Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Iot based smart home ppt

16/11/2021 Client: muhammad11 Deadline: 2 Day

Two Page Research Paper On "Security Issues With IoT Based Smart Home Devices"

Topic- Security Issues with IoT Based Smart Home Devices

4.1.- Why did you ( "your group") selected the topic for your research project (50-words).

4.2.- What are the major contributions of this project "To your organization" (70-words).—Assume Service Industry (Organization)

4.3.- Can you use this process of research in a corporate setting (50-words)?

4.4.- How can you use the bibliography to further understand the benefits of your research. (50-words).

4.5.- State the summary of your finding (75-words).

4.6.- Indicate the need for future research (50-words)

4.7.- State your conclusion (75-Words).

References

Security Issues with IoT Based Smart Home Devices

(Practical Connection Report)

by

Bismit Pratapsingh

An assignment submitted in partial fulfillment of the requirements for

ITS-699 course as part of the degree of Masters

In

Information Technology

School of Computing and Information Sciences

University of the Cumberlands

ITS-699-01 – Information Technology Project

Professor: Dr. Zadok Hakim Due: August 9, 2020

Summer 2020

Abstract
Internet of Things (IoT) is a system that enables connectivity of the devices over the Internet. Smart home devices have been increasing lately due to the increased energy efficiency and the flexibility to control and operate multiple home appliances, all from one place. However, the use of technology has also raised various security and privacy threats. IoT security has become an issue of primary concern to safeguard user's personal information from being misused. This paper investigates multiple security issues with IoT based smart home devices, the threats of different protocols, the different types of architecture in IoT technology, the preferred architecture for smart-home devices, and how user awareness can minimize risks that IoT smart home devices face. Based on qualitative research, through secondary data that are different peer-review journals from previous years, thorough data analysis has been performed on the various security issues. Our investigations resulted in the conclusion that there is a need for more user awareness and identifying key security issues before implementing their solutions as often; these issues are not known. Choosing the right architecture is extremely important to reduce the security issues associated with smart-home devices.

Keywords : IoT, Smart Home Devices, Authentication, Confidentiality, Social Engineering, IoT Security, Privacy

Table of Contents Abstract ii 1. Choice of topic 1 2. Significant of the project on IT Service Organization 1 3. Use of the research in a corporate setting 1 4. Understanding the benefits of bibliography to the research 2 5. Summarized findings 2 6. The need for future research 2 7. Conclusion 2 8. References 3 9. Certification Page 4 10. Short Bio 5

ii

1. Choice of topic Raja - Create bullet point for PPT
Security is a significant concern in evaluating the problems posed by the network connectivity of devices. This challenge arises in light of the reality that personal information shared through the Internet in everyday tasks (Frustaci et al., 2018). Therefore, the topic works to investigate multiple security issues with IoT based smart home devices.

2. Significance of the project on IT Service Organization Bismit- Create bullet point for PPT
I need three bullet points

Each bullet points need one References ( one you can use which you have provided below, Conti et al., 2018)

1- From below you can take 1 point by using the same reference

2

3

Through identifying and addressing the multiple security challenges associated with the Internet of Things, practical solutions that alleviate these problems may be proposed and implemented (Conti et al., 2018). Group members for this project are working/associated with IT service organizations. This project can provide insight into creative ways to protect security resources in any organization, which is also relevant as it provides possible solutions to increasing potential security risk.

3. Use of the research in a corporate setting (in-text citation and add the reference to the list)- Create bullet point for PPT
This research could also benefit companies who have been victims of cyber-attacks and prevent future attacks by understanding the security issues that come with the architecture of a smart system.

4. Understanding the benefits of bibliography to the research- Hanni (50 words) (in-text citation and add the reference to the list)- Create bullet point for PPT
5. Summarized findings- Vinay N (75 Words) (in-text citation and add the reference to the list)- Create bullet point for PPT
6. The need for future research (in-text citation and add the reference to the list)- Create bullet point for PPT
Since technology is changing at a rapid pace, vulnerabilities and security loopholes will exist in Information Systems. IoT smart home devices are not exempt from these vulnerabilities. For Instance, mitigation techniques like encryption mechanisms may become obsolete in the future and pose the risk of data theft to unauthorized users.

7. Conclusion (in-text citation and add the reference to the list)- Create bullet point for PPT
IoT has brought new technologies and new devices (Smart Home). The usage of these smart home devices has seen very rapid growth over the past decade. Every new technology brings new features as well as new threats. This applies very much to IoT based smart home devices. Newer technologies resolved and fixed some of the existing security issues, but they brought in newer threats. More research is needed to address and fix new security threats.

