Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Iot based smart home ppt

16/11/2021 Client: muhammad11 Deadline: 2 Day

Two Page Research Paper On "Security Issues With IoT Based Smart Home Devices"

Topic- Security Issues with IoT Based Smart Home Devices

4.1.- Why did you ( "your group") selected the topic for your research project (50-words).

4.2.- What are the major contributions of this project "To your organization" (70-words).—Assume Service Industry (Organization)

4.3.- Can you use this process of research in a corporate setting (50-words)?

4.4.- How can you use the bibliography to further understand the benefits of your research. (50-words).

4.5.- State the summary of your finding (75-words).

4.6.- Indicate the need for future research (50-words)

4.7.- State your conclusion (75-Words).

References

Security Issues with IoT Based Smart Home Devices

(Practical Connection Report)

by

Bismit Pratapsingh

An assignment submitted in partial fulfillment of the requirements for

ITS-699 course as part of the degree of Masters

In

Information Technology

School of Computing and Information Sciences

University of the Cumberlands

ITS-699-01 – Information Technology Project

Professor: Dr. Zadok Hakim Due: August 9, 2020

Summer 2020

Abstract
Internet of Things (IoT) is a system that enables connectivity of the devices over the Internet. Smart home devices have been increasing lately due to the increased energy efficiency and the flexibility to control and operate multiple home appliances, all from one place. However, the use of technology has also raised various security and privacy threats. IoT security has become an issue of primary concern to safeguard user's personal information from being misused. This paper investigates multiple security issues with IoT based smart home devices, the threats of different protocols, the different types of architecture in IoT technology, the preferred architecture for smart-home devices, and how user awareness can minimize risks that IoT smart home devices face. Based on qualitative research, through secondary data that are different peer-review journals from previous years, thorough data analysis has been performed on the various security issues. Our investigations resulted in the conclusion that there is a need for more user awareness and identifying key security issues before implementing their solutions as often; these issues are not known. Choosing the right architecture is extremely important to reduce the security issues associated with smart-home devices.

Keywords : IoT, Smart Home Devices, Authentication, Confidentiality, Social Engineering, IoT Security, Privacy

Table of Contents Abstract ii 1. Choice of topic 1 2. Significant of the project on IT Service Organization 1 3. Use of the research in a corporate setting 1 4. Understanding the benefits of bibliography to the research 2 5. Summarized findings 2 6. The need for future research 2 7. Conclusion 2 8. References 3 9. Certification Page 4 10. Short Bio 5

ii

1. Choice of topic Raja - Create bullet point for PPT
Security is a significant concern in evaluating the problems posed by the network connectivity of devices. This challenge arises in light of the reality that personal information shared through the Internet in everyday tasks (Frustaci et al., 2018). Therefore, the topic works to investigate multiple security issues with IoT based smart home devices.

2. Significance of the project on IT Service Organization Bismit- Create bullet point for PPT
I need three bullet points

Each bullet points need one References ( one you can use which you have provided below, Conti et al., 2018)

1- From below you can take 1 point by using the same reference

2

3

Through identifying and addressing the multiple security challenges associated with the Internet of Things, practical solutions that alleviate these problems may be proposed and implemented (Conti et al., 2018). Group members for this project are working/associated with IT service organizations. This project can provide insight into creative ways to protect security resources in any organization, which is also relevant as it provides possible solutions to increasing potential security risk.

3. Use of the research in a corporate setting (in-text citation and add the reference to the list)- Create bullet point for PPT
This research could also benefit companies who have been victims of cyber-attacks and prevent future attacks by understanding the security issues that come with the architecture of a smart system.

4. Understanding the benefits of bibliography to the research- Hanni (50 words) (in-text citation and add the reference to the list)- Create bullet point for PPT
5. Summarized findings- Vinay N (75 Words) (in-text citation and add the reference to the list)- Create bullet point for PPT
6. The need for future research (in-text citation and add the reference to the list)- Create bullet point for PPT
Since technology is changing at a rapid pace, vulnerabilities and security loopholes will exist in Information Systems. IoT smart home devices are not exempt from these vulnerabilities. For Instance, mitigation techniques like encryption mechanisms may become obsolete in the future and pose the risk of data theft to unauthorized users.

7. Conclusion (in-text citation and add the reference to the list)- Create bullet point for PPT
IoT has brought new technologies and new devices (Smart Home). The usage of these smart home devices has seen very rapid growth over the past decade. Every new technology brings new features as well as new threats. This applies very much to IoT based smart home devices. Newer technologies resolved and fixed some of the existing security issues, but they brought in newer threats. More research is needed to address and fix new security threats.

