Student Solution

-->

"Education is the most powerful weapon which you can use to change the world”
– Nelson Mandela

1 University

1 Course

1 Subject

Week 6 Research Paper

Week 6 Research Paper

Q The second Research Paper will extend our focus from the First Research Paper on how to enhance the security of the Internet of Things (IoT). • Refer to the Research Paper Progress Report Rubric for grading expectations • Go to 'Start Here' in Blackboard for APA citing directions • Be sure to submit work that is a result of your own effort: plagiarism is unacceptable – for more details, please see the Academic Integrity Policy in the Syllabus section Deliverables for the second Research Paper: 1. Recognize that any device that automatically or can be manually connected to the internet could be consider part of the IoT 2. What types of devices do you already have that would be considered part of the IoT? 3. Select at least two IoT devices that you, or many people already have in their homes, to be the focus for this Research Paper. 4. What IoT devices are you likely to get in the next year? 5. What vulnerabilities are common with these IoT? 6. What are some ways to eliminate or reduce the vulnerabilities of IoT devices? 7. How can you Wi-Fi be configured to mitigate the vulnerabilities of IoT devices? As you are doing research and writing your paper, think about the following: • How can cryptography can be used to facilitate security? • How is it implemented? • How can the security of IoT be improved (future directions)? Format for the Research Paper • One (1) page Summary about the enhancing security of the IoT and how to make remote connections more secure and less vulnerable • Three (3) to five (5) pages about what you discovered through your research • At least three (3) academic and/or professional quality references (not Wikipedia or Vendor's White Papers) • One (1) page reference (APA format) • In text citations corresponding to your references (APA format) Attachments • Second Research Paper Rubric SEC 310 Research Paper Rubric SEC 310 Research Paper Rubric Criteria Ratings Pts This criterion is linked to a Learning OutcomeContent 40 pts Excellent Information from current event is clearly summarized. Four supporting details address who, what, where, when, why or how questions. 37 pts Proficient Information from current event is clearly summarized. Three supporting details address who, what, where, when, why, or how questions. 34 pts Competent Summary may be unclear or incomplete. There is a need for more supporting details. 30 pts Failing Too much information was copied from the article or important details are left out. Details or summary may be confusing. Plagiarism is evident. 40 pts This criterion is linked to a Learning OutcomeConnection 40 pts Excellent Insightfully makes multiple text-text, text-self, or text-world connections. 37 pts Proficient Insightfully makes text-text, text-self, or text-world connections. 34 pts Competent Attempts to make appropriate text-text, text-world or text-self connections, but lacks sufficient detail to establish a full connection. 30 pts Failing Connection is inappropriate to the content of the article. 40 pts This criterion is linked to a Learning OutcomeGrammar 10 pts Excellent Writer makes little or no errors in grammar or spelling that distracts the reader from the content. Every paragraph contains sentences that are well-constructed. There are varied beginnings and rich and appropriate vocabulary. 8 pts Proficient Writer makes very few errors in grammar or spelling that distracts the reader from the content. Most sentences are well-constructed with varied beginnings and vocabulary. 6 pts Competent Writer makes some major errors in grammar or spelling. Some sentences may not be well-constructed. Similar words are used too often. 2 pts Failing Writer makes many errors in grammar or spelling. Sentences lack structure and appear incomplete or are confusing. 10 pts This criterion is linked to a Learning OutcomeAPA Version 6 Style Format 10 pts Excellent Properly utilizes APA format for all references and citations. Each reference has a least 1 citation in text. 8 pts Proficient APA format used properly for all references and citations. Some references have no citations in text. 6 pts Competent APA format used properly for all references. Citations are absent in text. 2 pts Failing APA format not utilized. 10 pts Total Points: 100 PreviousNext

View Related Questions

Solution Preview

Device researched Amazon Alexa’s and IP security cameras Amazon Alexa devices privacy concerns - Amazon Alexa devices record private conversations that are reviewed for quantity control purposes. Mitigation – Either stop using altogether or mute the microphone on each echo device. IP Cameras vulnerabilities and mitigation • Weak passwords - Many IP camera manufacturers ship their devices with weak login credentials such as ‘admin’ and ‘password’. • Reliance of cloud servers - Because most IP cameras require a cloud server for them to work, these cameras often communicate with cloud servers located in countries with little or no privacy laws.