8. References
Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems, 78, 544–546. https://doi.org/10.1016/j.future.2017.07.060

Frustaci, M., Pace, P., Aloi, G., & Fortino, G. (2018). Evaluating Critical Security Issues of the IoT World: Present and Future Challenges. IEEE Internet of Things Journal, 5(4), 2483–2495. https://doi.org/10.1109/JIOT.2017.2767291

9. Certification Page
Submitted to (Professor's Name): Dr. Zadok Hakim

Course: ITS 699

Student's Name: Bismit Pratapsingh, Dilraj Singh, Phani Teja Gorrepati, Raja Karki, Sabin Pandey, Umme Haani, Vinay Kumar Kotha, Vinay Nallapeta Gangarajaiah

Date of Submission: August 2, 2020

Purpose and Title of Submission: Security Issues with IoT Based Smart Home Devices

Certification of Authorship: I hereby certify that I am the author of this document and that any assistance I received in its preparation is fully acknowledged and disclosed in the document. I have also cited all sources from which I obtained data, ideas, or words that are copied directly or paraphrased in the document. Sources are properly credited according to accepted standards for professional publications. I also certify that this paper was prepared by me for this purpose.

Students' Signature: Sabin Raj Pandey

10. Short Bio
A person posing for the camera Description automatically generated Bismit Pratapsingh, live in the city of Louisville Metro area in Kentucky. He was born and raised in India, and his birth date is May 10. He has done his Master's in Business Administration (MBA) with a specialization in Information Technology (IT) from Sikkim Manipal University in India. Also, he has held out his Postgraduate in Labor Laws and Personnel mgmt. From Sambalpur University, Odisha, India. With the help of this course, He would like to expand his carrier, knowledge in Information Technology areas, which would directly or indirectly grow the industries. Currently, he is working as an Oracle ERP Architect in a commended organization where he is involving ratifying the Oracle ERP Application for his customers.

A person posing for the camera Description automatically generated Dilraj Singh was born in Punjab, India. He graduated with Bachelors's in computer science. He is working as a Test Engineer in Silicon Valley. His core skills are testing applications and software with java. He is also skilled in extracting and visualizing data using python and SQL. He is taking ITS-699 Master's ain a deep understanding of Information Technology.

A person smiling for the camera Description automatically generated Phani Teja Gorrepati was born in Vijayawada, India. He graduated with a Bachelor of Science degree from Andhra University, India. He is living in the United States for the past five years. He is currently working as an Application Security Consultant. He is skilled in vulnerability analysis and remediation in web applications and infrastructure components. He is taking ITS-699-01 to gain practical knowledge technologies and trends in Information Technology.

A person smiling for the camera Description automatically generated Raja Karki was born in Kathmandu, Nepal. He completed his undergraduate in Mathematics from Caldwellmaster'sity. He has worked in the IT field primarily as a Business Analyst. He has worked in a variety of domains, including mortgage, finance, and payment industry. With a Master's in Information Technology program, Mr. Karki aims to explore the strategies and analytics in the IT field, enhance his skills, and accomplish his career goals. He is taking ITS 699 to explore the functional aspects of the IT industry better and enhance his project management and presentation skills. Mr. Karki works as a Business Systems Consultant in a leading mortgage company.

A person wearing a blue shirt and smiling at the camera Description automatically generated

Meet Sabin R. Pandey – Born in Kathmandu, Nepal, on October 29 of 1991. He received Bachelors's in business administration from Pokhara University, Pokhara, Nepal. He took online courses for python, java, and Linux operating system. He then joined a master's degree in Information technology at The University of Cumberlands. He worked with the Banking Information system at the beginning of the career. He is now working with the Health Information management team at Alameda Health System in Oakland, California, since 2018. Also, for his self-project, he has built a continuous integration and continuous deployment (CI-CD) web page development system with various tools like GitLab, Jenkin, Java, Maven, Tomcat, and wants to make it bigger and better.

A person wearing a striped shirt and smiling at the camera Description automatically generated Vinay Kumar Kotha was born in Warangal, India, on January 17. He has an MBA in Leadership from the University of Findlay, Ohio graduated in 2008. He has another MBA in Finance from Kakatiya University, India graduated in 2004. Vinay Kotha has over 15 years of experience working in the Business Intelligence workiBachelor'sor companies in Auto, Health Care, Retail industries. Vinay Kotha also has trained over 700+ professionals in MSBI (Microsoft Business Intelligence) in various IT companies. Currently, he is working for a major automotive supplier. Vinay would like to use the knowledge gained in this course to use in his career and pursue a Doctoral degree.

A person looking at the camera Description automatically generated Vinay Nallapeta Gangarajaiah was born in Bangalore, India, and holds a Bachelor of Engineering degree from VTU University, India. He is an experienced Senior Data Engineer with a demonstrated history of working in the Information Technology and services industry. He is skilled in Big Data analytics, currently assisting data scientists in building recommendations and predictive models to improve the care provided to health care members.

