In the era of the Internet of Things (IoT), a massive volume of sensor devices collect and/or… 1 answer below »

In the era of the Internet of Things (IoT), a massive volume of sensor devices collect and/or generate various sensory data over time for a wide range of fields and applications. However the varied nature of devices and protocols in use, the sensitivity of the data contained within make security for the IoT a growing research priority and industry concern. With many security practices being inappropriate due to their resource limitation, it is deemed important to include second line defences into IoT networks. These systems will also necessity to be evaluated for their efficacy in a diversity of different network types and protocol. An IoT attacks continues to be a serious threat to the IoT ecosystem users.

Assume you have an interview for the cybersecurity analyst position with Regal Security Solutions Company. You are supposed to be prepared about the IoT attacks, their types, threats, and mitigation tools. In this context write a report including the following sections:

A. Introduction about IoT security , IoT attacks and their impacts on the society

B. Discussion of any five of IoT attacks

C. The working mechanism of IoT attacks

D. Potential threats posed by IoT attacks

E. Case study of at least one recent attack carried out by the IoT attacks

F. Recommendations on any two mitigation tools to tackle the IoT attack and discuss

the effectiveness of the selected tools

G. Summary

H. References in IEEE Transactions on Networking style