MN502 - Overview of Network Security: Security Challenges Presentation

Verified

Added on  2023/06/15

|6
|395
|484
Presentation
AI Summary
This presentation provides an overview of network security, focusing on the security challenges in emerging networks, particularly concerning the Internet of Things (IoT). It begins with an introduction to the interfacing of devices with the internet, highlighting the convergence of Information Technology (IT) and Operational Technology (OT). A literature review emphasizes the importance of security across devices, networks, and consumer data, especially concerning data privacy. The presentation then analyzes the security issues of IoT, proposing solutions to data threats, including identifying physical access assaults, setup and verification processes, and implementing heartbeats. The presentation concludes with a list of references.
Document Page
A PRESENTATION ON -
OVERVIEW OF NETWORK
SECURITY
Security Challenges in Emerging
Networks
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INDEX
Introduction
Literature Review
Analyzing critically security issues
of IoT
SOLUTION TO DATA THREATS
IN IOT
REFERENCES
Document Page
INTRODUCTION
The possibility of Internet of Things is mainly
interfacing a gadget with the component of on and
off switch with the web advancement
The preliminary impact which is proficient from
the of the storage facility dividers between the
Information Technology (IT) and the Operational
Technology (OT) with a particular ultimate
objective to complete change drive allowing
unstructured data which is machine made to be
break down for the comprehension.
Document Page
LITERATURE REVIEW
Discussing security is one of the basic viewpoints.
Security is one of the primary worries of any field
It has an extensive variety of scope which
incorporates securities like gadget, arrange,
shopper information and so forth
Heaps of information gets created due to different
loT gadgets which exhibits a circumstance where a
client might want to have protection of its
information regarding access and capacity areas of
its information
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
SOLUTION TO DATA THREATS
IN IOT
A major piece of our security investigation
is to distinguish the security instruments
that could help us and how to shield
those systems from aggressors.
Distinguishing physical access assaults
Setup and verification
Heart Beat
Document Page
REFERENCES
[1] R. H. Weber and E. Studer, “Cybersecurity in the
Internet of Things: Legal aspects,” Comput. Law Secur.
Rev., vol. 32, no. 5, pp. 715–728, 2016.
[2] C. Kolias, A. Stavrou, J. Voas, I. Bojanova, and
R. Kuhn, “Learning Internet-of-Things Security ‘Hands-
On,’” IEEE Secur. Priv., vol. 14, no. 1, pp. 37–46, 2016.
[3] L. Columbus, “Roundup of the Internet of Things
Forecasts and Market Estimates, 2016,” Forbes Tech, p.
2, 2016.
[4] J. A. Stankovic, “Research directions for the
internet of things,” IEEE Internet Things J., vol. 1, no. 1,
pp. 3–9, 2014.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]