ITCC500 Response 200 word

Write 200 word

My chosen topic for research is Data Security for devices connected to the Internet of Things (IoT) and how government regulation and policy can impact the security of IoT devices to protect personal data of the consumers and prevent cyberattack.

The problem statement for my research topic is: Network enabled devices on the IoT are not properly secured by the manufacturer to protect the personal data of the consumer or prevent cyberattack.
 

The purpose statement for my research is:  With the increase of network connected devices making up the IoT, personal privacy and personal data protection and prevention of cyberattacks becomes harder and harder to achieve because there are weak or no regulation requiring industry to implement strong security standard on IoT devices.
 

The significance of this study it to achieve a better understanding of current IoT security standards and how government regulation and policy can improve security of these devices and privacy protection that will help to prevent consumer data loss and cyberattack?  The number of devices on the IoT is growing at an extraordinary rate and most of the devices are not being deployed with strong security standards if any at all that will prevent data loss or cyberattack.Most devices are left vulnerable and the consumer is unaware of the security threat the IoT device presents.
 

The independent variables in my research are government regulation and policy and how it will affect my dependent variable which is IoT device security.Increased security of IoT devices should improve personal data protection and reduce cyberattack
 

Research Question:
 

How does government regulation and policy mandating tighter security standards affect IoT device security to reduce personal data loss and prevent cyberattacks?
How can establishing stronger government policy on IoT device security reduce personal data loss and cyberattacks?
 

Hypothesis:
 

If the government mandates tighter IoT security implementation than personal data loss and the number of cyberattacks on IoT devices will be reduced because the IoT industry will be required to implement high security standards
If the IoT industry is required to implement higher security standard on their devices then the number of personal data loss incidents and cyberattack incidents will be reduced because IoT devices will be less vulnerable to compromise
 

The articles I used to do my initial research are: Do a Lit review of these before posting
Choi, S.-K., Yang, C.-H., & jin, K. (2018, February 2). System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats. KSII Transactions on Internet and Information Systems, 12(2), 906-919.   This study looks at ways to minimize IoT device vulnerabilities and threats to improve the IoT environment.

Hudson, F. D. (2018, April 16). Enabling Trust and Security: TIPPS for IoT. IT Professional, 20(2), 15-18. Retrieved June 17, 2018.  This report makes an attempt to establish framework of competencies to ensure a safe and trustworthy IoT operating environment, those competencies are Trust, Identity, Privacy, Protection, and Safety. 

Migault, D., Guggemons, T., Killian, S., Laurent, M., Pujolle, G., & Wary, J. P. (2017). Diet-EST: IP Layer Security for IoT. Journal of Computer Security, 173-203.  This proposes a more compact data encryption protocol that will reduce the impact encryption has on data packet size. Smaller data packets will reduce IoT processing requirements therefor increase security and battery life span.

Miller, S. (2018, February 15). NIST Maps Out IoT Security Standards. Retrieved from GCN.com: https://gcn.com/articles/2018/02/15/nist-iot-standards.aspx.  This article takes a brief look at NISTs attempt to provide policy makers and standards organization with tools to help standardize IoT devices as a whole

Schneier, B. (2017). IoT Security: What’s Plan B? IEEE Security & Privacy, 96-96.  This article takes a look at the lack of government policy to mandate IoT security and that if the U.S is not going to take action then we may need to rely on other nation states to take the lead.

 

Example someone wrote

Hi sir

Thank you for making us aware how those toy companies are using technology to collect personal data and how are they protecting all store data.  It will good to know who is managing all data collected and how is being used to protect all consumers.  I look forward for your outcome I am sure it will address all those issues and how government policies are protecting consumers and children in general and how safe loT is. Security should be the biggest concern for this company as more and more users (Child) are using those toys by connecting to the internet to get better features of the loT. It also should address the issues of physically protect and store all electronic data, and all information collected by ICT technology. The information also will address how hazard are loT for children and who monitors all systems and events of loT intelligent convergence security environment. The loT should device a table to collect records sensed data received from loT sensors and process events based on all electronic communication collected. We should learn more about their 3Design that is now intera

Place your order
(550 words)

Approximate price: $22

Homework help cost calculator

600 words
We'll send you the complete homework by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 customer support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • 4 hour deadline
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 300 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
× How can I help you?