MN502 Network Security: Analyzing Security Challenges & Solutions

Verified

Added on  2023/06/15

|5
|399
|494
Report
AI Summary
This report addresses the security challenges within emerging Internet of Things (IoT) networks, focusing on key issues such as data encryption, data authentication, and hardware vulnerabilities. It highlights the increasing prevalence of IoT technology across various sectors and the associated security risks that arise from data collection, processing, and potential hacking attempts. The report emphasizes the importance of hardware security, noting that manufacturers are actively working to address these concerns. It proposes mitigation strategies, particularly pre-installation system testing, to identify and resolve potential vulnerabilities related to device range, capacity, latency, and manufacturability. The report references academic sources to support its analysis of fog computing and the broader implications of IoT in engineering, policy, and industry.
Document Page
Internet of Things
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The most modern technology that is famous
worldwide is Internet of Things. Different features
of business, implementation and research that
are related with Internet of Things are needed in
industries, government and academics.
Different domain verticals applications are done
by Internet of Things that ranges from civil sector
to defense sector.
It is that it is an important part in the technology
sector of engineering, policy and industry.
Defination
Document Page
Data Encryption- Numerous amounts of data is
collected by the devices of Internet of Things. Data
processing and data retrieval is considered as the
internal part of the Internet of Things environment.
Data Authentication- When the data is encrypted, and
then comes the chance of getting hacked. The data is
to be protected from hacking.
Hardware Issues- The hardware creates a problem from
the beginning of Internet of Things. The makers of
Internet of Things devices, the chipmakers of devices
such as Intel and ARM are focusing more on security
purpose because with all time new generation evolving,
new ways are coming to as a risk to the devices.
Three Security Issues of IoT
Document Page
The solution for mitigating risk that is
related to hardware security is done by
testing the system before the framework is
being installed.
The best and most significant way to
mitigate the security risk of hardware in
Internet of Things is to test the framework
of the place. The testing procedure
includes- device range, capacity and
latency and manufacturability test.
Mitigate Security Threat
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Bonomi, Flavio, Rodolfo Milito, Jiang Zhu, and
Sateesh Addepalli. "Fog computing and its role in
the internet of things." In Proceedings of the first
edition of the MCC workshop on Mobile cloud
computing, pp. 13-16. ACM, 2012.
Chandrakanth, S., K. Venkatesh, J. Uma Mahesh,
and K. V. Naganjaneyulu. "Internet of things."
International Journal of Innovations & Advancement
in Computer Science 3, no. 8 (2014): 16-20.
Cui X. The internet of things. InEthical Ripples of
Creativity and Innovation 2016 (pp. 61-68).
Palgrave Macmillan, London.
Bibiography
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]