Assessment Details:
Internet-of-Things (loT) has been considered as a necessary part of our daily life with billions of loT devices collectig data through wireless technology and can interoperate within the existing Internet infrastructure. loTs play important role in many applications including; smart home, smart cities, environmental monitoring, health care, and smart businesses. It is expected the number of loT devices will surpass 50 billion by 2020. This drawn the attention of attackers who seek to exploit them for their own benefit. Basically, loT brings along a plethora of potential security and privacy risks to the end-users. The risk to loT devices from a network attack has increased exponentially. Threats to loT can occur at any point on the Internet where there is a potential weakness that hackers can exploit using different types malware. As the number of devices grows, the potential for attack and disruption increases. Assume you are working as an IT security consultant at the IT department of ABC company. The company uses different types of loT devices to collect very important data. As an IT consultant, you want to study the security and privacy challenges for loTs. In this context write a report including the following sections:
1. Introduction of loT devices, types and its applications. 2. Discussion and compare three recent variants of attacks against loT devices. Your comparisons must include table summarize the main points. 3. Identify and evaluate the three various countermeasures and formal security protection techniques against loT attacks. 4. Discussion of two authentication protocols specified to loT devices. 5. Summary 6. References in Harvard style.

Posted in Uncategorized

Leave a Reply