logo

Towards a Secure and Efficient Distributed Computing System

   

Added on  2022-10-10

13 Pages2006 Words13 Views
Information 1
Information Security

Information 2
Contents
1.0 Introduction...........................................................................................................................4
1.1 Background................................................................................................................................5
1.2 Aims and Objectives..................................................................................................................6
2.0 Analysis and Findings...........................................................................................................7
2.1 Overview of technology.......................................................................................................7
2.1.1 Relevant technologies and applications..................................................................................7
2.1.2 Uses of technology.................................................................................................................7
2.1.3 Challenges.............................................................................................................................8
2.3 Gaps in Literature....................................................................................................................9
2.4 Future research directions......................................................................................................10
3.0 Conclusion and Recommendations..........................................................................................11
4.0 References................................................................................................................................12

Information 3
Abstract
This assignment relates the project of the information security that includes the security and
privacy issues in the IoT. The report includes a research project that includes brief research on
the process included in the IoT. The project discusses the overview of the technology that
consists of the challenges occurred in maintaining security in the use of the IoT. The several
analysis and findings related to the IoT are included in this report. The various application and
relevant technologies are included in the overall process of the report. The several challenges
included in the security issues will be discussed in this report. The various research directions
will also include in this report.

Information 4
1.0 Introduction
This report is related to the research that includes brief research on the security and privacy
issues on the IoT. The IoT is a system of interrelated computing devices and machines provided
with the unique identifiers. Computer interaction is also included in this proper system. This is a
type of interconnection system and used by several organizations. The system has many issues
related to security and privacy. Therefore, it is important to be secured properly and maintain
data privacy in the organization (Fleisch, et al., 2015). The report will be discussed about the
issues related to privacy in the organizational data. This system is beneficial for the organization
to keep the data secure and private. The overview of this technology is included in this report.
The several applications of this system are also discussed in this report. The various analysis and
findings are included in the report. The recommendations regarding the system are also discussed
in the report.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Internet of Things - Assignment
|43
|10564
|250

Security and Privacy issues in Internet of Things PDF
|3
|2916
|191

Communication Network Security | Assignment
|13
|2909
|158

Security and Privacy Issues in IoT/Smart Architectures
|5
|3113
|303

Security Issues In IoT
|12
|4945
|61

IoT and Cloud Privacy: Security Challenges of IoT-Cloud Based SCADA Systems
|12
|2510
|318