8. References
Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems, 78, 544–546. https://doi.org/10.1016/j.future.2017.07.060

Frustaci, M., Pace, P., Aloi, G., & Fortino, G. (2018). Evaluating Critical Security Issues of the IoT World: Present and Future Challenges. IEEE Internet of Things Journal, 5(4), 2483–2495. https://doi.org/10.1109/JIOT.2017.2767291

9. Certification Page
Submitted to (Professor's Name): Dr. Zadok Hakim

Course: ITS 699

Student's Name: Bismit Pratapsingh, Dilraj Singh, Phani Teja Gorrepati, Raja Karki, Sabin Pandey, Umme Haani, Vinay Kumar Kotha, Vinay Nallapeta Gangarajaiah

Date of Submission: August 2, 2020

Purpose and Title of Submission: Security Issues with IoT Based Smart Home Devices

Certification of Authorship: I hereby certify that I am the author of this document and that any assistance I received in its preparation is fully acknowledged and disclosed in the document. I have also cited all sources from which I obtained data, ideas, or words that are copied directly or paraphrased in the document. Sources are properly credited according to accepted standards for professional publications. I also certify that this paper was prepared by me for this purpose.

Students' Signature: Sabin Raj Pandey

10. Short Bio
A person posing for the camera Description automatically generated Bismit Pratapsingh, live in the city of Louisville Metro area in Kentucky. He was born and raised in India, and his birth date is May 10. He has done his Master's in Business Administration (MBA) with a specialization in Information Technology (IT) from Sikkim Manipal University in India. Also, he has held out his Postgraduate in Labor Laws and Personnel mgmt. From Sambalpur University, Odisha, India. With the help of this course, He would like to expand his carrier, knowledge in Information Technology areas, which would directly or indirectly grow the industries. Currently, he is working as an Oracle ERP Architect in a commended organization where he is involving ratifying the Oracle ERP Application for his customers.

A person posing for the camera Description automatically generated Dilraj Singh was born in Punjab, India. He graduated with Bachelors's in computer science. He is working as a Test Engineer in Silicon Valley. His core skills are testing applications and software with java. He is also skilled in extracting and visualizing data using python and SQL. He is taking ITS-699 Master's ain a deep understanding of Information Technology.

A person smiling for the camera Description automatically generated Phani Teja Gorrepati was born in Vijayawada, India. He graduated with a Bachelor of Science degree from Andhra University, India. He is living in the United States for the past five years. He is currently working as an Application Security Consultant. He is skilled in vulnerability analysis and remediation in web applications and infrastructure components. He is taking ITS-699-01 to gain practical knowledge technologies and trends in Information Technology.

A person smiling for the camera Description automatically generated Raja Karki was born in Kathmandu, Nepal. He completed his undergraduate in Mathematics from Caldwellmaster'sity. He has worked in the IT field primarily as a Business Analyst. He has worked in a variety of domains, including mortgage, finance, and payment industry. With a Master's in Information Technology program, Mr. Karki aims to explore the strategies and analytics in the IT field, enhance his skills, and accomplish his career goals. He is taking ITS 699 to explore the functional aspects of the IT industry better and enhance his project management and presentation skills. Mr. Karki works as a Business Systems Consultant in a leading mortgage company.

A person wearing a blue shirt and smiling at the camera Description automatically generated

Meet Sabin R. Pandey – Born in Kathmandu, Nepal, on October 29 of 1991. He received Bachelors's in business administration from Pokhara University, Pokhara, Nepal. He took online courses for python, java, and Linux operating system. He then joined a master's degree in Information technology at The University of Cumberlands. He worked with the Banking Information system at the beginning of the career. He is now working with the Health Information management team at Alameda Health System in Oakland, California, since 2018. Also, for his self-project, he has built a continuous integration and continuous deployment (CI-CD) web page development system with various tools like GitLab, Jenkin, Java, Maven, Tomcat, and wants to make it bigger and better.

A person wearing a striped shirt and smiling at the camera Description automatically generated Vinay Kumar Kotha was born in Warangal, India, on January 17. He has an MBA in Leadership from the University of Findlay, Ohio graduated in 2008. He has another MBA in Finance from Kakatiya University, India graduated in 2004. Vinay Kotha has over 15 years of experience working in the Business Intelligence workiBachelor'sor companies in Auto, Health Care, Retail industries. Vinay Kotha also has trained over 700+ professionals in MSBI (Microsoft Business Intelligence) in various IT companies. Currently, he is working for a major automotive supplier. Vinay would like to use the knowledge gained in this course to use in his career and pursue a Doctoral degree.

A person looking at the camera Description automatically generated Vinay Nallapeta Gangarajaiah was born in Bangalore, India, and holds a Bachelor of Engineering degree from VTU University, India. He is an experienced Senior Data Engineer with a demonstrated history of working in the Information Technology and services industry. He is skilled in Big Data analytics, currently assisting data scientists in building recommendations and predictive models to improve the care provided to health care members.

