Internet of Things Security and Privacy: Research Report
VerifiedAdded on 2023/03/17
|12
|2833
|99
Report
AI Summary
This report provides an overview of the security and privacy challenges associated with the Internet of Things (IoT). It begins with an executive summary and table of contents, followed by an introduction that highlights how IoT improves daily lifestyles by connecting physical elements into smart objects. The report discusses the importance of securing data and the defensive mechanisms against cyber threats, emphasizing the need for robust security and privacy measures as the number of IoT users increases. It explores the background of IoT, including the challenges related to social, economic, and legal standards. The research aims to identify security issues, propose methods for prevention, and address privacy concerns. The report includes open questions to guide the research and a detailed research plan outlining activities over a 36-month period. It concludes by summarizing key security and privacy issues, emphasizing the need for companies to implement methods to protect consumer data. References to relevant literature are also included.

Running head: - Internet of Things
Internet of Things Security and Privacy
Name of the Student
Name of the University
Author Note
Internet of Things Security and Privacy
Name of the Student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1Internet of Things
Executive Summary
The internet of things is one of the emerging technology. It changes the virtual thinking into
real life thinking. It also improves the standard of living. With the increasing number of
users, security and privacy problems increases. The security and privacy problems need to be
improved and require different methods for its improvement. The security issues and privacy
concern is the mandatory concern. The internet of things helps in connecting different
elements and change the standard of living.
Executive Summary
The internet of things is one of the emerging technology. It changes the virtual thinking into
real life thinking. It also improves the standard of living. With the increasing number of
users, security and privacy problems increases. The security and privacy problems need to be
improved and require different methods for its improvement. The security issues and privacy
concern is the mandatory concern. The internet of things helps in connecting different
elements and change the standard of living.

2Internet of Things
Table of Contents
Introduction................................................................................................................................3
Background................................................................................................................................3
Aim and Objective of the research.............................................................................................6
Open Questions..........................................................................................................................7
Research Plan.............................................................................................................................7
Conclusion..................................................................................................................................8
References..................................................................................................................................9
Table of Contents
Introduction................................................................................................................................3
Background................................................................................................................................3
Aim and Objective of the research.............................................................................................6
Open Questions..........................................................................................................................7
Research Plan.............................................................................................................................7
Conclusion..................................................................................................................................8
References..................................................................................................................................9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3Internet of Things
Introduction
Internet of things helps in improving the daily lifestyles of human beings. The internet
of things converts all the physical elements surrounding the environment into smart objects.
The IoT provides a worldwide network that helps in connecting objects that improves the
living standard (Kumar and Patel 2014). The IoT is accessible only with the assistance of
internet connectivity. With the support of IoT all, the devices are connected, and various data
are collected and stored. It is essential to preserve the security and privacy of the device and
the information stored within it. The IoT comes with unique features when it is related to the
defensive mechanism that is against cyber security threats (Thierer 2015). The IoT consists of
certain technologies that help in maintaining and securing the stored data. The report
discusses the security and privacy issues related to the use of the internet of IoT. IoT is one of
the advancing technology that is improving the living standard. This research proposal will
help in recognizing the different security issues related to the internet of things and how it can
be prevented so that the security is maintained. The research will propose ways in which the
privacy issues related with the devices connected with the internet will be solved. The
privacy of the devices is in demand. The customers are demanding for a amore secure
systems.
Background
According to Perera et al. (2015), the internet of things comprises of certain obstacles
in its ways that need to be overcome. As the amount of users is increasing, the chances of
attacks are also increasing. It is important to maintain the privacy of the data. The first
requirement before facing the challenges is the correct understanding of the features
associated with the internet of things. The different survey is performed that deals with the
capabilities related to the identification of the physical objects related to the systems. Serious
Introduction
Internet of things helps in improving the daily lifestyles of human beings. The internet
of things converts all the physical elements surrounding the environment into smart objects.
