Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

· The report must be written using a single-spaced, 12-point Times-Roman font an

ID: 3917016 • Letter: #

Question

·         The report must be written using a single-spaced, 12-point Times-Roman font and a minimum of four pages.

·         Identify and research three current trends in computer networking. Each technology must be related to the networking field. The technologies selected must be current, meaning current to the industry within the past three years.

·         Your report must contain the following sections. Each section must be a minimum of 4 paragraphs that discuss each trend/technology identified.

·         Technologies that will not be accepted are listed below. The topic selected must be a current technology in the field of networking. This technology must be a networking technology within the last three years. Check with your instructor if you are unsure of the topic.

IoT or anything related to IoT

Virtualization

Software Defined Networking

Cloud Computing

1.       Introduction/Background of Application

2.       This report must use proper grammar and be spell-checked.

3.       Current Industry Uses

4.       Features and Functionality, and Application of each technology.

5.       Advantages/Disadvantages of Each Technology

6.       Summary of what you learned as an outcome of this course and your research.

7.       Conclusion - Must include a Self-Reflection of what you learned as an outcome of this course and your research.

Explanation / Answer

IOT

Answer)

IoT is Internet of things which is a network of devices which are connected to each other and to a network and/or to the internet from where the user can remote control each device. IoT is mainly important to connect many devices such as home appliances, electronics and other devices where in these appliances or objects are connected to each other in a network through networking software, sensors and actuators being used. Now, these devices connected on the network can be used to connect and exchange the data and also the devices can be remotely controlled from another location giving the user unlimited flexibility and usage statistics and status of the devices.

Now there are some critical Information Security challenges in case of IoT networking and technology such as:

a) Relying on the devices capability and how they can keep the data flowing to them secret is a concern for IoT devices. Devices will be controlled remotely in many cases and thus there maybe several points where the network can be attacked and compromised.

b) Updating all devices to ensure that the security vulnerabilities cannot affect the network is a problem currently.

c) As all the data is cloud-based and IoT is connected to the cloud, this brings us to the insecurity of the Internet where an attacker can attack the IoT network and control our devices.

d) Privacy of the data and the integrity of the IoT network is another concern.

e) Consumers do not realize the graveness or the security requirement of the devices or the network when their devices connect to the internet. Relying on the IoT is ok, but they should be aware of the risks and how to evade the risks through proper measure.

Also, there are many new IOT networks introduced in many countries. The security risks for OS runs on IoT devices on the sigfox, LoRa, NB-IoT wireless technologies are immense. There are many actions and potential solutions available through existing technologies which could try to address the security risks to begin with:

a) Cyber theft prevention - Prevention of cyber threats and other measures to block the URL attacks, identify the cyber threats and mitigate them for proper functioning of the IOT devices and network.

b) Hardware security - Hardware security can be achieved by Trusted Platform Modules (TPMs) and Trusted Execution Environment (TEE). TPM is a chip which is installed on an IOT device for cryptographic operations, and thus ensuring the integrity, encryption and protection of the data in the IOT. TEE is an execution platform which ensures the integrity of the applications on the IOT and also protect the data storage separating the operational capability from the security capability.

c) Blockchain-based security - Blockchain-based security can be used in authentication in IoT networks and secure functionality in IOT networks as it works in peer-to-peer communications. As Blockchain is distributed and security concept of non-repudiation is thus supported here. Thus Blockchain-based security can be also implemented in IOT network security.

For a security system of a company several devices such as cameras, DVRs (for CCTV recording), TVs, and other devices are connected via IOT. Security of these IOT devices is a big concern. There are several steps you can undertake to ascertain the security of these devices such as:

a) Connect only required devices to the IoT network and not just connect any devices to the network. Ascertain their usage and purpose.

b) Create strong and separate password for every device separately.

c) Turning off Universal Plug and Play (UPnP) to protect the cameras and other devices from attacks.

d) Making sure that you are running the latest software and firmware updates and the system has the current security updates and patches.

e) Look for cloud services which provide better encryption and data protection.

f) Tracking and analyzing the devices and the data and the proper functioning of the devices.

g) For better and efficient security and management and data security, we should not attach personal devices on the IoT network.