A person standing in front of a fence Description automatically generated Umme Haani did her Bachelor's in Computer Engineering from Prince Mohammed Bin Fahd University in Saudi Arabia in 2017. She worked in Cognizant as a programmer analyst, and the work focused on the Pharmacy Benefit Management system for their client CVS. It involved work related to QA testing with selenium. She is currently pursuing a master's in information technology at the University of Cumberlands to leverage her skills and gain knowledge to establish a more well-defined career in IT for the future. She is looking forward to using all the skills learned throughout this program to make the world a better place in some form or the other.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Maths Master
Quality Homework Helper
Solution Provider
Coursework Help Online
Homework Master
Finance Homework Help
Writer Writer Name Offer Chat
Maths Master

ONLINE

Maths Master

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$47 Chat With Writer
Quality Homework Helper

ONLINE

Quality Homework Helper

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$45 Chat With Writer
Solution Provider

ONLINE

Solution Provider

I am a PhD writer with 10 years of experience. I will be delivering high-quality, plagiarism-free work to you in the minimum amount of time. Waiting for your message.

$21 Chat With Writer
Coursework Help Online

ONLINE

Coursework Help Online

I have done dissertations, thesis, reports related to these topics, and I cover all the CHAPTERS accordingly and provide proper updates on the project.

$28 Chat With Writer
Homework Master

ONLINE

Homework Master

I am a PhD writer with 10 years of experience. I will be delivering high-quality, plagiarism-free work to you in the minimum amount of time. Waiting for your message.

$24 Chat With Writer
Finance Homework Help

ONLINE

Finance Homework Help

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$39 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

HC3 Nursing shortage - College students need their sleep answers - University of bath campus map - Incompetent/Impaired Nurses= - What did dalton visualize atoms to be like - Employees beliefs in the degree to which they influence - Me talk pretty one day analysis - Braden scale score range - New shahadah classes in philadelphia - Prepare a year end balance sheet for armani company - Rossendale pet crematorium and memorial gardens - The pendulum consists of a uniform disk with radius - Writing a purpose statement for research - Is pso a gatekeeper - Why does the ku klux klan burn crosses - Unit 5 DB: Nature vs. Nuture - EH week4 DB - Andy naughton flash mind reader - Passage analysis to kill a mockingbird - Life magazine 1956 ideal modern woman - BCIS - Los angeles county chief executive office - Sociology W.E.B - Survival analysis techniques for censored and truncated data dataset - Plan and design a network infrastructure project - Electron configuration examples and answers - Milestone 2 - Asymmetric and Symmetric Encryption - Apply tort and criminal law irac case brief - Java bank account savings and checking - FIN/571: Corporate Finance - Ford owners be like stay the night bro - Coca cola company mission and vision statement - The supplies and supplies expense accounts at december 31 - Which objective focuses closest to the slide - 3rd order rate law - The statement system.out.printf("%10s", 123456) outputs ________. (note: * represents a space) - ABORTION CLINIC +27717852514 ABORTIONS CLINIC & ABORTION PILLS FOR SALE IN PRETORIA, MAMELODI, ATTERIDGEVILLE, SUNNYSIDE, ARCADIA, - Kath murdoch inquiry cycle example - Hey jack books kmart - Abc clio social studies - How to bend tattoo springs - Acrobat pdfmaker 17 for word - Table 2: balloon circumference vs. temperature - Describing a scene essay - Cardinal glass industries inc subsidiaries - The influence of leadership - Types of enthalpy change - Ccl2br2 polar or nonpolar - A critical feature of multiple-baseline designs is that: - Atp-pc cause of fatiguehamilton high school sa - Get your homework done for you - Audience analysis memo sample - Wk 3 Individual Assignment - Conduct and Present Project-Supporting Research (Rationale) [due Mon] - GB513-2: Apply Hypothesis testing and probability analysis to solve business problems - Agarose gel voltage per cm - Blueprint for better business - 923 - Designer baby scalisi vs ny univ medical center p 429 - It 210 milestone one - The monthly sales for telco batteries inc were as follows - Race class & gender in united states edition 9th - Virtual fly lab drosophila answers - Compare and contrast number the stars and miracle at midnight - 5 8 as a decimal and percent - Discussion redox reaction lab report - The other wes moore final paper - Laboratory assessment 4 cell structure and function - Glaciers lab answers - Nursing - Metal activity and reactivity oxidation and reduction reactions lab answers - Intro to biblical worldview - Is a drawing a primary source - Umbrella with built in fan from meridian point - 67 kilos equals how many pounds - Experimental research - Infosys intellectual property rights quiz - Linda albert cooperative discipline quotes - The “four ps” to consider in choosing a financial institution include product, price, people, and - 8 bit parity generator - Organic grains llc uses statistical process control to ensure - Week 6 - My mistress eyes are nothing like the sun poem - Introductory speech outline - Superstition in blood brothers - Industrial Control System Cyber Security - August osage county book review - 5 act structure tv - Memento anterograde amnesia - Planning the Project-2 - Parallel lines have the same slope but different y intercepts - Calculate number of vacancies per cubic meter - Hotels near buffalo state college - Cloud Computing - Lead scoring case study upgrad - Gainesboro machine tools corporation - Jayco electric awning problems - Justine flynn buster productions - All or nothing law - Ethics of Counseling (Christian Counseling) - Grantham university lawsuit