logo

ITC571 - Emerging Technologies and Innovation Report

7 Pages1215 Words161 Views
   

Charles Sturt University

   

Emerging Technologies and Innovation (ITC571)

   

Added on  2020-03-13

About This Document

This report will discuss discipline that involves the amalgamation of a variety of devices and networks to achieve a common set of goals and objectives. There is an involvement of numerous devices in the applications that are based on IoT such as computing devices, small and large electrical appliances, mobile devices and many more. This report will describe solutions that have been developed in order to overcome the security attack.

ITC571 - Emerging Technologies and Innovation Report

   

Charles Sturt University

   

Emerging Technologies and Innovation (ITC571)

   Added on 2020-03-13

ShareRelated Documents
IoT SecurityApplicationProject Blog & Progress Report
ITC571 - Emerging Technologies and Innovation Report_1
IoT Security ApplicationTable of ContentsIoT Security Application – Project Blog......................................................................................................3Progress Report...........................................................................................................................................4References...................................................................................................................................................7
ITC571 - Emerging Technologies and Innovation Report_2
IoT Security ApplicationIoT Security Application – Project BlogInternet of Things (IoT) is a discipline that involves the amalgamation of a variety of devices andnetworks to achieve a common set of goals and objectives. There is an involvement of numerousdevices in the applications that are based on IoT such as computing devices, small and largeelectrical appliances, and mobile devices and may more. The IoT applications are being used inthe business sectors and industries all across the globe. There are certain security issues that areassociated with these applications and solutions.The reason behind the occurrence of the security events and occurrences is because of theinvolvement of varied devices and networks in the applications. This leads to the presence of anumber of access points which allow the attackers to gain an easy entry to the application. Thesecurity risks and threats such as network security attacks, attacks on the database of theapplication and the threats to the devices are associated with these IoT applications. There aremany solutions that have been developed in order to overcome the security attacks. However, theorganizations need to integrate a number of different security solutions to resolve, detect, preventand control these security risks and threats (Abomhara, 2015). Some of the common issues inassociation with the IoT application include the breaching of data and information. Themalicious entities find it easy to breach into the application and its components that have anadverse impact on the privacy and confidentiality of the application information. Many of thedenial of service and flooding attacks are also executed on the application so that the availabilityof the application is hampered and the customer experience that is earned on the application isdeteriorated. Many of the malware have been developed to cause damage to the information anddata that is associated with the application (Bertino, 2016). There are also many threats that areassociated with the devices that are involved in the application. These devices may get lost or theattackers may steal the devices from the device owners to have a negative impact on theapplication security. It is necessary to come up with an integrated solution comprising of different securitymechanisms and protocols to control the security threats and attacks. IoT security application hastherefore been proposed to be developed and deployed to provide an integrated IoT securitysolution. The solution will include the network security controls such as network monitoring
ITC571 - Emerging Technologies and Innovation Report_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Internet of Things & Cyber Security
|19
|5950
|53

IoT Applications and Services - PDF
|8
|2649
|134

Possible Security Change Breaches | Project
|14
|3273
|20

Security Issues in IoT and IT Infrastructure
|18
|4683
|229

IoT Threats to Database Security
|20
|1383
|296

Connectivity and Security Threats in IoT
|8
|3714
|309