Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Iot based smart home ppt

16/11/2021 Client: muhammad11 Deadline: 2 Day

Two Page Research Paper On "Security Issues With IoT Based Smart Home Devices"

Topic- Security Issues with IoT Based Smart Home Devices

4.1.- Why did you ( "your group") selected the topic for your research project (50-words).

4.2.- What are the major contributions of this project "To your organization" (70-words).—Assume Service Industry (Organization)

4.3.- Can you use this process of research in a corporate setting (50-words)?

4.4.- How can you use the bibliography to further understand the benefits of your research. (50-words).

4.5.- State the summary of your finding (75-words).

4.6.- Indicate the need for future research (50-words)

4.7.- State your conclusion (75-Words).

References

Security Issues with IoT Based Smart Home Devices

(Practical Connection Report)

by

Bismit Pratapsingh

An assignment submitted in partial fulfillment of the requirements for

ITS-699 course as part of the degree of Masters

In

Information Technology

School of Computing and Information Sciences

University of the Cumberlands

ITS-699-01 – Information Technology Project

Professor: Dr. Zadok Hakim Due: August 9, 2020

Summer 2020

Abstract
Internet of Things (IoT) is a system that enables connectivity of the devices over the Internet. Smart home devices have been increasing lately due to the increased energy efficiency and the flexibility to control and operate multiple home appliances, all from one place. However, the use of technology has also raised various security and privacy threats. IoT security has become an issue of primary concern to safeguard user's personal information from being misused. This paper investigates multiple security issues with IoT based smart home devices, the threats of different protocols, the different types of architecture in IoT technology, the preferred architecture for smart-home devices, and how user awareness can minimize risks that IoT smart home devices face. Based on qualitative research, through secondary data that are different peer-review journals from previous years, thorough data analysis has been performed on the various security issues. Our investigations resulted in the conclusion that there is a need for more user awareness and identifying key security issues before implementing their solutions as often; these issues are not known. Choosing the right architecture is extremely important to reduce the security issues associated with smart-home devices.

Keywords : IoT, Smart Home Devices, Authentication, Confidentiality, Social Engineering, IoT Security, Privacy

Table of Contents Abstract ii 1. Choice of topic 1 2. Significant of the project on IT Service Organization 1 3. Use of the research in a corporate setting 1 4. Understanding the benefits of bibliography to the research 2 5. Summarized findings 2 6. The need for future research 2 7. Conclusion 2 8. References 3 9. Certification Page 4 10. Short Bio 5

ii

1. Choice of topic Raja - Create bullet point for PPT
Security is a significant concern in evaluating the problems posed by the network connectivity of devices. This challenge arises in light of the reality that personal information shared through the Internet in everyday tasks (Frustaci et al., 2018). Therefore, the topic works to investigate multiple security issues with IoT based smart home devices.

2. Significance of the project on IT Service Organization Bismit- Create bullet point for PPT
I need three bullet points

Each bullet points need one References ( one you can use which you have provided below, Conti et al., 2018)

1- From below you can take 1 point by using the same reference

2

3

Through identifying and addressing the multiple security challenges associated with the Internet of Things, practical solutions that alleviate these problems may be proposed and implemented (Conti et al., 2018). Group members for this project are working/associated with IT service organizations. This project can provide insight into creative ways to protect security resources in any organization, which is also relevant as it provides possible solutions to increasing potential security risk.

3. Use of the research in a corporate setting (in-text citation and add the reference to the list)- Create bullet point for PPT
This research could also benefit companies who have been victims of cyber-attacks and prevent future attacks by understanding the security issues that come with the architecture of a smart system.

4. Understanding the benefits of bibliography to the research- Hanni (50 words) (in-text citation and add the reference to the list)- Create bullet point for PPT
5. Summarized findings- Vinay N (75 Words) (in-text citation and add the reference to the list)- Create bullet point for PPT
6. The need for future research (in-text citation and add the reference to the list)- Create bullet point for PPT
Since technology is changing at a rapid pace, vulnerabilities and security loopholes will exist in Information Systems. IoT smart home devices are not exempt from these vulnerabilities. For Instance, mitigation techniques like encryption mechanisms may become obsolete in the future and pose the risk of data theft to unauthorized users.

7. Conclusion (in-text citation and add the reference to the list)- Create bullet point for PPT
IoT has brought new technologies and new devices (Smart Home). The usage of these smart home devices has seen very rapid growth over the past decade. Every new technology brings new features as well as new threats. This applies very much to IoT based smart home devices. Newer technologies resolved and fixed some of the existing security issues, but they brought in newer threats. More research is needed to address and fix new security threats.

