logo

Security of Emerging Connected Systems Assignment PDF

   

Added on  2021-04-21

17 Pages3637 Words141 Views
Security of Emerging Connected SystemsStudent Name:Course:

Table of ContentsIntroduction...............................................................................................................................................3Security Evaluation...................................................................................................................................4Tests Findings............................................................................................................................................6Key legislation relating to information security......................................................................................8Defense-in-depth solutions........................................................................................................................8IoT and BYOD Security Design and implementation.............................................................................9Technological advances in network security.........................................................................................12Conclusion................................................................................................................................................13References................................................................................................................................................14

IntroductionInformation Security Policy (ISP) governs how various assets of information which include data,human and infrastructure are protected. Information Security Policy defines a set of rules by agiven organization to all its users of network or internet handling information assets and theusers of this infrastructure ought to abide with the rules in order to ensure the security of thedigitally stored data within the allowed organization boundaries. With the current widespread ofInternet of Things, information security has become quite difficult due to increased internetvulnerability caused by different IoT devices that are not well secured from attackers. Therefore,IoT device manufacturers need to integrate security mechanisms into these devices and alsoconsider defense-in-depth mechanism which provides complimentary security mechanisms inorder to ensure a comprehensive and adaptation of IoT devices that are more secure withincorporation of device-specific countermeasures to information attacks.The purpose of this report therefore is to carry a thorough security evaluation on test-bed systemfor IoT Smart Homes, determine the security attacks associated with the Smart homes IoTdevices given and provide ways and recommendations in which these attacks could be avoidedby the manufactures of the IoT devices. The report also evaluates various key legislationassociated with information security and how such legislations affects organization’s informationsecurity policy. It also proposes the defense-in-depth solutions to mitigate internet securityvulnerabilities faced by organizations and provides a security design for IoT and BYOB in aprivate network (Gruessner, 2015). Finally, the report highlights on some of the advancedtechnologies currently in use for enhancing network security that could be implemented by theIoT devices manufacturers.

Security EvaluationFor quality information security for the IoT, identifying various risks associated with theinformation infrastructure, assets and data is quite critical as this will enable the IoT (Labrien andLabrien, 2016) device manufacturers be able to categorized relevant information with theirdevices as discussed below.Security PolicyA risk management plan for each device should be put in place. This plan will involveidentifying a security policy that ought to be put into place in order to ensure that the perceivedrisks associated with the smart home devices are well managed and controlled (InfoSecResources, 2018). Therefore it is the responsibility of the IoT manufacturers to ensure that asecurity policy that is based on the risk management strategy is in place. The security policy inplace should be aimed at “Protecting information and information systems from unauthorizedaccess, use, disclosure, disruption, modification, or destruction, in order to provide integrity,confidentiality, and availability.”. Access control and information privacy policies will help inmanagement of risks related to Smart home IoT devices such as the thermostat and music player(Cisco, 2018). Therefore the manufacture should consider having an information security policythat governs how the devices are developed, tested and analyzed for any vulnerabilities. Security Model Having defined the security policy for each IoT device and the information system at large themanufacturer need to develop a security model. This security model outlines how varioussecurity policies will be implemented and enforced into information devices. The security model

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
(PDF) An Overview of Contemporary Cyberspace Activities
|16
|620
|41

Internet of Things (IoT) Security: Current Status, Challenges and Prospective Measures
|12
|760
|401

Security and Privacy Risks in IoT Technology
|8
|2122
|323

Network Security: Issues, Attacks, and Countermeasures
|12
|2295
|329

Assignment on Cyber Crime
|15
|4799
|77

Internet of Things (IOT) - Assignments
|8
|1847
|445