Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Assignment on Different components of a Cryptographic module

Category: Applied Sciences Paper Type: Assignment Writing Reference: APA Words: 1300

There are some components of Cryptographic module and their purposes are given below 

FTP_EMSEC.1 TOC Emanation 

The main purpose of this component is that it will not limit the TOE when there is excess of specified limits used for enabling access to data and also for user data types. Moreover, it will also ensure that they are unable to gain access to the TSF data and TUD properly

FPT_TST.2 TSF self-testing 

There is no specific other components present. The main purpose of this component is to perform self-testing at power up conditions for verifying the correctness of the cryptographic algorithms and also TSF. Moreover, it will also verify the integrity of the software. The next thing is that it will also perform self-testing at different conditions for the correctness of critical cryptographic algorithms.  After the end of self-testing it will also take some actions against it. 

Use of Cryptography in different layers of IoT system

There are some important layers of IoT system 

The first one is related to Things layer and it contain some devices, controllers and sensors. 

The second on is connectivity edge layer it will connect it with the computer layer. 

The third layer is related to the global infrastructure layer. It will connect all parameters together. 

The fourth layer is related to data ingestion layer. This layer will breakdown the data in a proper way. 

The fifth layer is related to the data analysis layer. It will analyse the data came from the computer. 

The sixth layer is related to the application layer. It will provide complete access to the application.

The seventh layer is related to the people and process layer. It will process the application according to people (Firouzi, 2020). 

 

Part E

IoT attack vectors by OWASP

The attack vectors that are set by the OWASP for IOT are mobile, cloud, device and communication. 

It can be noted that mobile is one of the most important platform for the user interface used for IoT through which user are able to see the physical world. There are some mobile applications that communicates with IoT ecosystem and send commands to others. Due to this these devices become the main entry point into the ecosystem of IoT. There is list of some important attack surface present in the mobile devices include storage, communication, encryption, authentication (Firouzi, 2020).

The next attack vector is cloud and it is considered as important pieces of IoT. Due to this it is considered as an important attack point. The main purpose of Cloud is to save data any kind of data. But if there is any risk present in the system the attacker will gain data from the cloud. 

There is another attack vector and it is related to Device. This is because it has an interface with the physical world and also able to communicate with the virtual world. Moreover, it is considered as the first step for the physical world data (El Hassan Abdelwahed, 2018). 

5 relevant IoT systems

The first system is google home voice control system. It has a complete linked with the IoT systems. It can easily play media, thermostats, lights through the help of IoT 

The next one Amazon Echo plus control system. It is involved in playing songs and media through IoT system 

Third one is amazon dash button. It is devices that is operated through Wi-Fi means IoT systems

The fourth one is August doorbell cam. It is connected with IoT systems for showing complete image of the person properly 

The fifth one is august smart lock, it will lock the doors easily with the help of IoT systems (Paulo Novais, 2019). 

IoT services provided by CSP

 The first CSP is Amazon web service and the next one is Microsoft Azure. 

The IoT services providing by Amazon web service is quite amazing. This is because it is involved in providing computer power, content delivery and database storage through the help of IoT. 

 

On the other hand, there are some IoT services provided by Microsoft Azure are given below. The first one is related to testing of the whole program with IoT. Moreover, it is also involved in managing the application by controlling its data through the help of IoT. 


IoT security challenges faced by CSP

There are a lot of IoT challenges faced by CSP, some of them are given below

The first one is related to the control of the system and devices. It can be noted that it is one of the main concern of the small businesses. The fact is that the IoT devices are quite cheap and they are not too much secure. Due to this it will become easy target for the hackers. Therefore, it will become one of the huge challenge for the IoT developer to secure these devices and systems. 

The second one is related to compatibility. This is because devices are not compatible with the system and hacked easily, and owners has to pay the price (Muhammad Ikhwan Hanif bin Ismail, 2017). 

The next challenge is related to confidentiality with internal threats. It can be noted that IoT based attackers are completely based on the cloud service provider. Due to this case, the cloud data of the small enterprises is not secure. 

The next challenge is related to integrity. The devices that are connected with IoT and taking CSP services are becoming and easy target for the malicious activities from the hackers. 

The next important challenge is related to the update of the devices. IoT is considered as valuable opportunity for the CSPs. Moreover, CSP is going to increase its future revenue through the help of IoT because it is going to provide vast opportunities for the users. Due to cybercrime issue, it will become one of the huge challenge for IoT to provide services to CSPs.

Compare the seven IoT security issues managed by CSPs 

The two CSP are Amazon web service and Microsoft Azure. 

Security issues

Amazon web service

Microsoft Azure

User Access

The user access is easy

For this make proper account on the system

Regularity compliance

Its terms and conditions are valuable for the user

It contains brief information about terms and conditions

Data location

Data is located on the amazon platform for cloud

Data is located at the Microsoft platform for cloud

Recovery

Data recovery is not easy to access

It is providing easy access to the data recovery

Data segmentation

It is providing valuable data segmentation for user

It is providing valuable data segmentation for user

Investigative support

Investigate support is moderate

Providing efficient investigation support

Long term viability

Providing long term viability

Limited time viability


References of Different components of a Cryptographic module

Dr.B.Sivasankari, & C.Arun prabha, S. ,. (2017). IOT based Indoor Air Pollution Monitoring using Raspberry PI . International Journal of Innovations in Engineering and Technology (IJIET) .

El Hassan Abdelwahed, L. B. (2018). Model and Data Engineering: 8th International Conference, MEDI 2018, Marrakesh, Morocco, October 24–26, 2018, Proceedings. Springer.

Firouzi, F. (2020). Intelligent Internet of Things: From Device to Fog and Cloud. Springer Nature, .

Gokul, M. V., & Taclepalli, M. S. (2016). lmplementation of a WiFi based Plug and Sense Device for Dedicated Air Pollution Monitoring using IoT . Online International Conference on Green Engineering and Technologies .

Muhammad Ikhwan Hanif bin Ismail, *. M. (2017). IoT Implementation for Indoor Vertical Farming Watering System. IEEE.

Paulo Novais, J. L. (2019). Ambient Intelligence – Software and Applications –,10th International Symposium on Ambient Intelligence. Springer,.

Wang, Q., Chen, D., Ning Zhang, Z. Q., & Qin, Z. (2017). LACS: A lightweight label-based access control scheme in IoT-based 5G caching context. IEEE Access 5.

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Best Coursework Help

ONLINE

Best Coursework Help

1554 Orders Completed

Assignment Helper

ONLINE

Assignment Helper

21 Orders Completed

Financial Analyst

ONLINE

Financial Analyst

1596 Orders Completed