ITS 834 National University Emerging Threats and Counter Measures Discussion

User Generated

cunavfghqlcbby

Computer Science

ITS 834

National University

ITS

Description

For this assignment, review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

and evaluate it in 3 pages (800 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Emerging Threats and Counter Measures – Outline
Thesis statement: Lack of cybersecurity knowledge and measures regarding IoT technologies
offers a platform through which cyber adversaries can use and steal, alter, or corrupt data in the
organization system.
I. Subject of investigation
A. The authors researched on the vulnerabilities, threats and intruders to IoT devices
B. The research was motivated by the growing dependence on IoT devices
II. Hypothesis
A. The need to understand threats actors to build robust security measures
III. Summary
A. Definition of assets
B. Definition of threats
C. Definition of threat actors
D. Motivations behind cyber attacks
E. Categories of Intruders
IV. Conclusion
A. The author linked their discussion to the hypothesis


1

Emerging Threats and Counter Measures

Name
Institution
Course Number and Name
Instructor’s Name
Due Date

2
Emerging Threats and Counter Measures
Technology has ushered a new era through which data has become an asset, and
organizations have to become more proactive towards ensuring that they are protected. These
efforts include developing strategies and security measures capable of ensuring that the triad
properties, including confidentiality, integrity, and availability, are preserved. Organizations
always aim at maintaining a competitive edge, and one of the differentiating factors involves the
utilization of new technologies such as the adoption of IoT technologies (Hafeez, Antika...


Anonymous
This is great! Exactly what I wanted.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags