 3 Your Title Here Forename Surname Student ID MSc in Cybersecurity National College of Ireland Abstract The abstract goes here. Class aptent taciti sociosqu ad litora torquent per conubia nostra,...

1 answer below »
Files attached


 3 Your Title Here Forename Surname Student ID MSc in Cybersecurity National College of Ireland Abstract The abstract goes here. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos. Morbi rhoncus molestie magna ut consectetur. Suspendisse egestas ornare tortor vel ornare. Praesent tempus magna quis sem ullamcorper venenatis. Praesent feugiat auctor metus, nec suscipit erat faucibus quis. Nam efficitur auctor nisi, et ullamcorper nunc porta ac. Aenean ultrices mi at libero luctus, vel egestas mi sodales. Suspendisse elit odio, suscipit eget leo sed, sagittis sagittis justo. Vestibulum porttitor tincidunt tempor. Donec et diam eget ante mollis dignissim. Nam volutpat arcu sem, nec elementum augue porta ac. Nam rhoncus viverra mauris non ullamcorper. Integer nec neque ac arcu auctor ornare eget vitae leo. Table of Content I.Introduction1 II.Research Question2 III.Literature Review2 A.Research Niche2 IV.Research Methods & Specification2 V.Video Presentation2 VI.References3 Introduction This template provides authors with most of the formatting specifications needed for preparing electronic versions of their papers. All standard paper components have been specified for three reasons: (1) ease of use when formatting individual papers, (2) automatic compliance to electronic requirements that facilitate the concurrent or later production of electronic products, and (3) conformity of style throughout a conference proceedings. Margins, column widths, line spacing, and type styles are built-in; examples of the type styles are provided throughout this document and are identified in italic type, within parentheses, following the example. Some components, such as multi-levelled equations, graphics, and tables are not prescribed, although the various table text styles are provided. The formatter will need to create these components, incorporating the applicable criteria that follow. Figure 1: This is a caption. Research Question Lorem ipsum dolor sit amet, ut veri deleniti eloquentiam sea. Lorem ipsum dolor sit amet, ut veri deleniti eloquentiam sea. Lorem ipsum dolor sit amet, ut veri deleniti eloquentiam sea. Kune et al. [2] ad quidam regione percipitur, Literature Review Lorem ipsum dolor sit amet, ut veri deleniti eloquentiam sea [1]. Ea commodo aperiam complectitur pri, usu et case dolore. Kune et al. [2] ad quidam regione percipitur, est ut possit bonorum persecuti. Quis utinam o_endit eu usu, eu accumsan disputando per, id cibo reprehendunt sit [3, 4]. In melius legendos corrumpit pro. Research Niche Finish this subsection which contains a summary of all literature and an explanation of how your proposal is different as shown in Table 1. Col1 Characteristic 1 Characteristic 2 [1] Justo, vitae risus [1] Etur risus stu ed [2] stu ed risus [3, 4] stu ed risus [9] frozen risus Table 1: Summary of Literature Review and Research Niche Research Methods & Specification Lorem ipsum dolor sit amet, ut veri deleniti eloquentiam sea [1]. Ea commodo aperiam complectitusdr asdfasdfasd asdfsdf pri, usu et case dolore. Kune et al. [2] ad quidam regione percipitur, est ut possit bonorum persecuti. Quis utinam asdfsdfad o_endit eu usu, eu accumsan disputando per, id cibo reprehendunt sit [3, 4]. In melius legendos corrumpit pro. posidonium Eos dico dignissim voluptatibus et, duo nisl cibo ut. Diceret periculis posidonium cum eu. [4] regione posidonium posidonium nam ex. Vix id viris phaedrum. Pri augue cetero probatus ut. Video Presentation Lorem ipsum dolor sit amet, ut veri deleniti eloquentiam sea [1]. Ea commodo aperiam complectitur pri, usu et case dolore. Kune et al. [2] ad quidam regione percipitur, est ut possit bonorum persecuti. Quis utinam o_endit eu usu, eu accumsan disputando per, id cibo reprehendunt sit [3, 4]. In melius legendos corrumpit pro. Eos dico dignissim voluptatibus et, duo nisl cibo ut. Diceret periculis posidonium cum eu. [4] regione nam ex. Vix id viris phaedrum. Pri augue cetero probatus ut. References [1] G. Feng and R. Buyya, “Maximum revenue-oriented resource allocation in cloud,” International Journal of Grid and Utility Computing, vol. 7, no. 1, pp. 12-21, 2016. [2] R. Kune, P. Konugurthi, A. Agawarl, R. R. Chillarige and R. Buyya, "The anatomy of big data computing," Software—Practice & Experience, vol. 46, no. 1, pp. 79-105, 2016. [3] A. Beloglazov and R. Buyya, "Openstack neat: A framework for dynamic and energy-efficient consolidation of virtual machines in openstack clouds," Concurrency and Computation: Practice and Experience, vol. 27, no. 5, pp. 1310-1333, 2015. [4] D. G. Gomes, R. N. Calheiros and R. Tolosana-Calasanz, "Introduction to the special issue on cloud computing: Recent developments and challenging issues," Computer & Electrical Engineering, vol. 42, pp. 31-32, 2015. Microsoft Word - H9RSC_RProp-description.docx Research in Computing Continuous Assessment 2 (MSCCYB1) Dr Babak Habibnia Administrative Data This second Continuous Assessment (CA) is worth 80% of the nal grade awarded. As published in the School portal, the deadline for submission of the assignment is: Wednesday 11 th August 2021 23:59hrs Extension/Re-run Should any student miss the assessment deadline with a valid reason, the student can apply for an extension/rerun using the Extension/Re-run Form online, via NCI360. N.B. All submissions will be electronically screened for evidence of academic misconduct (plagiarism and collusion). 