Professional Documents
Culture Documents
CT098-3-2 RMCT
Research paper on Security in Smart houses
By Tresor Kalembo Tshibangu TP058435
APD2F2102IT(NC)
Contents
Contents...........................................................................................................................................2
1. Abstract.................................................................................................................................3
2. Introduction...........................................................................................................................3
3. Research Background/Literature review..............................................................................4
4. Problem statement................................................................................................................4
5. Aims and Objectives of the research....................................................................................5
6. Research Questions...............................................................................................................5
7. Significance of the research..................................................................................................5
8. Methodology.........................................................................................................................6
9. Overview of the proposed system.........................................................................................7
References........................................................................................................................................7
Security in Smart house
Tresor Kalembo Tshibangu
Tresortshibangu081@gmail.com
Along these lines, the fundamental point of this paper 6. Significance of the research
is to break down and feature all issues and dangers on Security has always and will always be the biggest
network protection for an unmistakable and thorough concern in any computing system and the safety and
comprehension of cyber-attacks. This is an endeavor reliability of a network and the data it houses is the
to impact the methodology for future specialists and main concern. For smart homes, the level of security
security experts to resolve issues and dangers can determine a life-or-death situation.
identified with network safety. (ukdiss.com, 2021) During this research I based my research in order to
educate people on how to stay safe from cyber-
attacks.
The most common way of staying aware of new Man-in-the-Middle (MitM) assaults are snooping
advances, security patterns, and danger insight is a assaults that include an aggressor blocking and
difficult undertaking. It is important to shield data handing off messages between two gatherings who
and different resources from digital dangers, which accept they are speaking with one another. (Shea,
take many structures. Sorts of digital dangers include: 2021)
Ransomware is another sort of malware. It The more we know about technology the scary the
incorporates an attacker locking the setback's PC concept of being unsafe and the more we need to
structure, in this case the attacker can lock the protect ourselves.
homeowner outside or inside his own house, archives 7. Methodology
normally through encryption and mentioning a
The research methodology chosen for this research is
portion to interpret and open them. (Shea, 2021)
called case study methodology this is because in the
Phishing is a type of social design where fake email
case study methodology and among its 3 categories
or instant messages that look like those from
of case which are explanatory case study, descriptive
trustworthy or realized sources are sent. Regularly
case study and exploratory case study.
irregular assaults, the purpose of these messages is to
During this case we focused on 2 main issues which
take delicate information, like a charge card or login
are the how to keep our home system safe and the
data. (Shea, 2021)
why must we keep it safe.
Spare phishing is a kind of phishing assault that has
For this methodology I went for both quantitative and
an expected objective client, association, or business.
quantitative approach.
(Shea, 2021)
8. Overview of the proposed system
Insider dangers are security breaks or misfortunes
Educating people around the fact that the human
brought about by people - for instance, workers,
being is the weakest link to an information system is
project workers, or clients. Insider dangers can be
extremely important. Even if a person knows the
noxious or careless in nature. (Shea, 2021)
danger and the extensions of the damages that a
Distributed Denial of Service assaults are those
cyber-criminal can cause, a constant education of the
where various frameworks disturb the traffic of a
house holder on the new technology threats as well as
designated framework, like a server, site, or another
an implication of a third party for a better protect of
organization asset. By flooding the objective with
the home system.
messages, association solicitations, or bundles, the
assailants can slow the framework or crash it, 9. Conclusion
keeping real traffic from utilizing it. (Shea, 2021)
In conclusion we can say that the risk is too big to be
Advanced persistent threats are delayed designated
ignored, just like big companies are suffering from
assaults in which an aggressor invades an
cyber-criminals and their numerous attacks, so are
organization and stays undetected for extensive
the smart houses. Keeping one’s system safe might
stretches of time with the expected to take the
just make the difference between life and death.
information. (Shea, 2021)
References
AbcAssignmentHelp.com., 2021. CHALLENGES IN CYBER SECURITY : LITERATURE REVIEW, s.l.: s.n.
Azmi, R., Tibben, W. & Win, K. T., 2016. Motives behind Cyber Security Strategy Development:A Literature
Review of National Cyber Security Strategy, s.l.: Australasian Conference on Information Systems.
Cavelty, M. D., 2013. From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-
Security Discourse. 15th ed. s.l.:International Studies Review.
Dewar, R., 2014. The "Triptych of Cyber Security' : A Classification of Active Cyber. 6th International Conference
on Cyber Security ed. s.l.:International Conference on Cyber Conflict.
Lee, I., 2020. Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management, s.l.:
School of Computer Sciences, College of Business and Technology, Western Illinois University.
Robles, R. J. & Kim, T.-h., 2010. A Review on Security in Smart Home Development , Daejeon: School of
Multimedia, Hannam University.
Soomoro, Shah & Ahmed, 2016. Information security management needs more holistic approach: A literature
review, s.l.: International Journal of Information Management.
Ulum, M., 2017. Literature review on cyber security discourse, s.l.: s.n.