A.Opening a file in read mode performs which operation? a. Creates a new file b. Reads consecutive characters from a file c. Reads all the content of a file ….
Analyse and discuss the IoT security , IoT attacks and the significance of IoT security that is marked for 5% of the total marks and the second part, part B, is an extension of first part along with IoT Potential threats, IoT recent attack and mitigation tools.
assignment 1, part A, focuses on the Analyse and discuss the IoT security , IoT attacks and the significance of IoT security that is marked for 5% of the total marks and the second part, part B, is an extension of first part along with IoT Potential threats, IoT recent attack and mitigation tools. Students have to submit the first part by the end of week 3. Once the first part is marked and a constructive feedback is provided, the responses to the comments/feedback has to be tabulated and appended to Assignment 1b that would be submitted in Week 8. In the era of the Internet of Things (IoT), a massive volume of sensor devices collects and/or generate various sensory data over time for a wide range of ?elds and applications. However, the varied nature of devices and protocols in use, the sensitivity of the data contained within make security for the IoT a growing research priority and industry concern. With many security practices being inappropriate due to their resource limitation, it is deemed important to include second line defences into IoT networks. These systems will also necessity to be evaluated for their ef?cacy in a diversity of different network types and protocol. An IoT attacks continues to be a serious threat to the IoT ecosystem users. Assume you have an interview for the cybersecurity analyst position with Regal Security Solutions Company. You are supposed to be prepared about the IoT attacks, their types, threats, and mitigation techniques. In this context write a report including the following sections, Part A and Part B: Part A: Recent IoT Attacks and Security Principles In this part of the assignment, select any three of the IoT recent attacks (which happened in the years 2016-2020). Carry out an in-depth literature review about these three attacks. Your discussion must address the following points with proper in-text citations. A. Introduction about IoT security, IoT attacks and their impacts on the society B. Discussion of any three of IoT attacks which happened in the years 2016-2020. C. Identify and discuss the main reasons for these select IoT attacks being successful. D. Report the importance of key terms in the information security: asset, threat, threat actor, vulnerability, attack vector, attack surface in the context of these attacks. E. The working mechanism of the selected IoT attacks. Part B: Attack detection and mitigation in IoT In this part of the assignment the student will reflect on the feedback for Part A and discuss how did it help him/her to accomplish the tasks for the assignment Part B. In this part student will write report discussing following sections: A. Potential threats posed by IoT attacks. B. Case study of at least one recent attack carried out by the IoT attacks. C. Analyse how could these attacks, selected from part A, could be mitigated.