2)Download and review Symantec’s ” Internet Security Report 2019”
Look over the sections concerning IoT. Summarize these findings in a report and address these additional questions.
•What was the most ‘disturbing’ fact (to you), in the section concerning IoT and why?
•What types of safeguards and controls should be implemented to mitigate some of the IoT threats?
•Are these issues or sloppy implementation of a technology, please explain.
•Using the Internet, find three additional resources that either confirm or deny the results outlined by Symantec.This is a written description so both opinion and fact matter.
3)Create threat model of a smart watch; Samsung, Apple or any other brand. Determine the vulnerabilities and possible threat associated with these devices. Draw out the flow of communication, and use this to think about possible vulnerabilities and threats.Document how we keep these devices safe?Start with drawing out the flow of communication and then look at the possible vulnerabilities of these devices.Create a formal document of your finding, include a screenshot of the diagram within the document.
These solutions may offer step-by-step problem-solving explanations or good writing examples that include modern styles of formatting and construction of bibliographies out of text citations and references. Students may use these solutions for personal skill-building and practice. Unethical use is strictly forbidden.A literature survey made by Dias and Ferreira has identified two groups of methodologies that are currently used for IoT development activities: mash-up approaches and model-based approaches. Additionally, the potential of Visual Programming use was also investigated. Each of these directions lacks on models at runtime and do not address the broad range of IoT specificities (Dias & Ferreira, 2018). In another chapter of the same work, the existing testing methodologies for IoT were also investigated. The major identified issue is the lack of testing tools for distributed and heterogeneous systems that can perform the operations automatically. Starting from the conclusions of the aforementioned work, it can be said that IoT development must be first standardized in order to obtain the desired results. Even if it is not possible to use the same process development methodologies as for non-IoT software projects, there are adaptations of those models that must be attempted. In fact, the management and operations involving the IoT components and devices can be divided into steps that are similar to the phases met in the life-cycle of other complex information systems. The goals are the same compared to non-IoT environments, but the implementation/development details differ. For instance, the security assurance remains a core objective in IoT. The identification of applications and vulnerability classes might determine a lifecycle management focused on security goals....
By purchasing this solution you'll be able to access the following files: