a. Assuming I have a very important not confidential message to send to a friend, which is means that I do not care whether the massage is seen by others or not, my aim is to get it to my friend with its integrity ensured. Outline the mechanisms and procedures you would go through to deliver this message securely.
a. Assuming I have a very important not confidential message to send to a friend, which is means that I do not care whether the massage is seen by others or not, my aim is to get it to my friend with its integrity ensured. Outline the
b. IoT is an emerging technology growing at a very fast rate due the easy connectivity capability of the IoT objects. IoT networks grow exponentially producing data in high volumes, which are transmitted at high speeds, thus, the network is highly exposed to threats and attacks.
1. Identify two attacks in the IoT system and discuss the effects of these attacks on the IoT network.
2. Propose a solution to the problem identified bearing in mind some of these objects are very small and cannot deal with computationally complex mechanisms.
Step by step
Solved in 2 steps