The IoT provides a worldwide network that helps in connecting objects that improves the
living standard (Kumar and Patel 2014). The IoT is accessible only with the assistance of
internet connectivity. With the support of IoT all, the devices are connected, and various data
are collected and stored. It is essential to preserve the security and privacy of the device and
the information stored within it. The IoT comes with unique features when it is related to the
defensive mechanism that is against cyber security threats (Thierer 2015). The IoT consists of
certain technologies that help in maintaining and securing the stored data. The report
discusses the security and privacy issues related to the use of the internet of IoT. IoT is one of
the advancing technology that is improving the living standard. This research proposal will
help in recognizing the different security issues related to the internet of things and how it can
be prevented so that the security is maintained. The research will propose ways in which the
privacy issues related with the devices connected with the internet will be solved. The
privacy of the devices is in demand. The customers are demanding for a amore secure
systems.
Background
According to Perera et al. (2015), the internet of things comprises of certain obstacles
in its ways that need to be overcome. As the amount of users is increasing, the chances of
attacks are also increasing. It is important to maintain the privacy of the data. The first
requirement before facing the challenges is the correct understanding of the features
associated with the internet of things. The different survey is performed that deals with the
capabilities related to the identification of the physical objects related to the systems. Serious
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4Internet of Things
issues are related to the IoT as it helps in accessing the personal information of the users.
However, different researchers have made their efforts in finding security issues and
how they can be prevented. Moreover, the methods are not effective, so this research will
help in recognizing the security problems and effective ways for its prevention.
The survey highlights the benefits related to the internet of things. The internet of
things comprises of challenges that are related to the social, economic and legal standards.
The technology used by the IoT gives rise to a variety of concern related to privacy and
safety (Roman, Zhou and Lopez 2013). IoT is the combination of different types of sensors
and devices that helps in the collection of the data. One of the major challenges of the IoT is
related to the protection of the data and privacy of different things (Poudel 2016). The
challenge is unique in nature, which is given by the IoT. The main aim of the IoT is to
provide individual privacy (Yi, Qin and Li 2015). Certain legal approach is made to protect
the privacy of sensitive data.
Shortly internet, user will be increased. The service provided by the IoT needs to be
maintained, keeping in mind all the parameters. New challenges are coming up, which are
related to the security and privacy that need to be maintained. The IoT has the potential to
change the living standard of human beings. It helps in raising the standard of the living and
makes the working easy. IoT can be implemented in various fields after the evolution of the
IoT (Weber 2015). The main aim and objective of the IoT are to capture a large amount of
data and to serve a better system for the users. However, it also highlights the different
challenges related to security and privacy. There are certain internal characteristics of the
IoT. With the service of fog computing, different range of benefits are provided, which
includes the enhanced security and helps in reducing the latency. The security and privacy
issues are discussed concerning the surrounding environment.
issues are related to the IoT as it helps in accessing the personal information of the users.
However, different researchers have made their efforts in finding security issues and
how they can be prevented. Moreover, the methods are not effective, so this research will
help in recognizing the security problems and effective ways for its prevention.
The survey highlights the benefits related to the internet of things. The internet of
things comprises of challenges that are related to the social, economic and legal standards.
The technology used by the IoT gives rise to a variety of concern related to privacy and
safety (Roman, Zhou and Lopez 2013). IoT is the combination of different types of sensors
and devices that helps in the collection of the data. One of the major challenges of the IoT is
related to the protection of the data and privacy of different things (Poudel 2016). The
challenge is unique in nature, which is given by the IoT. The main aim of the IoT is to
provide individual privacy (Yi, Qin and Li 2015). Certain legal approach is made to protect
the privacy of sensitive data.
Shortly internet, user will be increased. The service provided by the IoT needs to be
maintained, keeping in mind all the parameters. New challenges are coming up, which are
related to the security and privacy that need to be maintained. The IoT has the potential to
change the living standard of human beings. It helps in raising the standard of the living and
makes the working easy. IoT can be implemented in various fields after the evolution of the
IoT (Weber 2015). The main aim and objective of the IoT are to capture a large amount of
data and to serve a better system for the users. However, it also highlights the different
challenges related to security and privacy. There are certain internal characteristics of the
IoT. With the service of fog computing, different range of benefits are provided, which
includes the enhanced security and helps in reducing the latency. The security and privacy
issues are discussed concerning the surrounding environment.

