Case Study: Cloud and IoT Security Challenges in MITS5004, 2020S1
VerifiedAdded on 2022/09/01
|11
|475
|26
Case Study
AI Summary
This assignment analyzes the security challenges associated with cloud computing and the Internet of Things (IoT). It explores the essence of cybersecurity, emphasizing multiple layers of security including physical, personal, operational, communication, and network security. The document discusses t...

Cloud and
IoT Security
The security challenges
over cloud computing
IoT Security
The security challenges
over cloud computing
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

What is
Security
in the
cyber
world?
The essence of cyber-security
Security
in the
cyber
world?
The essence of cyber-security

Security in cloud and cyber world
• The state of being secure or to be free from danger in the cyber
world, especially with shared data and information
• Multiple layer of security is available over the cyber world:
• Physical security
• Personal security
• Operations security
• Communication security
• Network and information security
• The state of being secure or to be free from danger in the cyber
world, especially with shared data and information
• Multiple layer of security is available over the cyber world:
• Physical security
• Personal security
• Operations security
• Communication security
• Network and information security
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Information security08/31/2024ADD A FOOTER4
• Protection of information with the elements considered critically,
including the hardware under use for storing, managing and
sharing the information
• Policy for information security is required to be secured in cloud
• Awareness of cyber security and maintenance of cyber hygiene is
necessary
• Proper training to maintain information security in cyber world
• Education and technology enhancement in cyber world is
required
• Protection of information with the elements considered critically,
including the hardware under use for storing, managing and
sharing the information
• Policy for information security is required to be secured in cloud
• Awareness of cyber security and maintenance of cyber hygiene is
necessary
• Proper training to maintain information security in cyber world
• Education and technology enhancement in cyber world is
required
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Security concept08/31/2024ADD A FOOTER5

General usage security and safety08/31/2024ADD A FOOTER6
• It is associated with the malicious attackers who actively exploit
the weaknesses of a system in the cyber world.
• It is important to maintain safety in the cyber world against all
the measures that are intended and which are generally caused
due to the user problems causing search access that are
unauthorized
• It is associated with the malicious attackers who actively exploit
the weaknesses of a system in the cyber world.
• It is important to maintain safety in the cyber world against all
the measures that are intended and which are generally caused
due to the user problems causing search access that are
unauthorized
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Problems with IoT Security08/31/2024ADD A FOOTER7
• Initial design in private communication for the network was
moved to IP Network. This caused inconsistency in in IP Network
design for private communication [3].
• It is impossible to install format updates right after the
installation procedure.
• The basic security has laws in the internet of things. This Rises to
much complex security requirements.
• No security in devices in initial device design are still in vogue
and in use. This creates incompatibility of falling back mode
• Initial design in private communication for the network was
moved to IP Network. This caused inconsistency in in IP Network
design for private communication [3].
• It is impossible to install format updates right after the
installation procedure.
• The basic security has laws in the internet of things. This Rises to
much complex security requirements.
• No security in devices in initial device design are still in vogue
and in use. This creates incompatibility of falling back mode
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Cases about Rise of threats in IoT08/31/2024ADD A FOOTER8

Types of IoT security attacks08/31/2024ADD A FOOTER9
• Physical cyber-attacks
• Network cyber-attacks
• Software attacks
• Encryption attacks
• Physical cyber-attacks
• Network cyber-attacks
• Software attacks
• Encryption attacks
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

References
[1] B., Mukherjee, R.L., Neupane, and P., Calyam, End-to-end IoT security
middleware for cloud-fog communication. In 2017 IEEE 4th International
Conference on Cyber Security and Cloud Computing (CSCloud), 2017,
June, (pp. 151-156). IEEE.
[2] W., Razouk, D., Sgandurra, and K., Sakurai, A new security middleware
architecture based on fog computing and cloud to support IoT constrained
devices. In Proceedings of the 1st International Conference on Internet of
Things and Machine Learning, 2017, October, (pp. 1-8).
[3] M.A., Khan, and K., Salah, IoT security: Review, blockchain solutions,
and open challenges. Future Generation Computer Systems, 82, 2018,
pp.395-411.
[1] B., Mukherjee, R.L., Neupane, and P., Calyam, End-to-end IoT security
middleware for cloud-fog communication. In 2017 IEEE 4th International
Conference on Cyber Security and Cloud Computing (CSCloud), 2017,
June, (pp. 151-156). IEEE.
[2] W., Razouk, D., Sgandurra, and K., Sakurai, A new security middleware
architecture based on fog computing and cloud to support IoT constrained
devices. In Proceedings of the 1st International Conference on Internet of
Things and Machine Learning, 2017, October, (pp. 1-8).
[3] M.A., Khan, and K., Salah, IoT security: Review, blockchain solutions,
and open challenges. Future Generation Computer Systems, 82, 2018,
pp.395-411.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

THANK YOU
1 out of 11
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.