A person standing in front of a fence Description automatically generated Umme Haani did her Bachelor's in Computer Engineering from Prince Mohammed Bin Fahd University in Saudi Arabia in 2017. She worked in Cognizant as a programmer analyst, and the work focused on the Pharmacy Benefit Management system for their client CVS. It involved work related to QA testing with selenium. She is currently pursuing a master's in information technology at the University of Cumberlands to leverage her skills and gain knowledge to establish a more well-defined career in IT for the future. She is looking forward to using all the skills learned throughout this program to make the world a better place in some form or the other.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Maths Master
Quality Homework Helper
Solution Provider
Coursework Help Online
Homework Master
Finance Homework Help
Writer Writer Name Offer Chat
Maths Master

ONLINE

Maths Master

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$47 Chat With Writer
Quality Homework Helper

ONLINE

Quality Homework Helper

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$45 Chat With Writer
Solution Provider

ONLINE

Solution Provider

I am a PhD writer with 10 years of experience. I will be delivering high-quality, plagiarism-free work to you in the minimum amount of time. Waiting for your message.

$21 Chat With Writer
Coursework Help Online

ONLINE

Coursework Help Online

I have done dissertations, thesis, reports related to these topics, and I cover all the CHAPTERS accordingly and provide proper updates on the project.

$28 Chat With Writer
Homework Master

ONLINE

Homework Master

I am a PhD writer with 10 years of experience. I will be delivering high-quality, plagiarism-free work to you in the minimum amount of time. Waiting for your message.

$24 Chat With Writer
Finance Homework Help

ONLINE

Finance Homework Help

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$39 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Wall street journal exchange rates - 2 4 1 project 1 your comparison template - Managerial accounting exercises and solutions - Https www youtube com watch v fvpakzqm3h8 - Assignment week 2- com500 paper - Jim turin and sons - Honeymyrtle cottage kangaroo island - +61 3 9117 8858 - Affidavit of support and consent philippine embassy abu dhabi - Ipv6 total address space - Why does paris attack romeo at the tomb - Explain the technical technique for forecasting exchange rates - 1 fte how many hours - Molar mass of calcium carbide - Logic level shifter jaycar - Home nations discourage foreign direct investment outflows because it - Social science short essay - Fedex web services wsdl url - Case study operations management problem - What is emotive writing - Avention strategic account plan template - The pedestrian by ray bradbury - Proposing a data gathering strategy at aerotech inc - Social psychology by elliot aronson pdf - 2.96 as a mixed number or fraction in simplest form - On course journal entry 6 - TLMT601 Week 7 Math Assignment - Gunther mirror mastic home depot - Evidentialism vs non evidentialism - How to open smil file on mac - The primary aim of social marketing is: - Broward general er wait time - Managerial issues of a networked organization - Intentional rounding nsw health - Physics lab homework answers - Interest rate parity theory ppt - Bath uni student union - Erikson's Psychosocial Stages of Development - Fast track couriers business plan - Soap note examples for nurse practitioners uti - Before the flood discussion worksheet answers - The trickster of seville full text english - Overview chemical bonds worksheet - Mcis sau - Journal of inequalities in pure and applied mathematics - Pearson Portuguese lab - Power point - Technicial writing - Audience Analysis- 5 paragraph only!!! - They say i say blue collar brilliance - Ds9 - As a rule the weaker the collective impact of competitive pressures associated with the five - An indian story roger jack - Week 8 - Bis ethylenediamine zinc ii tetraiodomercurate ii - Mark dransfield net worth - Keynows - Support/Educational/Self-Help Group Process Exercise - Classroom management strategies matrix - Received an un encrypted invalid_cookie notify message - 100 hotter grace glasses no lenses - Dulux beige royal exterior - F4transkript free download full version - Is flour a pure substance - Kansas city preventative patrol experiment - BENCHMARKS - Difference between noncyclic and cyclic photophosphorylation - Competency and image enhancement as a means of addressing devaluation - Financial management challenges and ethics - 2015 vce methods exam 2 - 1 pound in kgs - Huff sons of anarchy - Steyning grammar school jobs - Find the length of the loop of the given curve. x = 12t − 4t3, y = 12t2 - Umuc libs 150 final exam answers - Give me liberty an american history 5th edition pdf - Ameled er 3nm st - Project - Darden's global supply chains case study - 1000 flowers auctioned per second in holland - Techniques of Data Analysis 8381 - 70 410 practice exam - Solicited and unsolicited application letter - Corporate level cooperative strategy examples - What is the distance from the venus to the sun - Future of the juvenile justice system proposal presentation - During an ice show a 60 kg skater - Discussion(NCM) - Biochemistry enzyme kinetics lab report - Dr ross dwyer radiologist - What is the difference of transverse and longitudinal waves - Tikz graphs - Getty art history information program - Vacon nxp application manual - The thief's story by ruskin bond - Myths about gifted students - Thermal conductivity experiment lab report - Leadership legacy assessment test - Https www independent co uk cmp ilc refresh - Public law - Edgewood lake hospital case study