5Internet of Things
The security and the privacy issues are still faced by the applications built on the
internet of things. To avoid such issues, the progress and update related to the IoT need to be
studied (Peppet 2014). The development of the IoT is completely based upon the architecture
of the IoT. The IoT is based on reality. It helps in converting the virtual world into the real
world. It comprises sensors that can be used for the remote access process, so it requires more
security (Jing et al., 2014). The internet of technology comprises of certain heterogeneous
technologies, which helps in the initiation of the service related to the IoT. The IoT requires
certain fundamental requirements that help in the collection of data. The internet of things
played a major role and built the basis required for the internet of things. The internet of
things comprises of three different layers that help in the analysis of the security-related
problems (Kolias et al., 2016). However, it is important to recognize all the issues faced by
the internet of things and effective ways are built and implemented. The internet of things
helps in maintaining security. It also helps the users in maintaining the vulnerability
associated with security and privacy problems. The fast rate of the production is the cause of
the risks (Ziegeldorf, Morcho and Wehrle 2014). The technology related to the IoT is the
essential factor that helps in the connectivity of different devices. The IoT comprises of
technologies that help in the examination and analyses various methods related to the IoT.
There are certain models that help in the embedded devices. The main challenge is based
upon the design and helps in conducting of different research related to the internet of things.
The IoT comprises of different devices that helps in maintaining the smart devices.
According to Li, Tryfonas and Li (2016), there are different model proposed that will
help in the protection of the data and keeps the data secure. The model is related to the
threats, security and forensics . The IoT deals with the interconnection and deals with the
cooperation related with the smart devices. The smart devices comprises of the facilities that
helps in the data collection and helps in the tracking of the different products. The IoT
The security and the privacy issues are still faced by the applications built on the
internet of things. To avoid such issues, the progress and update related to the IoT need to be
studied (Peppet 2014). The development of the IoT is completely based upon the architecture
of the IoT. The IoT is based on reality. It helps in converting the virtual world into the real
world. It comprises sensors that can be used for the remote access process, so it requires more
security (Jing et al., 2014). The internet of technology comprises of certain heterogeneous
technologies, which helps in the initiation of the service related to the IoT. The IoT requires
certain fundamental requirements that help in the collection of data. The internet of things
played a major role and built the basis required for the internet of things. The internet of
things comprises of three different layers that help in the analysis of the security-related
problems (Kolias et al., 2016). However, it is important to recognize all the issues faced by
the internet of things and effective ways are built and implemented. The internet of things
helps in maintaining security. It also helps the users in maintaining the vulnerability
associated with security and privacy problems. The fast rate of the production is the cause of
the risks (Ziegeldorf, Morcho and Wehrle 2014). The technology related to the IoT is the
essential factor that helps in the connectivity of different devices. The IoT comprises of
technologies that help in the examination and analyses various methods related to the IoT.
There are certain models that help in the embedded devices. The main challenge is based
upon the design and helps in conducting of different research related to the internet of things.
The IoT comprises of different devices that helps in maintaining the smart devices.
According to Li, Tryfonas and Li (2016), there are different model proposed that will
help in the protection of the data and keeps the data secure. The model is related to the
threats, security and forensics . The IoT deals with the interconnection and deals with the
cooperation related with the smart devices. The smart devices comprises of the facilities that
helps in the data collection and helps in the tracking of the different products. The IoT
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6Internet of Things
comprises of different connected with the internet. It comprises of different levels and
structure for the safeguard of the network (Porambage et al., 2016).
In the process related to the IoT, the data collected and stored need to be maintained,
and the sensitive information needs to be evaluated. The increase users and the secrecy
increases the demand for improving privacy maintaining issues. The increased accessibility
helps in improving the overall internet connectivity (Rahman, Daud and Mohamad 2016). It
will generate a different amount of data and provide humans with different remote access. It
comprises of different challenges related to the storage of data (Weinberg et al., 2015).
According to Conti et al. (2018), privacy is one of the main requirement of the IoT.
