question archive ICA  SPECIFICATION (Element 2) INCLUDING MARKING & GRADING CRITERIA   Introduction                                                                                                                                                                                                                                       You need to do a layer-wise component and security analysis of a selected IoT application and make a report of process (approx

ICA  SPECIFICATION (Element 2) INCLUDING MARKING & GRADING CRITERIA   Introduction                                                                                                                                                                                                                                       You need to do a layer-wise component and security analysis of a selected IoT application and make a report of process (approx

Subject:Computer SciencePrice:21.99 Bought4

ICA  SPECIFICATION (Element 2)

INCLUDING MARKING & GRADING CRITERIA

 

Introduction

                                                                                                                                                                                                                                 

 

 

You need to do a layer-wise component and security analysis of a selected IoT application and make a report of process (approx. 2000 words).

 

 

The Scenario

 

 

 

CyberHealth Ltd. is a Teesside based cybersecurity solution provider, where you are working as a cybersecurity expert. Your company provides Networking & Cybersecurity solutions for the business environment. They currently offer managed, professional, and hardware & software services.  Recently, few companies have approached CyberHealth to offer them services for their IoT solution clients. CyberHealth is interested in extending its business by providing services to its customers who offer IoT solutions.

The use of telemedicine with the support IoT has increased globally due to COVID-19.  Your company is more interested in healthcare related IoT solution providers or customers. In this context, you are assigned to analyse the security of an existing remote monitoring system (offered by an IoT solution provider) for elderly and chronic disease patients.

 

 

Your Tasks

 

 

 

Task 1 (T1): Compare the three- and five-layered architecture of the IoT-based remote patient monitoring system (e.g., fall detection and reporting or any app selected from Google’s play or Apple’ Apps store and uses mobile sensors) in terms of security (e.g., cybersecurity, physical security) (20%). For the task you need to include:

  • A diagram of the architecture (5%)
  • Brief description of the security features supported by each layer (e.g., sensing or perception) to protect their components (e.g., sensor or sensors, routers, apps) (15%).

Task 2 (T2): What is Risk in cybersecurity? Do a risk assessment of the selected IoT application using a risk assessment framework. You can select any framework you prefer (15% mark).

Task 3 (T3): Explain with examples how you would analyse the end-to-end (E2E) security vulnerabilities or concerns (using the 3-layer architecture in task 1 and its layer-wise components) of the selected solution (40% mark). For this task,

  • be precise about tools and methods,
  •  justify all your decisions, and
  • Discussion needs to be linked with the selected application.

Task 4 (T4): Discuss countermeasures or mitigation mechanisms for the identified security vulnerabilities or concerns of the sensing (in task 3) layer of the selected patient monitoring system (10%).

Task 5 (T5): Machine Learning (ML) is an essential technology in IoT to process and make decision based on the sensed data.  However, adversaries can use a variety of attack (also known as adversarial attacks) methods to disrupt a ML model, either during the training phase or after the model has already been trained.  Discuss a list of potential adversarial attacks with examples possible in autonomous or driverless car (10% mark) domain of IoT.

Task 6 (T6): Write the report clearly and professionally (i.e., using references and figures where appropriate) regarding technical issues in an IoT network and security (5% mark)

 

Deliverable and deadline

 

 

 

You should submit your report as a PDF document via online (Blackboard) by the 12 January 2022 (Wednesday) (16:00PM).

 

Advice and Assistance

 

 

 

 

For feedback and advice on your progress consult the module tutors during the scheduled sessions. In addition, you can email both tutors (m.razzaque@tees.ac.uk/u.adeel@tees.ac.uk).

 

 

 

Assessment criteria

 

 

 
   

 

 

The tasks T1-T4 cover the learning outcome 4 (total 80% mark), task T5 covers learning outcome 7, and task T6 covers learning outcome 1.

Marks will be assigned as in the following table.

 

 

Task

70%+

60-69%

50-59%

40-49%

1

An excellent discussion about the three- and five-layered view or architecture of the selected IoT application, including a diagram of each architecture.

A good discussion about the three- and five-layered view or architecture of the selected IoT application, including a diagram of each architecture.

A fair discussion about the three- and five-layered view or architecture of the selected IoT application, including a diagram of each architecture.

A limited discussion about the three- and five-layered view or architecture of the selected IoT application. Diagrams are missing.

2

A comprehensive risk assessment using a framework.

A good but not comprehensive risk assessment using a framework.

An incomplete risk assessment using a framework.

A limited or partial risk assessment without a framework.

3

An excellent analysis (with examples) of E2E security concerns of the selected architecture of the solution. Appropriate tools and methods are used with excellent justification.

A good analysis (with examples) of E2E security concerns of the selected architecture of the solution. Appropriate tools and methods are used with justification.

A fair analysis (without examples) of E2E security concerns of the selected architecture of the solution. Tools and methods are used with limited justification.

A limited analysis (without examples) of E2E security concerns of the selected architecture of the solution. Tools and methods are used without justification.

4

An excellent discussion about countermeasures for the identified security concerns of the sensing layer.

A good discussion about countermeasures for the identified security concerns of the sensing layer.

A fair discussion about countermeasures for the identified security concerns of the sensing layer.

A limited discussion about countermeasures for the identified security concerns of the sensing layer.

5

An excellent discussion and informed comments on emerging applications of IoT in healthcare, demonstrating an understanding of the social and commercial context

A good discussion and informed comments on emerging applications of IoT in healthcare, demonstrating an understanding of the social and commercial context.

A fair discussion and some informed comments on emerging applications of IoT in healthcare, demonstrating an understanding of the social and commercial context.

A limited answer and few informed comments on emerging applications of IoT in healthcare, demonstrating an understanding of the social and commercial context

6

A very clear and readable report, with excellent structuring, good use of grammar and referencing. 

A clear and readable report, with good structuring, good use of grammar and referencing.

The report is readable but with minor errors. Some use of relevant source material and referencing.

A readable report, with major errors in writing, structure or referencing. 

 

 

For more information, please contact tutor or module leader.

 

 

Learning outcomes to be assessed

 

 

 

 

This element (counts 50% of your overall marks) will assess the learning outcomes 1 and 4, which are as below:

  1. Communicate clearly and professionally regarding technical issues in an IoT network and security.

4. Demonstrate critical understanding of standard security and privacy preserving mechanisms in IoT. 

Option 1

Low Cost Option
Download this past answer in few clicks

21.99 USD

PURCHASE SOLUTION

Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

rated 5 stars

Purchased 4 times

Completion Status 100%