IT545-4: Analyze cybersecurity risks or vulnerabilities within wireless, mobile, and cloud infrastructures, as well as disruptive technologies, to develop effective cybersecurity solutions.
Purpose
The purpose of this assignment is for you to evaluate security issues in a specific wireless sensor network and make recommendations to mitigate the security risks and threats.
Scenarios
Choose one of the following scenarios:
Underwater environment and marine life monitoring system
Underground earthquake and landslide monitoring system
Mobile wildlife movement monitoring system
Remote patient monitoring system
Transport and asset tracking system
Bridge monitoring system
Traffic monitoring and management system.
You are a cybersecurity consultant. You have been asked to consult with the CIO of a large organization using the type of wireless sensor network you selected from the above list.
Assume the following:
All of the servers that communicate with the sensors and store and retrieve data will be housed in a cloud environment.
The sensor nodes run on batteries.
The nodes communicate using radio or electromagnetic signals.
The sensor devices must communicate with each other and with the main servers in the cloud.
Based on this weekreadings and your own research on the Internet, prepare a report for this CIO that discusses the following:
unique security principles for this type of wireless sensor network,
the types of attacks that occur in wireless sensor networks.
attacker motivation for this wireless sensor networks
Discuss at least three specific types of attacks that can occur in your specific wireless sensor network.
Through research on the Internet, determine what you believe will be a good approach to securing this wireless sensor network that will address the unique security principles discussed.
Propose a cybersecurity strategy to the CIO to protect your chosen wireless sensor network.
Assignment Requirements
The paper should be 4–5 pages, use 12 pt. Times New Roman, and be in APA format.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more