1 Module Introduction It is expected that the knowledge and skills gained from the module will contribute to scholarship and to the generation of innovative solutions to intuitive research questions. Speci cally, the learning outcomes of this module are: LO1 Understand what constitutes a good research question. Propose a research question and identify its implications with regard to the choice of subject. LO2 Propose research objectives and identify possible deliverables. LO3 Create a literature review which situates the work with regard to state of the art and seminal work. Develop a research and development design and methodology. LO4 Critically assess and select methods for addressing the research question, including originality considerations. LO5 Show an awareness of the ethical issues that need to be addressed when conducting research. LO6 Understand the need for reproducibility as a minimum standard for assessing the validity of the results of research. LO7 Demonstrate an ability to write a comprehensive research plan that explores research methods and deliverables for a speci c subject in computing. 1 2 Assignment 2.1 Research Proposal This assignment must include the following components: Title Choose a title that encompasses the speci c topic within the area chosen. Abstract Renders a summary of your proposal and therefore should introduce the topic, state what was carried out, and outline the key points. It should be 150{200 words. References are not cited in an abstract. Contents Table Enables the reader to easily nd the information they require. It should be automat-ically generated by Microsoft Word or L A TEX. Introduction Should provide information on the background to the topic. This section must: • present the general context of your question within the sphere of Cybersecurity; • clearly identify the research question(s) and de ne the key terms; • motivate the purpose of the literature review | why is it important to research the chosen topic? • outline what the general ndings of the review are | this is where you can give the key element of your argument; and, • describe the structure of your document |- give the exact headings of each section and outline the key argument points you will be making in each section. This section should be 1-2 pages in length. Research Question Phrase your research question addressing the speci c topic and the measurable side. Explain why this question is worth investigating and how it will contribute to knowledge in the eld of research. Describe why the question is feasible (tools), clear (measurable), signi cant, and ethical. This section should be maximum 1 page in length. Literature Review Must compare, contrast and relate to previous work, en0umerate the objectives of the previous work and specify their foreseen contributions. This section must: • introduce each previous work by outlining the key argument points that you will be covering; • nish each subsection with a brief conclusion of what have been covered in the previous work and then link to the next subsection by outlining what you will be discussing next; • present a logical order of the reviewed previous works; • critically contrast at least two previous works in each paragraph, as opposed to just ‘reciting’ what the previous work say. Every paragraph should explain the signi cance of the previous works are in the context of your own research question; • ensure there is consistent referral back to the research question {{ do not be afraid to consist- ently remind the reader why a point is relevant in the context of your own question; and, • Make sure the previous works are properly cited. Overall the literature survey should not consist of a series of paragraphs beginning, ‘Jones/Smith argues....’. Focus upon concepts, issues, cases, with reference to authors, and then critically contrast them, clearly highlighting advantages and shortcomings. The literature review must nish identifying the research niche and the expected contribution of the research. This section should be between 4-6 pages in length and contain some 20 references, mostly using recent academic articles from reputable journals (JCR Impact Factors) and/or conferences (Aus- tralian CORE ranking: http://portal.core.edu.au/conf-ranks/). The complete list of computing databases and journals is available from the NCI Library at: https://www.ncirl.ie/Library/ NCI- Library/. Continuous Assessment 2, Research in Computing. Page 2 Please include
Answered 12 days AfterJul 24, 2021

