How can cryptography can be used to facilitate security how


The Research Papers are assigned to take you on an exploration about a topic of interest to all of us: The Internet of Things (IoT). These include many devices that are connected to the Internet beyond servers, desktops, laptops, tablets, and Smartphones. Many are very easily configured to connect to Wi-Fi.

Some of the concepts that we focused on with the First Research Paper are still relevant including confidentiality, integrity, and availability (CIA triad), authentication, accountability, and access control. The IoT is rapidly expanding, so this is a real area for concern and will very likely be increasingly important in your career.

The Second Research Paper will extend our focus from the First Research Paper on how to enhance the security of the Internet of Things (IoT).

Deliverables for the Second Research Paper

1. Recognize that any device that automatically or can be manually connected to the internet could be consider part of the IoT

2. What types of devices do you already have that would be considered part of the IoT?

3. Select at least two IoT devices that you, or many people already have in their homes, to be the focus for this Research Paper.

4. What IoT devices are you likely to get in the next year?

5. What vulnerabilities are common with these IoT?

6. What are some ways to eliminate or reduce the vulnerabilities of IoT devices?

7. How can you Wi-Fi be configured to mitigate the vulnerabilities of IoT devices?

As you are doing research and writing your paper, think about the following

• How can cryptography can be used to facilitate security?

• How is it implemented?

• How can the security of IoT be improved (future directions)?

Format for the Research Paper

• Research Paper is to be at 4-6 content pages (submitted in Microsoft Word

• .docx format or PDF format)

• One (1) page Summary about the enhancing security of the IoT and how to make remote connections more secure and less vulnerable

• Three (3) to five (5) pages about what you discovered through your research

• At least three (5) academic and/or professional quality references (not Wikipedia or Vendor's White Papers)

• One (1) page reference (APA format)

• In text citations corresponding to your references (APA format)

Please be sure to submit work that is a result of your own effort: plagiarism is unacceptable - for more details, please see the Academic Integrity Policy in the Syllabus section.

Solution Preview :

Prepared by a verified Expert
Computer Engineering: How can cryptography can be used to facilitate security how
Reference No:- TGS02517574

Now Priced at $10 (50% Discount)

Recommended (92%)

Rated (4.4/5)