Case Study: Cloud and IoT Security Challenges in MITS5004, 2020S1

Verified

Added on  2022/09/01

|11
|475
|26
Case Study
AI Summary
Document Page
Cloud and
IoT Security
The security challenges
over cloud computing
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
What is
Security
in the
cyber
world?
The essence of cyber-security
Document Page
Security in cloud and cyber world
The state of being secure or to be free from danger in the cyber
world, especially with shared data and information
Multiple layer of security is available over the cyber world:
Physical security
Personal security
Operations security
Communication security
Network and information security
Document Page
Information security08/31/2024ADD A FOOTER4
Protection of information with the elements considered critically,
including the hardware under use for storing, managing and
sharing the information
Policy for information security is required to be secured in cloud
Awareness of cyber security and maintenance of cyber hygiene is
necessary
Proper training to maintain information security in cyber world
Education and technology enhancement in cyber world is
required
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Security concept08/31/2024ADD A FOOTER5
Document Page
General usage security and safety08/31/2024ADD A FOOTER6
It is associated with the malicious attackers who actively exploit
the weaknesses of a system in the cyber world.
It is important to maintain safety in the cyber world against all
the measures that are intended and which are generally caused
due to the user problems causing search access that are
unauthorized
Document Page
Problems with IoT Security08/31/2024ADD A FOOTER7
Initial design in private communication for the network was
moved to IP Network. This caused inconsistency in in IP Network
design for private communication [3].
It is impossible to install format updates right after the
installation procedure.
The basic security has laws in the internet of things. This Rises to
much complex security requirements.
No security in devices in initial device design are still in vogue
and in use. This creates incompatibility of falling back mode
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cases about Rise of threats in IoT08/31/2024ADD A FOOTER8
Document Page
Types of IoT security attacks08/31/2024ADD A FOOTER9
Physical cyber-attacks
Network cyber-attacks
Software attacks
Encryption attacks
Document Page
References
[1] B., Mukherjee, R.L., Neupane, and P., Calyam, End-to-end IoT security
middleware for cloud-fog communication. In 2017 IEEE 4th International
Conference on Cyber Security and Cloud Computing (CSCloud), 2017,
June, (pp. 151-156). IEEE.
[2] W., Razouk, D., Sgandurra, and K., Sakurai, A new security middleware
architecture based on fog computing and cloud to support IoT constrained
devices. In Proceedings of the 1st International Conference on Internet of
Things and Machine Learning, 2017, October, (pp. 1-8).
[3] M.A., Khan, and K., Salah, IoT security: Review, blockchain solutions,
and open challenges. Future Generation Computer Systems, 82, 2018,
pp.395-411.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
THANK YOU
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]