ITC571 Emerging Technology: SCADA Cyber-Security Weekly Report

Verified

Added on  2023/06/11

|12
|1298
|288
Report
AI Summary
This is a weekly progress report for the ITC571 Emerging Technology and Innovations course, focusing on SCADA-based cyber-security management in IOT. The report details the student's progress over several weeks, covering various aspects such as literature survey, identifying limitations of IOT, formulating research questions, developing a conceptual model, considering research methodology, data collection, data sampling, data analysis, result collection, result evaluation, and research closure. Each week's entry includes the planned activities, actual progress, issues encountered, and the final result. The project aims to address security challenges in IOT by focusing on SCADA systems and cyber-security management.
Document Page
Weekly Progress Report
Full Name Vikranth bannenolla
Student ID 11621410
Subject ITC571 – Emerging Technology and Innovations
Assignment No Weekly Progress Report
Due Date 30th May 2018
Lecturer’s Name Malka N. Halgamuge
http://thinkspace.csu.edu.au/vikranthitc571blog/
Week 2:
NAME: Vikranth bannenolla
PROJECT
TITLE:
SCADA based cyber-security management in IOT
WEEK NO: 2 DATE: 20-3-2018
PLANNING Literature survey on SCADA based cyber-security Internet of Things
PLANNED: ACTUAL: COMMENT:
With the collection
of different
background
information about
Inter of Things a
literature survey was
conducted
In order to conduct
the research the
research work
successfully
different research,
journals papers and
many conferences
were planned to
attend.
All information
collected from the
secondary research
were analyzed
Gained knowledge
about different
technical excellence
and IOT application
in the practical field.
ISSUES
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
Some of the journals
and blogs were not
clearly represented
the current
application and
issues associated to
IOT.
20-3-2018 The actual resultant
was gained on
26/3/2018
YES
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
Document Page
Week 3:
NAME: Vikranth bannenolla
PROJECT
TITLE:
SCADA based cyber-security management in IOT
WEEK NO: 3 DATE: 27-3-2018
PLANNING Limitation of IOT
MILESTONE: PLANNED: ACTUAL: COMMENT:
To define the
limitations associated
to the application of
IOT technology
Before initiating the
research work the
factors that may
interrupt the
research success are
identified.
Vast investigation
was done to identify
the actual limitations
of IOT.
The disadvantages
of IOT application
were investigated
and required
resultants were also
gathered.
ISSUES
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
It was very risky to
identify all necessary
research limitations
27-3-2018 The actual result was
gained 3/4/2018
YES
3
Document Page
Week 4:
NAME: Vikranth bannenolla
PROJECT
TITLE:
SCADA based cyber-security management in IOT
WEEK NO: 4 DATE: 3-4-2018
PLANNING Research Question formulation
MILESTONE: PLANNED: ACTUAL: COMMENT:
After finding the
research limitations
the research
questions were
formulated
Both hypothetical
and non
hypothetical
questions are
planned to be
formed
A specific domain
was highlighted to
develop the research
questions
From the successful
answer of the
questions the
application of
advanced IOT will
be easily identified.
ISSUES
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
At a particular
research domain it
was quite difficult to
develop the research
questions.
3-4-2018 Actually the research
questions were
formulated on
8/5/2018
YES
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Week 5:
NAME: Vikranth bannenolla
PROJECT
TITLE:
SCADA based cyber-security management in IOT
WEEK NO: 5 DATE: 10-4-2018
PLANNING Conceptual model development
MILESTONE: PLANNED: ACTUAL: COMMENT:
Based on the
research questions a
research conceptual
model is prepared
A conceptual model
was planned to
develop for
maintaining the
flow of the research
on a particular
direction
With the help of the
conceptual model the
research will move
towards accurate
direction
A conceptual model
was successfully
built to perform the
research properly
ISSUES
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
The conceptual
model shows all the
research
development phases,
difficulties were
faced during defining
the phases of
research
10-4-2018 The resultant were
gained on 16/4/2018
YES
5
Document Page
Week 6:
NAME: Vikranth bannenolla
PROJECT
TITLE:
SCADA based cyber-security management in IOT
WEEK NO: 6 DATE: 17-4-2018
PLANNING Research methodology consideration for IOT
