview AnalysisQuestionPrompt After reviewing the .docxdepoerossie
 
Topic Water and Real EstateWrite a 1 page reviewcommentary o.docx
Topic Water and Real EstateWrite a 1 page reviewcommentary o.docxTopic Water and Real EstateWrite a 1 page reviewcommentary o.docx
Topic Water and Real EstateWrite a 1 page reviewcommentary o.docxdepoerossie
 
Topic Influence of Foot Binding in Chinese Women During the 20th .docx
Topic Influence of Foot Binding in Chinese Women During the 20th .docxTopic Influence of Foot Binding in Chinese Women During the 20th .docx
Topic Influence of Foot Binding in Chinese Women During the 20th .docxdepoerossie
 
Topic Impact of Bring Your Device (BYOD) at workplace Analys.docx
Topic Impact of Bring Your Device (BYOD) at workplace Analys.docxTopic Impact of Bring Your Device (BYOD) at workplace Analys.docx
Topic Impact of Bring Your Device (BYOD) at workplace Analys.docxdepoerossie
 
Topic Individuals currently have a rather interesting status with.docx
Topic Individuals currently have a rather interesting status with.docxTopic Individuals currently have a rather interesting status with.docx
Topic Individuals currently have a rather interesting status with.docxdepoerossie
 

More from depoerossie (20)

Transmission of Genetic MaterialComplete the discussions on the fo.docx
Transmission of Genetic MaterialComplete the discussions on the fo.docxTransmission of Genetic MaterialComplete the discussions on the fo.docx
Transmission of Genetic MaterialComplete the discussions on the fo.docx
 
Translating Theories and Research into PracticeIntroductio.docx
Translating Theories and Research into PracticeIntroductio.docxTranslating Theories and Research into PracticeIntroductio.docx
Translating Theories and Research into PracticeIntroductio.docx
 
Treating people fairly (e.g no discrimination, harassment, absence o.docx
Treating people fairly (e.g no discrimination, harassment, absence o.docxTreating people fairly (e.g no discrimination, harassment, absence o.docx
Treating people fairly (e.g no discrimination, harassment, absence o.docx
 
Transparency in the WorkplaceIt is not a surprise that transpar.docx
Transparency in the WorkplaceIt is not a surprise that transpar.docxTransparency in the WorkplaceIt is not a surprise that transpar.docx
Transparency in the WorkplaceIt is not a surprise that transpar.docx
 
Translating Theory Into PracticeWhen water is in a solid state.docx
Translating Theory Into PracticeWhen water is in a solid state.docxTranslating Theory Into PracticeWhen water is in a solid state.docx
Translating Theory Into PracticeWhen water is in a solid state.docx
 
translate the attached code in matlab to ansi C.It is required to .docx
translate the attached code in matlab to ansi C.It is required to .docxtranslate the attached code in matlab to ansi C.It is required to .docx
translate the attached code in matlab to ansi C.It is required to .docx
 
Transportation has played a tremendous role in shaping the economy a.docx
Transportation has played a tremendous role in shaping the economy a.docxTransportation has played a tremendous role in shaping the economy a.docx
Transportation has played a tremendous role in shaping the economy a.docx
 
Transition into AdulthoodThe transition into adulthood may dif.docx
Transition into AdulthoodThe transition into adulthood may dif.docxTransition into AdulthoodThe transition into adulthood may dif.docx
Transition into AdulthoodThe transition into adulthood may dif.docx
 
Transform at least 4 Renaissance masters into a cast of superheroes .docx
Transform at least 4 Renaissance masters into a cast of superheroes .docxTransform at least 4 Renaissance masters into a cast of superheroes .docx
Transform at least 4 Renaissance masters into a cast of superheroes .docx
 
Traditionally, mental illness was considered a biological problem, e.docx
Traditionally, mental illness was considered a biological problem, e.docxTraditionally, mental illness was considered a biological problem, e.docx
Traditionally, mental illness was considered a biological problem, e.docx
 
Tragedy Across the Mediterranean Consider The Tale of Sohrab” fr.docx
Tragedy Across the Mediterranean Consider The Tale of Sohrab” fr.docxTragedy Across the Mediterranean Consider The Tale of Sohrab” fr.docx
Tragedy Across the Mediterranean Consider The Tale of Sohrab” fr.docx
 
