logo

Possible Security Change Breaches | Project

Evaluate a project proposal and plan based on critical thinking questions and determine the effectiveness of blockchain in securing IoT.

14 Pages3273 Words20 Views
   

Added on  2022-08-31

Possible Security Change Breaches | Project

Evaluate a project proposal and plan based on critical thinking questions and determine the effectiveness of blockchain in securing IoT.

   Added on 2022-08-31

ShareRelated Documents
Running head: POSSIBLE SECURITY CHANGE BREACHES
Possible security change breaches
Possible Security Change Breaches | Project_1
POSSIBLE SECURITY CHANGE BREACHES
1
Table of Contents
Introduction................................................................................................................................3
Rationale....................................................................................................................................3
Problem domain.....................................................................................................................3
Purpose and Justification........................................................................................................4
Supervisor approval: Yes...........................................................................................................4
Research Questions....................................................................................................................4
Conceptual Framework..............................................................................................................5
Motivation of the research.....................................................................................................5
Significance of the research...................................................................................................5
Findings of the researchers.....................................................................................................6
Materials and Methodology.......................................................................................................6
Research methods...................................................................................................................6
Data collection methods.........................................................................................................7
Ethical issues of the research.................................................................................................7
Compliance Requirements.....................................................................................................7
Solution of the problem..........................................................................................................7
Procedures of the research.....................................................................................................9
Project Plan..............................................................................................................................10
Work Breakdown Structure..................................................................................................10
Risk analysis.........................................................................................................................10
Duration................................................................................................................................11
Gantt chart............................................................................................................................12
References................................................................................................................................13
Possible Security Change Breaches | Project_2
POSSIBLE SECURITY CHANGE BREACHES
2
Introduction
The extensive progress in the field of social engineering has led to the increase of
several security threats (Zheng, Xie, Dai, Chen, & Wang, 2018). These security threats
include ransomware and DDoS attacks, in each of these security attacks, essential data are
compromised from a system by the social engineers. In order to get back the essential data,
the victims has to pay ransom amounts in the form of bit coins (Wu, Du, Wang, & Lin,
2018). Identification of the network security vulnerabilities and the use of Intrusion Detection
System was very much useful to minimize the threats coming to these security attacks.
Currently, the social engineers are using new platforms and entirely new concepts to
compromise a network or an Internet of Things (IoT) based device (Viriyasitavat, Da Xu, Bi,
& Sapsomboon, 2019). Block chain Technology (BCT) is one of the most significant
disruptive technologies which can increase data transparency and can be very much useful to
enhance data security.
IoT based systems and devices are deployed both in our society as well as in
corporate establishments to enhance the automation and control, monitoring the essential
information, save huge amount of time and money required for the business operations (Tian,
2017). Complexities faced in our society and in offices are solved using IoT devices, thus
these devices must be free from any sort of security threats. These problems needs to get
resolved hence it is the prime motivation of this proposal. This project proposal shall be very
beneficial as it will help to identifying whether BCT is capable enough to improve the data
security of the IoT based devices.
Possible Security Change Breaches | Project_3
POSSIBLE SECURITY CHANGE BREACHES
3
Rationale
Problem domain
Improvement of connectivity in the modern world had both good and bad effect in our
society (Zhang & Wen, 2017). On the one hand, use of IoT based tools such as computers,
smart phones, smart home appliances, and automation tools is very much useful to make the
complex calculations in a fast and accurate modus, and one the other hand, there are
numerous security issues associated with each of these devices (Ouaddah, Abou Elkalam, &
Ait Ouahman, 2016). These security attacks can occur due to absence of security updates in
the IoT based devices, clicking on phishing emails, use of IoT as botnet platform, unsafe
communication using the IoT based devices, use of the default security passwords,
personalized information leaks, data theft, and lack of knowledge (Li et al., 2017). These are
the probable problems related with the deployment of IoT devices. Each of these problems
can have huge adverse impact in our society as well as the economy of a country. Thus, this
proposal shall be very much significant to understand how these problems can get addressed
so that the efficiency and the productivity of the IoT devices are maintained.
Purpose and Justification
BCT is very much capable of maintaining fundamental safety principles which have
to be maintained in the first place in every IoT based devices. Most of the resources and the
transactions which are conducted using the IoT devices can be secured using BCT. The hash
functions can be secured using BCT, at the same time, the decentralizing capability of BCT is
also very much beneficial to address the data security threats (Kshetri, 2017). Fault tolerance
of the IoT devices can also be maintained using BCT. At the same time, the liveliness of
those devices can also be maintained using BCT. This the purpose of this proposal is very
Possible Security Change Breaches | Project_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Privacy Issues of IoT
|12
|3390
|89

Security Challenges in IoT Platforms | Article
|4
|805
|19

Security in the Internet of Things Assignment PDF
|12
|489
|132

Cyber Issues in Smart Home Appliances of IoT
|26
|7130
|13

Vulnerabilities with Internet of Things 0 Name STUDENT ID IT SECURITY Introduction IoT
|7
|1808
|461

Emerging Threats and Counter Measurements
|4
|866
|38