logo

How to secure internet of everything in the age of internet of Everything

13 Pages3536 Words262 Views
   

Added on  2021-01-02

About This Document

Securities in the age of internet of Everything Title 1 Introduction 1 Overview 1 Significance 1 Background 1 Aim2 Objectives 2 Questions2 Literature Review2 Research Methodology4 Type of investigation 4 Research design 5 Research Approach5 Research philosophy 5 Data collection method 5 issues6 Validity and reliability 6 Data Analysis 6 Conclusion and Recommendation 9 References 11 Title To analyse how to secure internet of everything in the present age. Introduction 1 Overview This research project is based on how emerging technologies and their related ecosystems are catalys

How to secure internet of everything in the age of internet of Everything

   Added on 2021-01-02

ShareRelated Documents
Securities in the age of
internet of Everything
How to secure internet of everything in the age of internet of Everything_1
Table of Contents
Title..................................................................................................................................................1
Introduction......................................................................................................................................1
Overview.....................................................................................................................................1
Significance.................................................................................................................................1
Background.................................................................................................................................1
Aim..............................................................................................................................................2
Objectives....................................................................................................................................2
Questions.....................................................................................................................................2
Literature Review.............................................................................................................................2
Research Methodology....................................................................................................................4
Type of investigation...................................................................................................................4
Research design...........................................................................................................................5
Research Approach.....................................................................................................................5
Research philosophy...................................................................................................................5
Data collection method...............................................................................................................5
Accessibility issues.....................................................................................................................6
Validity and reliability................................................................................................................6
Data Analysis...................................................................................................................................6
Conclusion and Recommendation...................................................................................................9
References......................................................................................................................................11
How to secure internet of everything in the age of internet of Everything_2
Title
To analyse how to secure internet of everything in the present age. A case study on IBM.
Introduction
Overview
This research project is based on how emerging technologies and their related
ecosystems are catalysing the security over internet of everything. Internet of everything that is
defined as is a connection via internet between computing devices which are nowadays
embedded in every objects that are used by the humans. So the main motive of the report is to
secure the the way that the data is transferred between the objects that are using internet. In this
world of IOT the physical things that connects with another physical things through wireless
connections and offering contextual services (Analoui, 2007). This research project aims to
provide the reader ways that will help in securing internet of everything in the modern world.
This research will bring in the mind of the reader that how IOE will assist in optimising the
process through advance data analytics and giving rise to cross cutting applications and services.
Significance
This research proposal will develop a level of understanding regarding IOE and the
security reasons for it. Nowadays it is very important for every user of the internet to use the
security procedures so as to avoid from the malfunctioning or the cyber crimes that are
happening in the modern world. As it is estimated that around 50mn devices will be get
connected to each other till 2020 so there is the increase in demand for security to that connected
things. This study will grow the knowledge of the reader about the security threats and the ways
that will enable to overcome them.
Background
The idea of connecting “things” through internet is a old thought now the evolution has
came and it is now given the idea that “internet of everything” should be applied in the global
world. It is the new paradigm that is changing the way of living of the society and the also our
lives. As the internet are connecting people and the things at a breathtaking pace and bringing
together the information. It is a promising source and helps in expanding the capabilities of the
business also. It also helps in giving richer user experience and also gains the unpredictable
1
How to secure internet of everything in the age of internet of Everything_3
economic opportunities. This IOE will help to create an environment that is connected
intelligently and intuitively. With some benefits it comes with certain weakness also. The main
weakness that arises in this is, security issues, so as to overcome this issue of security various
palms has to created. In the report the company is taken that is IBM which is a cloud service
providing company and is headquartered in Armonk, New York. The company has planned
different security protocols that will help in resolving the security issues related to IOE.
Aim
To analyse how to secure internet of everything in the present age.
Objectives
The main objective of the research is to:
Determine the concept of Internet of Everything
Also to analyse the impact of the securities issues that arises in communication of things.
To determine the threats model that are now available in the connected world
To discuss the social and economic point of view
To define the ways that will help in securing and monitoring IOE.
Questions
In the research the questions that will be tackled are:
What is Internet of Everything
what are the security issues that arises in the communication of “things”.
What are the threat models that are available in the global world.
What are the social and economical points of view of IOE
What are the ways to secure and monitor IOE
Literature Review
The IEEE in its special report defined IOE as a network of items each embedded with
sensors which are connected to the internet. It is defined as the structure that allows all types of
devices and machines to communicate with one another (Boella and Goss-Turner, 2013). It is
one of the fastest growing trends. It is the way of connection that makes the connected devices to
interoperate. This system connects the world to Physical system such as power meters, vehicles,
vending machines, smartwatches etc. The system has been identified by McKinsey global
institute as one of the most under hyped technologies with a economic potential of 2.7 to 6.2 tn
2
How to secure internet of everything in the age of internet of Everything_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security for the Internet of Everything
|10
|2877
|307

Designing and Developing Products for the Internet of Everything (IoE)
|8
|2248
|168

Designing and Developing Products for the Internet of Everything IoE
|9
|2106
|21

ITCS 427 Mobile Computing Assignment
|5
|727
|125

Internet of Things Security and Privacy
|12
|2833
|99

Internet of Things Security
|20
|7042
|50