Answer To:  3 Your Title Here Forename Surname Student ID MSc in Cybersecurity National College of Ireland...

Neha answered on Aug 05 2021
144 Votes

3
Cybersecurity in IoT
Forename Surname
Student ID
MSc in Cybersecurity
National College of Ireland
Abstract
We are already aware about the increasing threat in the cybersecurity and now the cyber security has become one of the most important area in the Internet of Things. The reason of having cyber security in Internet of Things is to reduce the sample security risk for the users and organisations by providing protection to the assets of IoT and the privacy. There are many ne
w security technologies and the tools which are useful in providing potential to have better security management of the IoT. Still there is lack of effective IoT cyber risk management framework for the managers. In this research paper we will review the IoT cyber security technologies and the cyber risk management frameworks. This paper also shows a four-layer IoT cyber risk management framework.
Table of Content
I.    Introduction    2
II.    Research Question    2
III.    Literature Review    3
A.    Cybersecurity in IoT Architecture    3
IV.    Research Methods & Specification    4
A.    The Four-Layer IoT Cyber Risk Management Framework    4
B.    IoT Cybersecurity Technology Developers    5
V.    Video Presentation    6
VI.    References    6
Introduction
The Internet of Things has already introduced a new paradigm according to which the network of the devices and machines are capable of collaborating and communicating with each other and they are able to drive new process innovations in the organization. But there has been ever increasing and pervasive cyber security attacks to the io systems which has caused wide range of issues for the people and organization in terms of compliance, business operations, finance and the reputation. There has been rapid increase in the cyber-attacks and reason for this is sudden growth of IoT devices in different areas like environmental monitoring, smart manufacturing, logistics, patient monitoring systems and smart grids.
The security management in the IoT environment is very challenging because it has transient and dynamic nature for having the connection between devices, resource constraint and the diversity of the characters which are capable of interacting with in the environment of IoT systems. The worldwide IoT security market is also expanded to expand at the 33.7 percentage off the compound annual growth rate between 2018 to 2023 because there was increase in the number of cyber-attacks on the IoT devices, rising security concerns and the growing IoT security regulations. As per the recent survey reports the IoT based threats will become more impactful and widespread and the senior management have to pay more attention towards the risk which are related with IoT department.
The 35% of the survey report on participants says that they have security strategy and the 28% of the report says that they have implemented it. As per another survey it shows that 80% of the organizations have already experienced cyber-attacks on the IoT devices in the recent years. It was also found that 26% of the organisations do not use end a security protection technology in their organization. As per these two surveys it can be demonstrated that there are many security limitations on the IoT devices, and the organization needs to move proactively for investing in the cyber security of IoT. The IoT devices have weak security measures but there has been no appropriate method for the existing risk assessment, and it is not possible to do for the dynamic systems like the IoT.
For example, the current risk assessment methods are not designed sufficiently for having the assessment off medical IoT systems regarding cyber security risk and they have the complexity which is exposed for wide attack points. We can develop the IoT systems around the standard platform which can help the organizations to develop IoT security measures without having any increase in the cyber risk. The major reason of having IoT cyber security issue reduce the overall cyber security risk in the organization and users can also have protection for the assets of IoT and keep the data private. The cyber security technologies are also emerging constantly, and they are providing new challenges and opportunities for the cyber security management of IoT. There have been many studies which have focused on the technological aspect of the cyber security IoT. But still there is lack of the comprehensive risk management frameworks which can address the complex security issues which are already present in the IoT system. There has been a backdrop gap in the IoT cyber security risk management and this paper has a literature review on the security technologies which are present for IoT and the cyber risk management frameworks. It shows the development of four-layer IoT cyber risk management framework.
Research Question
What are the cyber security issues present in IoT environment and system and how it can...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here