Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!
loader

Phone no. Missing!

Please enter phone for your order updates and other important order related communication.

Add File

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!

SIT382 System Security

tag 0 Download 8 Pages / 1,979 Words tag 09-07-2021
  • Course Code: SIT382
  • University: Deakin Business School
    icon

    MyAssignmentHelp.com is not sponsored or endorsed by this college or university

  • Country: Australia

Question:

In recent decades, the development of Internet and communications technologies has introduced a virtual world to everyone’s daily life. In this virtual world, people are able to do a large number of activities similar in the real world. Subsequently, a question is raised, which is how to build a bridge between the real and the virtual world. To answer this question, an innovative technology has been studied for many years and now is being widely used, which is called Internet of Things (IoT). By taking the advantages of affordable sensors and wireless communications, the sensor
networks are capable of digitising human activities in the real world, which can be utilised directly in the virtual world.

However, from the security point of view, IoT is not flawless. Actually, a large number of security issues can also be observed in IoT system. Consequently, not only the IoT system will be attacked, but end users’ privacy will also lose. Therefore, in recent years, the security and privacy issues in IoT have been a hot topic in research field.Below is a list of possible essay topics. In this assignment, you are required to complete an essay relating the security or privacy problem, consisting of 1500-2000 words (at least 4 pages, single spaced, 12pt fonts, on a normal A4 paper) on one of
these topics.

Possible essay topics
1. Security in IoT. In this essay, you investigate specifically the security problem in the context of IoT. You need to describe why security issues exist in IoT and what types of security issues are commonly observed. You then select a
security issue and analyse it in detail. After that, you describe and compare existing methods to defend against and solve the security issue according to some criteria, such as effectiveness and cost of deployment. Alternatively, you
can propose a new or improved method or technique to defend against or solve the security issue and describe the effectiveness of your method / technique.

2. Privacy in IoT. In this essay, you investigate the other problem, namely the privacy issue, in the context of IoT. You need to describe why privacy problems exist in IoT and what kinds of privacy information is more likely to lose in IoT. You then select an attack that may lead to the loss of privacy and analyse it in detail. After that, you describe and compare existing methods to defend against this attack according to some criteria, such as effectiveness and cost of deployment. Alternatively, you can propose a new or improved method or technique to defend against the attack and describe the effectiveness of your method / technique.

Sometimes diagrams and examples may help you to explain your thought. You mayreceive some bonus marks if you propose new architecture, method, algorithm, technique, etc. However, these proposals will be closely examined by the assessor. You need to make sure (e.g., prove formally or informally) that your proposal is correct and meets your design goals (for example, improves the performance, be more secure, or be more scalable). 
Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

Upload
Unique Document

Document
Under Evaluation

Get Money
into Your Wallet

Total 8 pages

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). System Security. Retrieved from https://myassignmenthelp.com/free-samples/sit382-system-security/several-security.html.

My Assignment Help (2021) System Security [Online]. Available from: https://myassignmenthelp.com/free-samples/sit382-system-security/several-security.html
[Accessed 05 December 2022].

My Assignment Help. 'System Security' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/sit382-system-security/several-security.html> accessed 05 December 2022.

My Assignment Help. System Security [Internet]. My Assignment Help. 2021 [cited 05 December 2022]. Available from: https://myassignmenthelp.com/free-samples/sit382-system-security/several-security.html.


Stuck on Any Question

Our best expert will help you with the answer of your question with best explanation.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

Phone no. Missing!

Please enter phone for your order updates and other important order related communication.

loader
250 words
Error goes here

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

We Can Help!

Get top notch assistance from our best tutors !
Excel in your academics & career in one easy click!

icon

Other Samples

Content Removal Request

If you are the original writer of this content and no longer wish to have your work published on Myassignmenthelp.com then please raise the content removal request.

icon

5% Cashback

On APP - grab it while it lasts!

Download app now (or) Scan the QR code

*Offer eligible for first 3 orders ordered through app!

screener
ribbon
callback request mobile
Have any Query?