MILESTONE: PLANNED: ACTUAL: COMMENT:
For conducting the
research work
appropriate research
methodology in
terms of philosophy,
design, data
collection were
Planned to conduct
the research work
with secondary data
collection.
Secondary data
sources in terms of
blogs, journals are
followed to gather
information about
information security
in IOT.
Research is
performed with
descriptive research
design approach.
ISSUES
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
While using the
qualitative research
methodology serious
issues were faced
17-4-2018 The final result was
gained on 20/4/2018.
YES
Week 7:
6
Document Page
NAME: Vikranth bannenolla
PROJECT
TITLE:
SCADA based cyber-security management in IOT
WEEK NO: 7 DATE: 24-4-2018
PLANNING Data collection
MILESTONE: PLANNED: ACTUAL: COMMENT:
Collection of data by
developing a
questionnaire.
Qualitative data
collection through
developing survey
questionnaire was
planned to prepare.
Considering specific
IOT domain the
survey questionnaire
was formed
The developed
questionnaire was
distributed among
the end users.
ISSUES
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
Issues were faced
during the selection
of the survey
participants.
24-4-2018 The final results were
obtained on
30/05/2018
YES
Week 8:
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NAME: Vikranth bannenolla
PROJECT
TITLE:
SCADA based cyber-security management in IOT
WEEK NO: 8 DATE: 1-5-2018
PLANNING Data sampling
MILESTONE: PLANNED: ACTUAL: COMMENT:
Using the
convenience method
of sampling the data
sampling was done
Based on several
categories the data
sampling should be
done.
The gathered data are
sampled based upon
several
categorizations like
age, requirement,
domain etc.
Snowball sampling
was done for
successful research
resultant
ISSUES
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
During data
categorization issues
were faced
1-5-2018 26/6/2018 YES
Week 9:
NAME: Vikranth bannenolla
8
Document Page
PROJECT
TITLE:
SCADA based cyber-security management in IOT
WEEK NO: 9 DATE: 8-5-2018
PLANNING Data sampling analysis
MILESTONE: PLANNED: ACTUAL: COMMENT:
Analysis of the
sampling data
Using the most
suitable sampling
technique the data
are to be analyzed.
Snowball technique
was nominated for
analyzing the data.
Snowball sampling
was used to analyze
the sampling data
ISSUES
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
The data analysis
technique was quite
difficult thus, issues
were faced during its
implementation.
8-5-2018 29/6/2018 YES
Week 10:
NAME: Vikranth bannenolla
9
Document Page
PROJECT
TITLE:
SCADA based cyber-security management in IOT
WEEK NO: 10 DATE: 15-5-2018
PLANNING Result collection
MILESTONE: PLANNED: ACTUAL: COMMENT:
After analyzing the
sampled data all
results are to be
collected
Only the relevant
and necessary data
regarding IOT data
will be kept and
rest will be
eliminated
Effective methods
for eliminating
unwanted data are
used to collect the
result
The expected
research resultants
were collected.
ISSUES
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
While eliminating
the unwanted data if
proper technique was
no use then needful
data may have been
lost.
15-5-2018 9/7/2018 to
11/7/2018
YES
Week-11
10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NAME: Vikranth bannenolla
PROJECT
TITLE:
SCADA based cyber-security management in IOT
WEEK NO: 11 DATE: 22-5-2018
PLANNING Result evaluation
MILESTONE: PLANNED: ACTUAL: COMMENT:
After collecting the
results those are
evaluated
accordingly
The results should
be evaluated based
on their correctness
and effectiveness
Considering each
domain separately
the results are
evaluated by the
researchers
Successful and
expected resultants
were collected to
conduct the research
work
ISSUES
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
For different level of
classification the
result evaluation was
quite difficult
22-5-2018 11/7/2018 YES
Week-12
11
Document Page
NAME: Vikranth bannenolla
PROJECT
TITLE:
SCADA based cyber-security management in IOT
WEEK NO: 12 DATE: 29-5-2018
PLANNING Research closure for the topic “IOT”
MILESTONE: PLANNED: ACTUAL: COMMENT:
Research closure
phase
The final
documentation on
SCADA based
cyber-security
management in IOT
is gained
After collecting the
expected resultant the
research paper will
be documented
With the
submission of the
final document the
research work is
terminated
ISSUES
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
For identifying
specific cyber
security issues,
problems were faced
29-5-2018 17/7/2018 YES
12
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]