Mn502 Overview Of Network Assignment Answers

1. Literature review on Internet of Things.
 
You need to write literature should be supported by at least three papers chosen from the current state of the art. 
 
2. Analyse critically, three current or future security issues in IoT.
 
In this section you will analyse critically, three security issues in Internet of Things. These issues could be taken from the current state of the art or could be evolved from your own independent innovative thinking.
 
3. Propose a possible solution for one of the threats identified in section.
 
In this part you need to apply knowledge to the existing knowledge domain of IoT. You need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue. 

Answer:

Introduction

  • The project is about the Internet of Things.
  • Internet of Things is the very significant topic in this modern era. IoT is the basic concept for the ability of the devices which are connected in the network for the data collection.
  • The Internet of things that are used in the field of manufacturing for the commercial purpose is known as the "Industrial Internet".
  • IoT has been invented from the convergence of the wireless technologies, microservices and the mass network called Internet. 

Literature Review

  • According to (J.Lin, 2017), the latest innovations of the IoT like internet connections and birth of mobile phones is called the first phase of the Internet of Things. An increased number of objects are connected physically with in the network.
  • According to (o.Flauzac, 2016), the IoT is the reason for the raise of the adhoc network.This paper conveys that the Internet of Things do not have ability in the process of routing over the network. The Software defined network is the controller that can be used to manage the traffic of the network.
  • K.Sood, 2016 says that the interest among the people using the Internet of Things is to simplify the controls of the network that are wireless. For this simplification process, the Software Defined Network Architecture can be used.
  • According to (Z.Qin, 2017), the interest in the Internet of Things has been increased. This interest leads to the deployment of the subnetworks. This gives a novel view among the process and the resources that are being used in the IoT. 

Security Vulnerabilities of Lot

  • Vulnerability is the weakness that is found in the system. This weakness can be due to hardware failure, software problem or due to human errors. The Vulnerability in the security of the Internet of Things can be in two aspects called Physical aspect and in the Network aspect.
  • Vulnerabilities in physical aspects include all the hardware failures or technical failures that  occurs in the Network.
  • Vulnerabilities in Network aspects include the attacks that are encountered by the hacker of the network. 

Vulnerabilities in Physical Aspects

  • The lack of security because of the hardware or software are as follows,
  1. Smart Device Knock Off
  2. Malicious Hardware installation
  3. Replacement of the Firmware 
  4. Physical Information Hacking
  • Malicious Hardware Installation is considered to be the major vulnerability in the physical aspect.
  • The hacker installs the malicious code inside the hardware devices like mp3 players. The user once they connect the player with the system, the malicious code in the player hacks all the information that are stored in the user’s system.
  • Firmware replacement is the hacking process which replaces the firmware of the user and it downloads something which has the malicious software embedded in it. Antivirus could not locate this type of firmware replacement. 

Vulnerabilities in the Network Aspects

  • Eavesdropping
  • Man in the middle Attack
  • Routing Attacks
  • DoS or DDoS Attack
  • Among the above mentioned Network Aspect Vulnerability, DoS or DDoS is considered to be the most commonly used hacking in the Internet of Things. 
  • Denial of Service Attack is one of the attack in the aspects of the network in which the attacker aims to steal the resources of the network like bandwidth and the network throughput.
  • They just want to shut down the service of the system.
  • The attacker even do not want the information, but he wants to restrict the access of the information by the user.
  • DDoS is the Distributed Denial of Service attack that is same as DoS but it is done in the distributed network. 

Threat Mitigation Technique 

  • Threat is nothing but the vulnerability.
  • Threat mitigation technique is used to reduce the threats that are found in the Internet of Things.
  • The DDoS is found to be most common attack in the network. So the mitigation tips for the DDoS attacks are as follows,
  • Users have to set strong passwords and they need to impose locks in the network devices
  • The unused or old applications should be cleared periodically.
  • Always keep track of the storage process of the system, that what are the information stored by the system.
  • Makes changes in the home router configuration settings.
  • Make sure that the IoT device is secure before purchasing it.
  • These are the preventive measures to mitigate the Distributed Denial of Service Attack. 

Conclusion 

  • The recent innovations and creations in the Internet of Things paves its way in this modern era.
  • The life style has been enhanced by the usage of the smart devices and making the home as a smart home.
  • In few more days, the Internet of Things will make more automations in everything that we use in our daily life.
  • Internet of Things is one of the boon to the society until it is used in an appropriate way.

Buy Mn502 Overview Of Network Assignment Answerss Online

Talk to our expert to get the help with Mn502 Overview Of Network Assignment Answers Answers from Assignment Hippo Experts to complete your assessment on time and boost your grades now

The main aim/motive of the finance assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignment help Australia. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at www.assignmenthippo.com are so much skilled, capable, talented, and experienced in their field and use our best and free Citation Generator and cite your writing assignments, so, for this, they can effectively write the best economics assignment help services.

Get Online Support for Mn502 Overview Of Network Assignment Answers Assignment Help Online

Want to order fresh copy of the Sample Mn502 Overview Of Network Assignment Answers Answers? online or do you need the old solutions for Sample Mn502 Overview Of Network Assignment Answers, contact our customer support or talk to us to get the answers of it.

Assignment Help Australia
Want latest solution of this assignment

Want to order fresh copy of the Mn502 Overview Of Network Assignment Answers Answers? online or do you need the old solutions for Sample Mn502 Overview Of Network Assignment Answers, contact our customer support or talk to us to get the answers of it.