8. References
Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems, 78, 544–546. https://doi.org/10.1016/j.future.2017.07.060

Frustaci, M., Pace, P., Aloi, G., & Fortino, G. (2018). Evaluating Critical Security Issues of the IoT World: Present and Future Challenges. IEEE Internet of Things Journal, 5(4), 2483–2495. https://doi.org/10.1109/JIOT.2017.2767291

9. Certification Page
Submitted to (Professor's Name): Dr. Zadok Hakim

Course: ITS 699

Student's Name: Bismit Pratapsingh, Dilraj Singh, Phani Teja Gorrepati, Raja Karki, Sabin Pandey, Umme Haani, Vinay Kumar Kotha, Vinay Nallapeta Gangarajaiah

Date of Submission: August 2, 2020

Purpose and Title of Submission: Security Issues with IoT Based Smart Home Devices

Certification of Authorship: I hereby certify that I am the author of this document and that any assistance I received in its preparation is fully acknowledged and disclosed in the document. I have also cited all sources from which I obtained data, ideas, or words that are copied directly or paraphrased in the document. Sources are properly credited according to accepted standards for professional publications. I also certify that this paper was prepared by me for this purpose.

Students' Signature: Sabin Raj Pandey

10. Short Bio
A person posing for the camera Description automatically generated Bismit Pratapsingh, live in the city of Louisville Metro area in Kentucky. He was born and raised in India, and his birth date is May 10. He has done his Master's in Business Administration (MBA) with a specialization in Information Technology (IT) from Sikkim Manipal University in India. Also, he has held out his Postgraduate in Labor Laws and Personnel mgmt. From Sambalpur University, Odisha, India. With the help of this course, He would like to expand his carrier, knowledge in Information Technology areas, which would directly or indirectly grow the industries. Currently, he is working as an Oracle ERP Architect in a commended organization where he is involving ratifying the Oracle ERP Application for his customers.

A person posing for the camera Description automatically generated Dilraj Singh was born in Punjab, India. He graduated with Bachelors's in computer science. He is working as a Test Engineer in Silicon Valley. His core skills are testing applications and software with java. He is also skilled in extracting and visualizing data using python and SQL. He is taking ITS-699 Master's ain a deep understanding of Information Technology.

A person smiling for the camera Description automatically generated Phani Teja Gorrepati was born in Vijayawada, India. He graduated with a Bachelor of Science degree from Andhra University, India. He is living in the United States for the past five years. He is currently working as an Application Security Consultant. He is skilled in vulnerability analysis and remediation in web applications and infrastructure components. He is taking ITS-699-01 to gain practical knowledge technologies and trends in Information Technology.

A person smiling for the camera Description automatically generated Raja Karki was born in Kathmandu, Nepal. He completed his undergraduate in Mathematics from Caldwellmaster'sity. He has worked in the IT field primarily as a Business Analyst. He has worked in a variety of domains, including mortgage, finance, and payment industry. With a Master's in Information Technology program, Mr. Karki aims to explore the strategies and analytics in the IT field, enhance his skills, and accomplish his career goals. He is taking ITS 699 to explore the functional aspects of the IT industry better and enhance his project management and presentation skills. Mr. Karki works as a Business Systems Consultant in a leading mortgage company.

A person wearing a blue shirt and smiling at the camera Description automatically generated

Meet Sabin R. Pandey – Born in Kathmandu, Nepal, on October 29 of 1991. He received Bachelors's in business administration from Pokhara University, Pokhara, Nepal. He took online courses for python, java, and Linux operating system. He then joined a master's degree in Information technology at The University of Cumberlands. He worked with the Banking Information system at the beginning of the career. He is now working with the Health Information management team at Alameda Health System in Oakland, California, since 2018. Also, for his self-project, he has built a continuous integration and continuous deployment (CI-CD) web page development system with various tools like GitLab, Jenkin, Java, Maven, Tomcat, and wants to make it bigger and better.

A person wearing a striped shirt and smiling at the camera Description automatically generated Vinay Kumar Kotha was born in Warangal, India, on January 17. He has an MBA in Leadership from the University of Findlay, Ohio graduated in 2008. He has another MBA in Finance from Kakatiya University, India graduated in 2004. Vinay Kotha has over 15 years of experience working in the Business Intelligence workiBachelor'sor companies in Auto, Health Care, Retail industries. Vinay Kotha also has trained over 700+ professionals in MSBI (Microsoft Business Intelligence) in various IT companies. Currently, he is working for a major automotive supplier. Vinay would like to use the knowledge gained in this course to use in his career and pursue a Doctoral degree.

A person looking at the camera Description automatically generated Vinay Nallapeta Gangarajaiah was born in Bangalore, India, and holds a Bachelor of Engineering degree from VTU University, India. He is an experienced Senior Data Engineer with a demonstrated history of working in the Information Technology and services industry. He is skilled in Big Data analytics, currently assisting data scientists in building recommendations and predictive models to improve the care provided to health care members.

