Engineering Research Methods (9826): Cyber Security Threats Critique

Verified

Added on  2023/06/18

|4
|1182
|373
Report
AI Summary
This assignment provides a detailed review and critique of a research paper focused on experimentally evaluating cyber security threats to smart homes and consumer IoT devices. The review covers key aspects of the paper, including the appropriateness of the title and abstract, the research problem addressed, and the theories and methodologies employed. It analyzes the use of qualitative and quantitative research designs, the justification for using deductive research, and the relevance and contribution of the research to both theory and practice. The review also assesses the validity, reliability, repeatability, and authenticity of the research outcomes, addresses ethical issues related to data security, and identifies deficiencies in the paper, such as a lack of detailed information, suggesting improvements for future research. This document is available on Desklib, a platform offering a wide range of study tools and resources for students.
Document Page
ICT and Engineering Research Methods (9826)
Information Sciences Research Methodology (6797)
Semester 2, 2021
Assignment 1 Guidelines for Answers
Article Title, Authors, (if any) online address for access of paper.
Experimental Evaluation of Cyber security Threats to the Smart-Home
The main reason for choosing this research topic is to identify different cyber security issues and
threat that could lead to have affect over smart home.
Title/Abstract
The title of this research is appropriate as it is significant for describing the motive of conducting
research report. In this research different cyber security threats has been identified which will
lead to have affect over smart home. In current scenario consumers are purchasing internet
connected appliances which is also refer as the internet of things. These devices includes data and
information of the consumer as user is able to manage smart home environment through this.
This lead to increase the chances of cyber crime as well as huge risk to consumer privacy and
security. It is essential to identify and determine several threats which could lead to impact over
user privacy and security through this report. In this research report, first investigator is
developing a number of test suited in order to conduct evaluation in the four categories such as
confidentiality of data exchanges by internet of thing device, integrity and authentication of their
communication, access control and availability and their capability to reflect DDoS attacks. In this,
evaluation to four representative households namely home security, health monitoring, energy
management and entertainment which collectively includes 17 consumer IoT devices that are
available on the market.
Research Problem
This research is developed with the aims to experimentally evaluate vulnerabilities of consumer
IoT devices against cyber attacks. This is effective in order to determine the different issues and
problems that could be faced by individual due to internet of thing. In this experiment research,
investigator first test suites corresponding to four categories of security vulnerabilities namely
confidentiality of data they communicate with other devices locally/externally; integrity of
connections they make to/receive from other entities; access control and availability of IoT
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
devices; and their capacity in reflecting unwanted traffic that can contribute to a DDoS attack.
Theories Used (Theory, or framework, or model, or development methodology, or guidelines)
Description of Theory Used:
Summarise the type of research covered – This research includes experimental design in order to
gain correct and accurate information about the topic. This is significant for successfully and
correctly conducting research activities as well as analyzing required information.
Summarise what theory was used and how - In this deductive research theory is used in order to
determine different elements and aspects about the research topic. This is used with the support
of conducting test in the given circumstances.
How was the research undertaken? The methodology and methods used
Research Design used: In this research both qualitative and quantitative research design has been
considered. Both of these are effective and efficient in order to find relevant information about
the topic as well as performing research practices in accurate manner. Qualitative research can be
describe as the approach of collecting and analyzing information in form of concept, theories and
other data which can not be represent in numerical data. Where as qualitative research design is
effective for gaining information from numerical and statistical data. Both of these research
design has advantages for conducting research activities in effective and efficient manner.
Research Methods used: There are different methods of data collection such as primary and
secondary method of data collection. Both of these methods have their own benefits and
drawbacks. It is essential for researcher to consider correct and appropriate research method
which is helpful for finding and gathering right information. In this research, investigator is
considering primary method of data collection through experiment. This is refer as the method
through which researcher is able to find first hand information. This includes original information
which is according to the requirements of the research.
2
Document Page
Justification of Research Design: Deductive research design is considered as the phenomenon to
successfully test the given circumstances. In this research, investigator is considering research
design in order to formulate the subjection to testing during the research process. This will assist
in gaining right and appropriate data and information about the topic.
Your Assessment of their Choice: In this research practice, investigator is considering both
qualitative and quantitative research in order to find accurate information about the topic.
Primary method of data collection is considered in this report through experiment. Deductive
research design is considered for identifying and analyzing information.
Research Relevance: this research includes scientific relevance as this study will lead to increase
the information and understanding about the topic through the outcome of experiments.
Research Contribution
To Theory? Or Practice? Or Both? How so?
This research is significant in order to reflect over broad range of activities and outcomes which is
undertaken or accomplish by researcher relative to the opportunity as well as appropriate to an
individual research discipline. The research contribution is to theory and practice both as in this
qualitative and quantitative research activities are performed.
Is the research new? Explain
The research is new in order to analyze and evaluate the vulnerabilities or threat of the consumer
internet of the thing devices against the cyber attacks.
Research Quality
Analyse the Validity, Reliability, Repeatabilityand Authenticity of research outcomes
This research is performed by considering validity, reliability, repeatability and authenticity of the
research outcomes. In this research all activities are performed correctly without providing any
harm to other. The research outcome is trustworthy and authenticate as its is gaining through
3
Document Page
experiment or testing the information is significant manner.
Ethical Issues
Summaries any ethical Issues raised and how resolved?
Ethical issues will lead to have major negative impact over research activities and its outcomes.
The ethical issues that is raised during this research is leaking of important information or its
misuse. In order to resolve this, investigator is storing information in the laptop with properly
security.
Have they been Addressed? Explain
The ethical issue has been resolved by storing and keeping important information save with the
research. It is storing in the laptop and only researcher have access to the data.
Deficiencies
Do you see any deficiencies or gaps in the paper from requirements for research and quality etc?
Yes, lack of detailed information is the deficiencies or gap in this paper.
Explain how you would resolve.
This could be resolve by providing more time to carry out research practices.
4
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]