logo

Study on IoT Security and Privacy Preservation

18 Pages3563 Words84 Views
   

Added on  2020-04-21

Study on IoT Security and Privacy Preservation

   Added on 2020-04-21

ShareRelated Documents
Running head: RESEARCH PROPOSALResearch Proposal Title: Study on IoT Security and Privacy Preservation: A case study onCentral Bank of JordanName of the Student:Name of the University:
Study on IoT Security and Privacy Preservation_1
1RESEARCH PROPOSALTable of Contents1.0 Title............................................................................................................................................22.0 Brief introduction.......................................................................................................................23.0 Background and statement of the problem................................................................................24.0 Research questions, aim and objectives.....................................................................................35.0 Study design...............................................................................................................................46.0 Study population and sampling.................................................................................................57.0 Data collection methods and instruments..................................................................................58.0 Data analysis methods...............................................................................................................69.0 Mechanisms to assure the quality of the study..........................................................................710.0 Timetable for completion of the project..................................................................................711.0 Participants in the study...........................................................................................................912.0 Ethical considerations..............................................................................................................913.0 Resources required for the study including of budget...........................................................10References......................................................................................................................................13Appendix........................................................................................................................................151. Online Questionnaire.............................................................................................................15
Study on IoT Security and Privacy Preservation_2
2RESEARCH PROPOSAL
Study on IoT Security and Privacy Preservation_3
3RESEARCH PROPOSAL1.0 Title“Study on IoT Security and Privacy Preservation: A case study on Central Bank ofJordan”2.0 Brief introduction The internet of things (IoT) is a network of network, which is connected throughoutinformation as well as communication infrastructure to provide of value added services. Thisresearch study is based on analyzing the IoT security and privacy issues for the banking sector.The selected organization for this case is Central Bank of Jordan. Into the banking organization,large amount of data are communicated and exchanged from one place to another. Most of thecommunication includes of exchange of confidential data. Aljawarneh et al. (2014) stated thatprivacy preservation is also important as no party are trusted over the public network withoutinvestigation and verification. IoT security issues are revolved around electronic currency alongwith digital cash; therefore, its security is a key significant concern into Central Bank of Jordan.Into this bank, the customer’s data are not only used for cyber frauds but also used to be sold intoblack market. 3.0 Background and statement of the problem Kipf et al. (2016) determined that some of the banks are failed to secure their system asthey experience that security of the data is related to Information Technology. Residual risks arecaused due to inadequate control of the logical as well as physical access to the system forcontaining of customer data. There is also inadequate logging along with monitoring of the
Study on IoT Security and Privacy Preservation_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Literature Survey: Network Security and Data Privacy Protection
|14
|3790
|402

(PDF) Research Methods in Computing
|26
|6517
|161

IOT Enabled Infrastructure in Smart Cities Report 2022
|17
|4333
|4

Towards a Secure and Efficient Distributed Computing System
|13
|2006
|13

Research Proposal on Data Security in Regards to Smart Home Applications
|17
|3763
|18

Security Issues Research Paper 2022
|5
|3360
|15