In: Operations Management
This assignment is designed to develop your understanding of the System Development Life Cycle (Chapter 9), security (Chapter 10), and opportunities related to the internet of things (Chapter 1). If you’re not familiar with Internet of Things (IoT) solutions, you should begin by researching existing IoT solutions. Many IoT solutions can be found on the internet. For this assignment, you need to do the following:
3. In bullet form, list the security that will be used for your design. For each item, include a brief description of why it is needed, and how it will be used. Explanations need to be complete, but not necessarily lengthy. Also, while a budget is not provided, cost-effective solutions tend to be better for this assignment.
(You can make your own company or use an existing one)
The security that will be used for IOT solutions design are as follows:
This is needed because the devices which are used in the company should be bug free. The tempering would be done to steal the private information of the company. Some of the systems which provide the device tempering detection capabilities. They needed to be installed in the company so as to know that the tempered devices.
Embedded security management is needed so as to update the security policies and mitigate the risks. It is done in the Office premises time to time when ever need arises. Although it works with the other management task but it is used mainly during the changes in the security policy of the company as well as its stakeholders company.
The intrusion detection and security monitoring of the embedded devices are done in order to manage and know the invalid login attempts. This is because when a hacker does the invalid attempts to login in to the system the might not know or does not report it. So, these solutions would report all the information’s regarding the intrusion. This will help in the proactive security to the systems.
This is provided to the systems as it is very common that hacker use to steal the information and do the demand for their benefits or for any other specific purposes. The embedded firewalls provide the critical layer for the security against attack. The firewalls actually limit the communication only to the known and trusted devices. It blocks the hacker by doing any attack to the system.
Authentication is the process to know whether the person is known to or with the organization. The Authentication is given to the devices which are used for the communication in the organizational premises. It is need actually to authorize the person or link or communication devices that they are not involve in any security threats. The are applied to the devices as the security password or code is needed to open the device to process. It avoids the physical threat also.
The main important is the Data security. The need of data security is to avoid misusage of data. This in the financial organizations to avoid the financial losses to the company as they are data depended. The data security is done by avoiding the unauthorized access to the systems, data encryption using various algorithms, encryption of communication channel used while transferring the data and many more.
The need of Security code updates is to ensure the device security. A method of secure code updates is used to ensure that the code for the devices may updated for fix the bugs, security patches, etc. Use of signed or authorized code ensures that the malicious code can not be introduced to the systems or devices.