Assessment Brief
1.) The Internet of Things (IoT) is based upon emerging applications of technologies. A number of security researchers have expressed concerns that this blending of emerging technologies with the Internet will provide new opportunities for cyber criminals and terrorists. Pick one of the emerging applications of technologies that belongs to the Internet of Things (see the readings and videos for this week) and research how it can be attacked by bad guys. Using the security criteria from the five pillars of information assurance, write a 250+ word analysis of the risks and vulnerabilities associated with your chosen technology. The five pillars are: confidentiality integrity availability authentication nonrepudiation Remember to cite your sources using APA format in-text citations and include an APA format reference list at the end of your response posting.2.)The International Telecommunications Union (2005) report described four categories of technologies which can be linked together to form an Internet of Things.Enabling Technologies:1. Tagging things: RFID and similar technologies2. Feeling things: Sensor technologies3. Thinking things: Smart technologies4. Shrinking things: NanotechnologyChoose one of these categories.What are the leading technologies in your selected category?How do they contribute to the Internet of Things?What types of privacy or security concerns surround the technologies in your selected category?Your initial posting should be 250+ words and be supported by citations and references in APA format.ReferenceInternational Telecommunications Union. (2005). ITU Internet reports 2005: The Internet of things [Executive Summary]. Retrieved from http://www.itu.int/osg/spu/publications/internetofthings/InternetofThings_summary.pdf3.)NIST provides standards that are followed by organizations. These standards are developed from working groups that include experts from industry, government, academia, and military.Go to http://www.nist.gov . Select publications.Search to find NIST Special Publication 800-53 revision 4 (link provided in webliography).In the publication, review the various security controls used to protect the infrastructure.Choose 3 security controls for discussion on securing an industry system that is developed to track legal documentation and to retrieve e-discovery documents.Which controls did you select? How will these controls protect the system? Why did you select these three?Write one thorough paragraph on security control policy that includes the answers to the above questions.4.) From Chapter 6 of your readings this week (ATTACHMENT BELOW), answer the followingIdentify 3 examples each of personnel security, physical security, and privacy protection. National%20Security%20RAND.pdf
How it works — order in under 2 minutes
Describe your paper
Topic, word count, deadline, citation style
Get matched instantly
We find the best writer for your subject
Receive your paper
Download, review, and request revisions free
Money-back guarantee · No commitment