Question

In: Operations Management

This assignment is designed to develop your understanding of the System Development Life Cycle (Chapter 9),...

This assignment is designed to develop your understanding of the System Development Life Cycle (Chapter 9), security (Chapter 10), and opportunities related to the internet of things (Chapter 1). If you’re not familiar with Internet of Things (IoT) solutions, you should begin by researching existing IoT solutions. Many IoT solutions can be found on the internet. For this assignment, you need to do the following:

3. In bullet form, list the security that will be used for your design. For each item, include a brief description of why it is needed, and how it will be used. Explanations need to be complete, but not necessarily lengthy. Also, while a budget is not provided, cost-effective solutions tend to be better for this assignment.

(You can make your own company or use an existing one)

Solutions

Expert Solution

The security that will be used for IOT solutions design are as follows:

  1. Device Tampering Detection

This is needed because the devices which are used in the company should be bug free. The tempering would be done to steal the private information of the company. Some of the systems which provide the device tempering detection capabilities. They needed to be installed in the company so as to know that the tempered devices.

  1. Embedded security Management

Embedded security management is needed so as to update the security policies and mitigate the risks. It is done in the Office premises time to time when ever need arises. Although it works with the other management task but it is used mainly during the changes in the security policy of the company as well as its stakeholders company.

  1. Intrusion detection and security monitoring

The intrusion detection and security monitoring of the embedded devices are done in order to manage and know the invalid login attempts. This is because when a hacker does the invalid attempts to login in to the system the might not know or does not report it. So, these solutions would report all the information’s regarding the intrusion. This will help in the proactive security to the systems.

  1. Protection against Cyber Attacks

This is provided to the systems as it is very common that hacker use to steal the information and do the demand for their benefits or for any other specific purposes. The embedded firewalls provide the critical layer for the security against attack. The firewalls actually limit the communication only to the known and trusted devices. It blocks the hacker by doing any attack to the system.

  1. Authentication

Authentication is the process to know whether the person is known to or with the organization. The Authentication is given to the devices which are used for the communication in the organizational premises. It is need actually to authorize the person or link or communication devices that they are not involve in any security threats. The are applied to the devices as the security password or code is needed to open the device to process. It avoids the physical threat also.

  1. Data Security

The main important is the Data security. The need of data security is to avoid misusage of data. This in the financial organizations to avoid the financial losses to the company as they are data depended. The data security is done by avoiding the unauthorized access to the systems, data encryption using various algorithms, encryption of communication channel used while transferring the data and many more.

  1. Secure Code updates:

The need of Security code updates is to ensure the device security. A method of secure code updates is used to ensure that the code for the devices may updated for fix the bugs, security patches, etc. Use of signed or authorized code ensures that the malicious code can not be introduced to the systems or devices.


Related Solutions

LIFE CYCLE NUTRITION ASSIGNMENT Life Cycle Nutrition Objectives: 1. Have a better understanding of the professional...
LIFE CYCLE NUTRITION ASSIGNMENT Life Cycle Nutrition Objectives: 1. Have a better understanding of the professional thoughts on one issue in life cycle nutrition. 2. Identify a scholarly source for information. DUE: 1.     Find an article from a professional journal or on the WEB that deals with some aspect of nutrition in relation to pregnancy, lactation, infancy, childhood or the elderly. Suggested topics could include but not limited to: ·       Breastfeeding ·       Success (or not) of the WIC program ·      ...
This assignment is designed to develop your analytical and managerial skills. In this assignment, you will...
This assignment is designed to develop your analytical and managerial skills. In this assignment, you will imagine that you are the CTO (Chief Technology Officer) of a 25 employees consultancy company of your choice. As CTO, you must create and disseminate a policy to enforce information security in your company. Write a 2 pages report that summarizes the new policy of protecting the company’s information assets with at least 10 (ten) fundamental rules to be followed by the employees. Be...
Listed below are system development activities. Identify the stage of the system development life cycle that...
Listed below are system development activities. Identify the stage of the system development life cycle that each activity belongs to SYSTEM DEVELOPMENT ACTIVITIY SDLC STAGE Create the data dictionary for the system. For each table in the database, identify the primary key. While the system is in operation, change the frequency of output of the sales report. The report was output weekly. It is now changed to daily output. Create the Level 0 DFD based on the content DFD. Interview...
Summarize in your own words what the system development life cycle (SDLD) is and why you...
Summarize in your own words what the system development life cycle (SDLD) is and why you think understanding it is or not important to accountants. Does your conclusion hold true for accountants in all areas of the profession? Explain. Briefly include descriptions of the important elements of the SDLC in your answer.
The SDLC (software/system development life cycle) framework is a common development methodology used by organizations to...
The SDLC (software/system development life cycle) framework is a common development methodology used by organizations to build systems and software. Security is often an afterthought or only addressed late in the development process. How can threat modeling be includes during the entire development effort? At what points of the lifecycle would you include threat identification, testing and analysis? Why have you chosen those points in the development cycle?
​Describe the System Development Life Cycle (SDLC), Joint Application Development (JAD), Rapid Application Development (RAD), and...
​Describe the System Development Life Cycle (SDLC), Joint Application Development (JAD), Rapid Application Development (RAD), and Agile methods. Compare and contrast these methods and explain advantages and disadvantages of each.
9 The product life cycle model ________________________________________. helps companies develop new products explains the time it...
9 The product life cycle model ________________________________________. helps companies develop new products explains the time it takes for a population to fully accept a new product describes reasons for why consumers buy or don't buy a particular product helps managers understand how marketing strategies need to be adapted as market conditions change helps managers predict how much time it will take to bring a product to market
One of the steps in the System Development Life Cycle is Implementation. (a)Explain what work has...
One of the steps in the System Development Life Cycle is Implementation. (a)Explain what work has already been completed before the start of Implementation. (b)Describe what work is done during Implementation and explain why it is important. (c) Explain why more time spent during earlier software development phases (e.g. analysis and design) can contribute to reducing overall software development costs. Provide an illustrating example to support your arguments.
Identify the stages of the System Development Life Cycle (SDLC) and four (4) activities. (20 marks)...
Identify the stages of the System Development Life Cycle (SDLC) and four (4) activities. Hints : student must describe each stage and link the stage with activities. remark : This is 20 marks question, please answer me in full sentence.
write a system development life cycle (SDLC) all the 7 stage on a phone product 1-Planning...
write a system development life cycle (SDLC) all the 7 stage on a phone product 1-Planning 2-Requirements Analysis 3-Design 4-implementation 5-Test 6-Deployment 7-Maintenance like in planing stage the phone made for who and in requirements analysis what should be in the phone battery screen etc and the design in plastic or metal just in basic no need for advanced
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT