IOT security

Some security practitioners suggest that key IoT security steps include: 

1. Make people aware that there is a threat to security; 

2. Design a technical solution to reduce security vulnerabilities; 

3. Align the legal and regulatory frameworks; and

4. Develop a workforce with the skills to handle IoT security. 

Write 700 words in word document about following

1) Address each of the FOUR IoT security steps listed above in terms of IoT devices. 

2) Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Click for more options

discussion

 

Discuss the relationship between the Waterfall model, work breakdown structure (WBS), RACI chart, scheduling and cost, when a decision has been made to migrate to the Cloud.  Please be sure to explain why.  Do not forget to follow the discussion forum guidelines. Click for more options

ITM Capstone – Discussion 1

Question: 

How can one distinguish between an organizational weakness and a threat to the organization? 

Post should be 250 words. Add at least one reference in APA format.

Development Status-Security Design and Architecture/ 600 words/ 2 pages/ APA format

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

At the end of your textbook on page 385, the author mentions several “encouraging security architecture developments”:

  •  The Open Group has created an Enterprise Security Architect certification. One of their first certified architects has subsequently created a few enterprise security reference architectures. 
  • The SANS Institute hosted three “What Works in Security Architecture” Summits. 
  • The IEEE initiated a Center for Secure Design. The Center published a “Top 10 Design Flaws” booklet. 
  • Adam Shostack published Threat Modeling: Designing for Security, and renown threat modeler, John Steven, has told me that he’s working on his threat modeling book. 
  • Anurag Agrawal of MyAppSecurity has been capturing well-known attack surfaces and their technical mitigations within his commercial threat modeling tool, “Threat Modeler.”

Choose 2 or 3 three items from the list above and provide an update to their development status.  Make sure you provide some background on your selection and then provide the update of the development. 

Portfolio project

  • The Final Portfolio Project is a comprehensive assessment of what you have learned during this course.  
    The Final Project has two parts: Limitations of Blockchain and Emerging Concepts.
    Blockchain continues to be deployed into various businesses and industries. However, Blockchain is not without its problems.  Several challenges have already been associated with the use of this technology.  Identify at least 5 key challenges to Blockchain. Additionally, discuss potential solutions to these challenges. Lastly, please discuss if we will see the limitations to blockchain be reduced or mitigated in the future.  
    There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data and how they are being used.
    Conclude your paper with a detailed conclusion section which discusses both limitations and emerging concepts. 
    The paper needs to be approximately 6-8 pages long, including both a title page and a references page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.
    Your paper should meet the following requirements:

    • Be approximately seven to ten pages in length, not including the required cover page and reference page.
    • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
    • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

Emerging concepts & Tokenization

**RESEARCH PAPER**

There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 6-8 pages long, including both a title page and a references page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet these requirements:

Be approximately six to eight pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

**DISCUSSION POST**

This week we explored the concept of Tokenization.  Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols.

Paper

1. Identify the three main types of computer software that werediscussed in your unit lesson. Within the three main categories, give examples of each and a brief explanation of each. Each explanation/description category must be answered with at least 100 words. You must cite your sources within your answers.

MAIN TYPES OF COMPUTER SOFTWARE

EXAMPLES

EXPLANATION/DESCRIPTION

2. Write a 150-word essay on the importance of operating systems (OSs). Locate at least one article in the CSU Online Library and one article from an Internet search. You may also use the required readings to support your essay. You must cite your sources within your essay.

3. Identify three mobile OSs and three personal computer OSs. Explain advantages and disadvantages of each one. Describe each OS. The total wording for each OSdescription/advantages/disadvantages should be no less than 100 words. You must cite your sources.

OPERATING SYSTEMS

DESCRIPTION

ADVANTAGES

DISADVANTAGES

1.

2.

3.

4.

5.

6.

References