One of the biggest challenges is regarding the utilisation of IoT products in one of the best
ways. The IoT works as an umbrella under which a number of works related to the internet
and web is done. There are need to improve different sets of related parameters of internet
connectivity. The process is related to the collection, storage and evaluation of data. The
main challenge is considered with the need to achieve the huge amount of data that is shared
with the help of the internet of things and smart devices.
The research focuses on the security problems related to the IoT and helps in the
analysis of the different aspects related to the internet of things. The focus of the survey is
related to the different loopholes related to security. However, it is important to know all the
advantages and disadvantages related to IoT. The rapid change of technology helps in
improving the service related to the internet of things. The structure is made more reliable
and smart internet system
Aim and Objective of the research
The research aims to find the different types of security issues faced by the internet of
things, which is one of the emerging technology inrecent time.
comprises of different connected with the internet. It comprises of different levels and
structure for the safeguard of the network (Porambage et al., 2016).
In the process related to the IoT, the data collected and stored need to be maintained,
and the sensitive information needs to be evaluated. The increase users and the secrecy
increases the demand for improving privacy maintaining issues. The increased accessibility
helps in improving the overall internet connectivity (Rahman, Daud and Mohamad 2016). It
will generate a different amount of data and provide humans with different remote access. It
comprises of different challenges related to the storage of data (Weinberg et al., 2015).
According to Conti et al. (2018), privacy is one of the main requirement of the IoT.
One of the biggest challenges is regarding the utilisation of IoT products in one of the best
ways. The IoT works as an umbrella under which a number of works related to the internet
and web is done. There are need to improve different sets of related parameters of internet
connectivity. The process is related to the collection, storage and evaluation of data. The
main challenge is considered with the need to achieve the huge amount of data that is shared
with the help of the internet of things and smart devices.
The research focuses on the security problems related to the IoT and helps in the
analysis of the different aspects related to the internet of things. The focus of the survey is
related to the different loopholes related to security. However, it is important to know all the
advantages and disadvantages related to IoT. The rapid change of technology helps in
improving the service related to the internet of things. The structure is made more reliable
and smart internet system
Aim and Objective of the research
The research aims to find the different types of security issues faced by the internet of
things, which is one of the emerging technology inrecent time.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7Internet of Things
The objective of the research is as follows:-
To find the different types of security issues associated with the internet of things.
To find different methods to prevent security issues.
The cause related to the different security issues.
Open Questions
Q1. Why is the identification of all the security issues related to the IoT important?
Q2. What will be the future impact of the security issues in the IoT technology?
Q3. Should we move to a more universally demonstrative system?
Q4. What are the challenges the public face with the use of internet of things?
Q5. What will happen in the future if the smart systems are compromised?
Research Plan
Activities 1-6
(months)
6-12
(months)
12-18
(months)
18-24
(months)
24-30
(months)
30-36
(months)
Research and planning
Project title selection and
submission of research
proposal
Approval, plan, future
scope, budget
Data Sets &Analysis
Determination of findings
&answers
Reviews and feedbacks
The objective of the research is as follows:-
To find the different types of security issues associated with the internet of things.
To find different methods to prevent security issues.
The cause related to the different security issues.
Open Questions
Q1. Why is the identification of all the security issues related to the IoT important?
Q2. What will be the future impact of the security issues in the IoT technology?
Q3. Should we move to a more universally demonstrative system?
Q4. What are the challenges the public face with the use of internet of things?
Q5. What will happen in the future if the smart systems are compromised?
Research Plan
Activities 1-6
(months)
6-12
(months)
12-18
(months)
18-24
(months)
24-30
(months)
30-36
(months)
Research and planning
Project title selection and
submission of research
proposal
Approval, plan, future
scope, budget
Data Sets &Analysis
Determination of findings
&answers
Reviews and feedbacks

8Internet of Things
Improvement related to
the process
Final Submission
Image: Research Plan (Source: created by the author)
The research plan is a document that helps in setting the initial plans and ideas related
to the research. The research plan is presented logically. The overall research plan will help
in the correct approach toward the research. The plan will help in finding effective measures.
It gives the overall view and planning of the entire process related to the research. It
determines the strategies, budget, future scope related to the research. However, the research
will help in identifying the different issues related to the internet of things and recommend
measure to avoid it.
Conclusion
Security and privacy are one of the major issue associated with the internet of things.
The security-related issues of the internet of things cannot be ignored as it will limit the
advantages provided by the internet of things. It is essential to identify all the security
problems associated with the IoT. With the increase in demand for IoT, the federal table
commission is looking for solutions that can ensure that the information related to the
consumer is secure. There is a certain design that is implemented that helps in privacy. It is
the duty of the companies to implements a method to build customer trust and protection of
data of the consumers from the initial stage. The internet of things provides facilities to
collect a large amount of data. The research will help in finding different security issues
related to the internet of things and how can be prevented. Different designs and models are
proposed to identify and prevent security issues to improve the internet of things.
Improvement related to
the process
Final Submission
Image: Research Plan (Source: created by the author)
The research plan is a document that helps in setting the initial plans and ideas related
to the research. The research plan is presented logically. The overall research plan will help
in the correct approach toward the research. The plan will help in finding effective measures.
It gives the overall view and planning of the entire process related to the research. It
determines the strategies, budget, future scope related to the research. However, the research
will help in identifying the different issues related to the internet of things and recommend
measure to avoid it.
Conclusion
Security and privacy are one of the major issue associated with the internet of things.
The security-related issues of the internet of things cannot be ignored as it will limit the
advantages provided by the internet of things. It is essential to identify all the security
problems associated with the IoT. With the increase in demand for IoT, the federal table
commission is looking for solutions that can ensure that the information related to the
consumer is secure. There is a certain design that is implemented that helps in privacy. It is
the duty of the companies to implements a method to build customer trust and protection of
data of the consumers from the initial stage. The internet of things provides facilities to
collect a large amount of data. The research will help in finding different security issues
related to the internet of things and how can be prevented. Different designs and models are
proposed to identify and prevent security issues to improve the internet of things.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9Internet of Things
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10Internet of Things
References
Conti, M., Dehghantanha, A., Franke, K. and Watson, S., 2018. Internet of Things security
and forensics: Challenges and opportunities.
Jing, Q., Vasilakos, A.V., Wan, J., Lu, J. and Qiu, D., 2014. Security of the Internet of
Things: perspectives and challenges. Wireless Networks, 20(8), pp.2481-2501.
Kolias, C., Stavrou, A., Voas, J., Bojanova, I. and Kuhn, R., 2016. Learning internet-of-
things security" hands-on". IEEE Security & Privacy, 14(1), pp.37-46.
Kumar, J.S. and Patel, D.R., 2014. A survey on internet of things: Security and privacy
issues. International Journal of Computer Applications, 90(11).
Li, S., Tryfonas, T. and Li, H., 2016. The Internet of Things: a security point of view. Internet
Research, 26(2), pp.337-359.
Peppet, S.R., 2014. Regulating the internet of things: first steps toward managing
discrimination, privacy, security and consent. Tex. L. Rev., 93, p.85.
Perera, C., Ranjan, R., Wang, L., Khan, S.U. and Zomaya, A.Y., 2015. Big data privacy in
the internet of things era. IT Professional, 17(3), pp.32-39.
Porambage, P., Ylianttila, M., Schmitt, C., Kumar, P., Gurtov, A. and Vasilakos, A.V., 2016.
The quest for privacy in the internet of things. IEEE Cloud Computing, 3(2), pp.36-45.
Poudel, S., 2016. Internet of things: underlying technologies, interoperability, and threats to
privacy and security. Berkeley Tech. LJ, 31, p.997.
Rahman, A.F.A., Daud, M. and Mohamad, M.Z., 2016, March. Securing sensor to cloud
ecosystem using internet of things (iot) security framework. In Proceedings of the
International Conference on Internet of things and Cloud Computing (p. 79). ACM.
References
Conti, M., Dehghantanha, A., Franke, K. and Watson, S., 2018. Internet of Things security
and forensics: Challenges and opportunities.