A person standing in front of a fence Description automatically generated Umme Haani did her Bachelor's in Computer Engineering from Prince Mohammed Bin Fahd University in Saudi Arabia in 2017. She worked in Cognizant as a programmer analyst, and the work focused on the Pharmacy Benefit Management system for their client CVS. It involved work related to QA testing with selenium. She is currently pursuing a master's in information technology at the University of Cumberlands to leverage her skills and gain knowledge to establish a more well-defined career in IT for the future. She is looking forward to using all the skills learned throughout this program to make the world a better place in some form or the other.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Maths Master
Quality Homework Helper
Solution Provider
Coursework Help Online
Homework Master
Finance Homework Help
Writer Writer Name Offer Chat
Maths Master

ONLINE

Maths Master

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$47 Chat With Writer
Quality Homework Helper

ONLINE

Quality Homework Helper

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$45 Chat With Writer
Solution Provider

ONLINE

Solution Provider

I am a PhD writer with 10 years of experience. I will be delivering high-quality, plagiarism-free work to you in the minimum amount of time. Waiting for your message.

$21 Chat With Writer
Coursework Help Online

ONLINE

Coursework Help Online

I have done dissertations, thesis, reports related to these topics, and I cover all the CHAPTERS accordingly and provide proper updates on the project.

$28 Chat With Writer
Homework Master

ONLINE

Homework Master

I am a PhD writer with 10 years of experience. I will be delivering high-quality, plagiarism-free work to you in the minimum amount of time. Waiting for your message.

$24 Chat With Writer
Finance Homework Help

ONLINE

Finance Homework Help

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$39 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Vaultebooks - English - Experiment 4: osmosis - tonicity and the plant cell - Charge account validation python - Artifacts from the realism era - Co2 co3 3 name - Cell homeostasis virtual lab graph - Double hatch hitch knot - General electric healthcare 2006 case analysis - Graduate Education Assistance - Summary for reading (MUSIC essay) - 325 bus timetable port macquarie - Journal Analysis - Landmark analysis: A primer - Critique - Module 04: Annotated Bibliography - Article Review - Puberty and Adolenscence - Question and answer - Arb part 3 criteria - Stickleback evolution lab answers - 22 abbey st leura - Vsim eva madison - Impact of corporate culture ppt - Physics Dimensional Analysis - Data flow diagram for human resource management project - Post lab questions biology - WEEK 3 Discussion 1 Clinical Concepts - Address the need to contingency planning, ensuring to address the following items: (1) Benefits of scenario events/planning. (2) Questions to consider when implementing scenario planning. (3) The common types of scenario planning - Isometric view of cuboid - Visual paradigm association arrow - 1 discussion due in 24 hours. - Need chegg tutor account - Dr bernard cheong clinic - Thinking skills and personal capabilities - Sealed off zhang ailing themes - Decision Process Analysis with Tables - Forces at angles worksheet - The key operating question of moral management is - Edinburgh napier staff intranet - Ap disassociated from controller - Conditional probability venn diagram - Codon worksheet answer key - Paper/PowerPoint Presentation - Proposal for youth empowerment - Nsw police training length - The standard cost is how much a product should cost to manufacture. - How much is 500 gallons of water - Uncle benny's face cream vitamin e - Is nudie juice pasteurised - Similarities and differences questions and answers - Semi log graph paper - Philosophy the quest for truth 9th edition pdf free - Pegasus strathclyde university login - A tale of two cities 1989 - Managing change in organizations assignment - Testout power supply lab - Mrp at wheeled coach - Http moodle nottingham ac uk - Mental health and behavioral services. - Physics study design vce - Week 7B - Psy 410 week 2 worksheet - Bachelor of commerce curtin - Chromium iii nitrate iron ii sulfate - Operational Excellence - CLOUD COM Practical Connection Assignment - Bankusa forecasting help desk demand by day case study - POLSCI 387 Tiananmen Square - Relational databases & SQL query language - Housing in the industrial revolution - Oceanography exam - Trigonometric ratios lesson plan - Ac white lawyers ayr - The habitable planet ecology lab answers - I want a wife judy brady - Week 9 discussion Board - Totally gross game instructions - 4.380 kg in pounds and ounces - Wendy Lewis 2 - Discussion - Renault trafic wiring loom recall - Discussion needed sunday by 2pm - Easy rider death scene - Determination of water hardness by edta titration calculations - Calculus ab practice test - The boston beer company case study - Dcc - Roman mosaic templates to print - Meiosis review worksheet answer key pdf - Cast iron foundry brisbane - The _____ act criminalized securities fraud and toughened penalties for corporate fraud. - Payment transfer receipt commonwealth bank - Courant institute of mathematical sciences ranking - M7D2 HIGHER CALLING - Electric potato science experiment - Class Diagram and Use Case Diagram - Acc 202 final project workbook - Sistema quick flip bottle tesco - Would an animal cell survive without mitochondria - 28437 n 108th way scottsdale - Wolf deer predator prey relationship