Sign In
Not register? Register Now!
Pages:
2 pages/β‰ˆ550 words
Sources:
Check Instructions
Style:
MLA
Subject:
IT & Computer Science
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 12.96
Topic:

IT Domain Attack

Coursework Instructions:

Please separate both assignments into different docs.


 


Components one needs to secure include: Biometric recognition, voice recognition, motion sensors, smart cameras, face recognition, shock sensors, glass-break sensors, smart lighting, and smart locks. These should help ensure security of a smart home.


 


Components one needs to secure include: Biometric recognition, voice recognition, motion sensors, smart cameras, face recognition, shock sensors, glass-break sensors, smart lighting, and smart locks. These should help ensure security of a smart home.

Words Characters Reading time 
Coursework Sample Content Preview:
Name:
Professor’s Name:
Course:
Due Date:
Assignment 1&2
What are the components/devices you need to secure? List them.
Components one needs to secure include: Biometric recognition, voice recognition, motion sensors, smart cameras, face recognition, shock sensors, glass-break sensors, smart lighting, and smart locks. These should help ensure security of a smart home.
One may consider grouping these components into their respective categories including identification mechanisms, surveillance mechanisms, and notification mechanisms.
Can you list what could cause violations of CIA (confidentiality, integrity, availability) triads? Can you come up with some policies and guidelines to counter the violations?
Big data could cause violations of the CIA triad. The security of the Internet of Things could also cause a violation of the CIA triad.
Some of the guidelines or policies that could help ensure or counter violations of the CIA triad could include:
* Handling every piece of data based on its required privacy.
* Educate employees on compliance and regulatory requirements of the system.
* Monitor the network system to ensure breaches are detected and prevented.
List three attacks that can happen on smart home domain.
* Device hijacking – this is where attackers hijack and eventually assumes control of one’s device. If an attacker acquires access to the smart camera, they can use such an avenue to gain access to other smart devices, and eventually gain access to a smart home.
* PDoS or permanent denial of service – this mainly involves the damage of a device to a point where it cannot be used anymore.
* Data as well as identity theft – access to smart devices in smart homes could give access to owners’ data. The attackers’ aim is usually to assume control but not to alter functionality.
Assignment 2
Describe one example for each social engineering attack.
Phishing – an example of a phishing attack would include a message asking a person to donate money to coronavirus victims. This message could then offer the person instructions on how to wire the money. In the end, the person could end up providing personal data or give access to an organization’s system or their home network.
Piggybacking – this involves unauthorized access to restricted data or area. For example, a hacker could pretend they belong to an organization and do have access to a certain area but have forgotten their card. So, they may ask another person to hold the door for them. Once they gain entry, they then proceed to do whatever harm they planned to do.
Baiting – these target victims’ curiosity. An example could be a music that...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These MLA Coursework Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!