question archive How to Protect the Internet of Things (Due 30 July) (6 Pages) (5 References) Requirements: 1) APA 7th Ed format (to include introduction and conclusion) 2) Due 30 July 3) 6 Page minimum (not including title page and APA references) 4) Minimum of 5 References 5) Plagiarism-Free Background/Required Reading/REQUIRED References: The Internet has grown faster than any telecommunications system in history continuing to grow and become more ubiquitous
Subject:Computer SciencePrice: Bought3
How to Protect the Internet of Things (Due 30 July) (6 Pages) (5 References)
Requirements:
1) APA 7th Ed format (to include introduction and conclusion)
2) Due 30 July
3) 6 Page minimum (not including title page and APA references)
4) Minimum of 5 References
5) Plagiarism-Free
Background/Required Reading/REQUIRED References:
The Internet has grown faster than any telecommunications system in history continuing to grow and become more ubiquitous. This is particularly true with the advent of 5G networks. These networks are attractive targets for intruders. The Open Systems Interconnection (OSI) model and the standard of communication built on the TCP/IP protocol coupled with the everywhere computing in all types of devices enabled by 5G will fundamentality change our society. We must face this with clear security safeguards and thought into the implications of this for society.
We live in a networked society, yet many are naive about how to protect the security of the information we exchange and store via this network. The pervasiveness of the networked culture often leads to patterns of behavior where we may engage in risky data behavior whether it is personal or work-related information that is networked. The purpose of this assignment is to raise your awareness of these issues and how to begin to safeguard your networked systems.
First you will read the ACM code of ethics: (Required Reference): http://www.acm.org/about/code-of-ethics
While you see that this code of ethics was adopted in 1992, the network security violation events continue to occur.
(Required Reference): http://media.techtarget.com/searchSecurityChannel/downloads/security_computing_chapter.pdf
Assignment:
Write a 6-page paper, to include introduction, body, conclusion, addressing the following scenario in your paper:
How can you as the network administrator use network security principles to protect networked systems; specifically address this in the context of networks of the Internet of Things with the potential to monitor every action of our daily lives and to replace many jobs with robotic controls. How will these systems be secured? How might 5G be used to threaten or secure these networks? You will use the principle of Defense in Depth https://www.youtube.com/watch?v=eOI2aM9P7-c where you use routers, firewalls, intrusion detection systems (IDSs) and intrusion prevention systems (IPSs).