Introduction
The Internet of Things (IoT) is not a new paradigm; the technological capabilities of society have enabled its immense progression and increased utilisation. Increasingly, there are applications of these varying Internet-enabled ‘things’ in everyday life including automation of many day-to-day operations, healthcare, data analytics, smart buildings, and wearable technology. Worryingly, with IoT devices, practically anything can be connected to the Internet or to another ‘thing’– in many instances we are creating our own problems and a larger attack surface with inherent underlying security issues. For security, “one size fits all” does not work for the complex IoT ecosystem - interoperability issues are important. Secure by Design, Default and in Deployment is imperative in future implementations of such interconnected ‘things’.
You are introducing a new smart device into your network but want to ensure the current network has no vulnerabilities. You are to design and implement a security application to find out information about the network that may be useful for an attacker, and then create a security policy for the network. Device security, network security and introducing future ‘things’ should be considered.
Learning Outcome to be assessed
1. Critically evaluate a complex computer security problem.
2. Apply complex skills relating to security techniques and tools to secure a computer system.
Details of the task Part 1: Implementation
In order to assess the viability of the network in its current form, create a program (in Java) that comprises the following functionality:
• Allows the user to scan for devices on the network
• Identifies port information and socket information (e.g. domain, type, protocol, hostname)
• Saves all information to a file that is encrypted/decrypted with a password
• Include guidance for user of the program
Part 2: Design
• Detail your design and implementation choices including encryption method used
• Consider ways upon which your tool could be extended to include further features
Part 3: Security policy
• A Security policy is a statement that partitions the states of a system into a set of authorized or secure states and a set of unauthorized or non-secure states. Now that you have created a program that can find out network information, create a security policy to ensure the network information found by the program are secure, and also focus on ensuring future ‘things’ being introduced into the network are secure.
DescriptionIn this final assignment, the students will demonstrate their ability to apply two ma
Path finding involves finding a path from A to B. Typically we want the path to have certain properties,such as being the shortest or to avoid going t
Develop a program to emulate a purchase transaction at a retail store. Thisprogram will have two classes, a LineItem class and a Transaction class. Th
1 Project 1 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of
1 Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of