Trace the patterns of international migration since 1970, with refer.docx
Trace the patterns of international migration since 1970, with refer.docxTrace the patterns of international migration since 1970, with refer.docx
Trace the patterns of international migration since 1970, with refer.docx
 
Topic:Food Access and Health Outcomes in AmericanIntroduction.docx
Topic:Food Access and Health Outcomes in AmericanIntroduction.docxTopic:Food Access and Health Outcomes in AmericanIntroduction.docx
Topic:Food Access and Health Outcomes in AmericanIntroduction.docx
 
Tourism Development in Kuwait Reality and FutureThe gover.docx
Tourism Development in Kuwait Reality and FutureThe gover.docxTourism Development in Kuwait Reality and FutureThe gover.docx
Tourism Development in Kuwait Reality and FutureThe gover.docx
 
Topic Securing the crime scene and crime scene searchResear.docx
Topic Securing the crime scene and crime scene searchResear.docxTopic Securing the crime scene and crime scene searchResear.docx
Topic Securing the crime scene and crime scene searchResear.docx
 
Topic Worldview AnalysisQuestionPrompt After reviewing the .docx
Topic Worldview AnalysisQuestionPrompt After reviewing the .docxTopic Worldview AnalysisQuestionPrompt After reviewing the .docx
Topic Worldview AnalysisQuestionPrompt After reviewing the .docx
 
Topic Water and Real EstateWrite a 1 page reviewcommentary o.docx
Topic Water and Real EstateWrite a 1 page reviewcommentary o.docxTopic Water and Real EstateWrite a 1 page reviewcommentary o.docx
Topic Water and Real EstateWrite a 1 page reviewcommentary o.docx
 
Topic Influence of Foot Binding in Chinese Women During the 20th .docx
Topic Influence of Foot Binding in Chinese Women During the 20th .docxTopic Influence of Foot Binding in Chinese Women During the 20th .docx
Topic Influence of Foot Binding in Chinese Women During the 20th .docx
 
Topic Impact of Bring Your Device (BYOD) at workplace Analys.docx
Topic Impact of Bring Your Device (BYOD) at workplace Analys.docxTopic Impact of Bring Your Device (BYOD) at workplace Analys.docx
Topic Impact of Bring Your Device (BYOD) at workplace Analys.docx
 
Topic Individuals currently have a rather interesting status with.docx
Topic Individuals currently have a rather interesting status with.docxTopic Individuals currently have a rather interesting status with.docx
Topic Individuals currently have a rather interesting status with.docx
 

Recently uploaded

Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chipsGeoBlogs
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptxJosvitaDsouza2
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfjoachimlavalley1
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxDenish Jangid
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)rosedainty
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPCeline George
 
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...SachinKumar945617
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxssuserbdd3e8
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxricssacare
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...Denish Jangid
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXMIRIAMSALINAS13
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...Jisc
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismDeeptiGupta154
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsCol Mukteshwar Prasad
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfTamralipta Mahavidyalaya
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345beazzy04
 

Recently uploaded (20)

Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 

Final Project - IoT Security ResearchAttached Files P

  • 1. Final Project - IoT Security Research Attached Files: Personal data breaches and securing IoT devices.docx (55.866 KB) What are the Challenges of IoT Security.docx (17.965 KB) IoT References.docx (13.394 KB) Final Research Project - IoT.docx (51.345 KB) Final Assignment - Project Plan (Deliverables): Securing IoT Devices: What are the Challenges? Security practitioners suggest that key IoT security steps include: 1) Make people aware that there is a threat to security; 2) Design a technical solution to reduce security vulnerabilities; 3) Align the legal and regulatory frameworks; and 4) Develop a workforce with the skills to handle IoT security.
  • 2. Final Assignment - Project Plan (Deliverables): 1) Address each of the FOUR IoT security steps listed above in terms of IoT devices by explaining in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices. 2) If you owned a large company like RING, SimpliSafe, MedicalAlert or NEST that experienced a data breach due to faulty security settings on one of your IoT devices (such as a video doorbell or medical alert bracelet or a similar device) what would you tell your business partners and customers? Prepare a letter to send to your customers explaining the situation and what you plan to do about it. Keep in mind you want to do all you can to avoid losing business over this breach.