logo

SECURED COMMUNICATION IN GPS TRACKING DEVICE

   

Added on  2022-08-27

11 Pages2693 Words15 Views
 | 
 | 
 | 
Running head: SECURED COMMUNICATION IN GPS TRACKING DEVICE
SECURED COMMUNICATION IN GPS TRACKING DEVICE
Name of the student:
Name of the university:
Author Note:
SECURED COMMUNICATION IN GPS TRACKING DEVICE_1

SECURED COMMUNICATION IN GPS TRACKING DEVICE1
Table of Contents
Rationale....................................................................................................................................2
Problem Domain....................................................................................................................2
Purpose and Justification........................................................................................................2
Supervisor Approval..................................................................................................................2
Research Questions....................................................................................................................3
Conceptual or Theoretical Framework.......................................................................................3
Methodology..............................................................................................................................4
Analysis of Sources of Information.......................................................................................4
Research Methods..................................................................................................................4
Data Collection or Systems Design Methods.........................................................................5
Ethical Issues..........................................................................................................................5
Compliance Requirements.....................................................................................................6
Project Plan................................................................................................................................6
Deliverables............................................................................................................................6
References..................................................................................................................................9
SECURED COMMUNICATION IN GPS TRACKING DEVICE_2

SECURED COMMUNICATION IN GPS TRACKING DEVICE2
Rationale
Problem Domain
Security of systems is a major issue that the organizations are facing nowadays. The
progressions in technology have allowed the business corporates to implement Global
Positioning system (GPS) in their system and its devices to track the activities of human,
vehicles and other components. However, due to this connectivity of the system with the help
of Internet, the malicious hackers are getting ample chances to hack the network and extract
confidential data out of these systems (Oyler & Saiedian, 2016). The hackers can misuse this
data for their beneficial purpose and create a negative influence on the goodwill of the
organizations. Thus, this paper aims to propose the security systems that can be implemented
in the GPS trackers such that the business details are kept private and confidential to the
organization itself.
Purpose and Justification
The purpose of this report is to provide different measures that can tighten the security
system in the GPS trackers of various organizations worldwide. The GPS trackers
incorporates numerous benefits in commercial business. For instance, it can track the location
of the food delivery boy to check whether he is delivering the food to the client on time or
not. The banking systems can track the portals of their clients through these GPS trackers.
However, hackers are using GPS jammers to hack the systems and malign the reputation of
the organizations in the market (Chhabra et al., 2017). Hence, this proposal is essential for the
organizations to consider the security measures in their telemetric devices.
SECURED COMMUNICATION IN GPS TRACKING DEVICE_3

SECURED COMMUNICATION IN GPS TRACKING DEVICE3
Supervisor Approval
The different kinds of security measures that can be applied within the system of
telemetry is discussed in this paper. These measures will help the business organizations to
take effective measures against security system hacks of GPS. However, this proposal awaits
the approval for the supervisors of the organizations to continue with further research work.
Research Questions
The proposal aims to research on the following questions:
How well can the security measures detect the GPS signal jammer that the hackers
use to implement and hack the system?
How effective will the security systems be in preventing the manipulation of the
firmware of the GPS trackers?
Can the security systems prevent the exploitation of servers and stop phishing of the
network in GPS communication?
Will the security measures prove to be a barrier for the production and progression in
the business?
How well can the security systems ensure protection of real-time data and prevent it
from hacking by the GPS jammers?
Conceptual or Theoretical Framework
Security
Measures
in GPS
Trackers
(Independe
nt Variable)
Protection
of Real-
time Data
(Dependent
Variable)
SECURED COMMUNICATION IN GPS TRACKING DEVICE_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Biometrics Security Project Plan
|11
|2031
|450

Emerging Technology and Innovation Topic | Assignment
|10
|1570
|12

Ethical Hacking Assignment
|19
|5428
|271

Assignment | Project Proposal and Plan
|7
|1830
|16

BUS530 - Use of IoT in RFID Systems
|16
|2848
|196

Analyzing Comodo Certificate Fraud Hack and IT Security Risks
|13
|632
|331