Jing, Q., Vasilakos, A.V., Wan, J., Lu, J. and Qiu, D., 2014. Security of the Internet of
Things: perspectives and challenges. Wireless Networks, 20(8), pp.2481-2501.
Kolias, C., Stavrou, A., Voas, J., Bojanova, I. and Kuhn, R., 2016. Learning internet-of-
things security" hands-on". IEEE Security & Privacy, 14(1), pp.37-46.
Kumar, J.S. and Patel, D.R., 2014. A survey on internet of things: Security and privacy
issues. International Journal of Computer Applications, 90(11).
Li, S., Tryfonas, T. and Li, H., 2016. The Internet of Things: a security point of view. Internet
Research, 26(2), pp.337-359.
Peppet, S.R., 2014. Regulating the internet of things: first steps toward managing
discrimination, privacy, security and consent. Tex. L. Rev., 93, p.85.
Perera, C., Ranjan, R., Wang, L., Khan, S.U. and Zomaya, A.Y., 2015. Big data privacy in
the internet of things era. IT Professional, 17(3), pp.32-39.
Porambage, P., Ylianttila, M., Schmitt, C., Kumar, P., Gurtov, A. and Vasilakos, A.V., 2016.
The quest for privacy in the internet of things. IEEE Cloud Computing, 3(2), pp.36-45.
Poudel, S., 2016. Internet of things: underlying technologies, interoperability, and threats to
privacy and security. Berkeley Tech. LJ, 31, p.997.
Rahman, A.F.A., Daud, M. and Mohamad, M.Z., 2016, March. Securing sensor to cloud
ecosystem using internet of things (iot) security framework. In Proceedings of the
International Conference on Internet of things and Cloud Computing (p. 79). ACM.

11Internet of Things
Roman, R., Zhou, J. and Lopez, J., 2013. On the features and challenges of security and
privacy in distributed internet of things. Computer Networks, 57(10), pp.2266-2279.
Thierer, A.D., 2015. The internet of things and wearable technology: Addressing privacy and
security concerns without derailing innovation. Adam Thierer, the Internet of Things and
Wearable Technology: Addressing Privacy and Security Concerns without Derailing
Innovation, 21.
Weber, R.H., 2015. Internet of things: Privacy issues revisited. Computer Law & Security
Review, 31(5), pp.618-627.
Weinberg, B.D., Milne, G.R., Andonova, Y.G. and Hajjat, F.M., 2015. Internet of Things:
Convenience vs. privacy and secrecy. Business Horizons, 58(6), pp.615-624.
Yi, S., Qin, Z. and Li, Q., 2015, August. Security and privacy issues of fog computing: A
survey. In International conference on wireless algorithms, systems, and applications (pp.
685-695). Springer, Cham.
Ziegeldorf, J.H., Morchon, O.G. and Wehrle, K., 2014. Privacy in the Internet of Things:
threats and challenges. Security and Communication Networks, 7(12), pp.2728-2742.
Roman, R., Zhou, J. and Lopez, J., 2013. On the features and challenges of security and
privacy in distributed internet of things. Computer Networks, 57(10), pp.2266-2279.
Thierer, A.D., 2015. The internet of things and wearable technology: Addressing privacy and
security concerns without derailing innovation. Adam Thierer, the Internet of Things and
Wearable Technology: Addressing Privacy and Security Concerns without Derailing
Innovation, 21.
Weber, R.H., 2015. Internet of things: Privacy issues revisited. Computer Law & Security
Review, 31(5), pp.618-627.
Weinberg, B.D., Milne, G.R., Andonova, Y.G. and Hajjat, F.M., 2015. Internet of Things:
Convenience vs. privacy and secrecy. Business Horizons, 58(6), pp.615-624.
Yi, S., Qin, Z. and Li, Q., 2015, August. Security and privacy issues of fog computing: A
survey. In International conference on wireless algorithms, systems, and applications (pp.
685-695). Springer, Cham.
Ziegeldorf, J.H., Morchon, O.G. and Wehrle, K., 2014. Privacy in the Internet of Things:
threats and challenges. Security and Communication Networks, 7(12), pp.2728-2742.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 12
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.