7026CEM Security of Emerging Connected Systems

    Need Solution - Download from here

    7026CEM Assignment Help

    Security of Emerging Connected Systems Assignment help

    Task and Mark Distribution
    In this report you are required to review and critically analyse a
    security issue in an IoT Device. You will discus the issue itself, thesecurity policy decisions that lead to the breach, and the legal factors involved.

    For this coursework you are required to research a
    IoT based security issue, and report on it. You are free to pick a securityincident of your choice, as long as it is related to connected systems. Some examples include:
    Ring Doorbell, leaking information to third parties. https://www.eff.org/deeplinks/2020/01/ring-doorbell-app-packed-third-party-trackers

    Mirai Botnet targeting IoT Devices. https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis
    TRENDnet webcam issues https://insuretrust.com/2017/12/18/security-vulnerabilities-discovered-security-cameras-routers/
    The report should contain the following section.
    Discussion of Issue (40%)

    In this section you are expected to discuss, and the issue that you have chosen. You should research the topic, and make use of theliterature to support the claims and statement you make.
    Provide an overview of the problem, and its impact.
    You are also expected to discuss the causes of the problem. What was it that caused the security flaw? How were attackers able to exploitit. You should analyse the flaw in the wider security context, for example how it would fit into the OWASP top 10.

    You should discuss the impact of the security flaw on the organisation and customers. For example, what information was made availableby the hack? What was the extent of the data breach or exploit.
    Discussion of Laws and Legal Factors (50%)
    Attacks on IoT Devices often leak PII, discuss the legal background attack you have chosen.
    What laws, regulations, in UK and US that are concerned with such leakage. Consider legal aspects, penalties, legal implications, and thelegal consequences on the related parties; the attacker, the system developer or vendor, the distributor (e.g. re- seller) and the end user.

    UK Law understanding and coverage: coverage of all applicable legal aspects and a demonstration of a good understanding of therelevant legislation and the applicable legal consequences or penalties resulting from the legislation.

    International Law understanding and coverage for both pieces: coverage of key aspects to be considered and the applicable legalconsequences or penalties.
    Style (10%)
    Your Report should be suitable for
    non-technical management
    , and make use of appropriate structure and language.
    are expected
    to use references to support the arguments and analysis you make.

    By |2023-03-08T10:20:04+00:00March 8th, 2023|Categories: database|Tags: |0 Comments

    Leave A Comment