ITC595 Information Security: IoT Security and Privacy Report

Verified

Added on  2025/04/30

|3
|393
|345
AI Summary
Desklib provides past papers and solved assignments for students. This report analyzes IoT security and privacy.
Document Page
ITC595 - INFORMATION SECURITY
ASSESSMENT ITEM 3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Abstract
This report provides overview information regarding the security and privacy issue of the
internet of things (IoT). IoT is the information technology with the help of them focus on the
security parameter of the computing devices. Aim of the IoT is managed the information
privacy according to the network application. Internet of Things is a process concept in which
manages the communication channel according to the infrastructure field. In the IoT
technology interacting the information frequency basic requirement of data capture. The
function of IoT is developing a security panel in which communication infrastructure
manages the security network. IoT provides an application in which manage the privacy of
the user information according to the security requirement. Internet of things provides an area
in which computer network is connected with the digital system and manage the security
function (Aman et al., 2017, pp. 1327-1340).
IoT is ability in which transfer the information data from one network to another network.
IoT devices are the protocol in which according to the security measurement update the
production network. IoT is the network connectivity in this protocol makes the security
standards for communication network. With the help of the IoT application reduce the risk
management function in the computer system. For prevent, the cyber-security attacks internet
of things plays a vital role to increase the security network. IoT provides the security
approval in which determines the IoT devices and communication network. With the use of
the IoT application make the security path function in the network data protection. IoT
determines the security function according to the network infrastructure. IoT provides a
framework in which locate the security application according to the security segments. IoT is
ability in which transfer the information data from one network to another network. IoT
devices are the protocol in which according to the security measurement update the
production network (Sheng et al., 2013, pp. 91-98).
.
Document Page
References
Aman, M. N., Chua, K. C., & Sikdar, B. (2017). Mutual authentication in IoT systems using
physically unclonable functions. IEEE Internet of Things Journal, 4(5), 1327-1340.
Sheng, Z., Yang, S., Yu, Y., Vasilakos, A. V., McCann, J. A., & Leung, K. K. (2013). A
survey on the ietf protocol suite for the internet of things: Standards, challenges, and
opportunities. IEEE Wireless Communications, 20(6), 91-98.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]