You are on page 1of 6

Research Methodology in Computing and Technology

CT098-3-2 RMCT
Research paper on Security in Smart houses
By Tresor Kalembo Tshibangu TP058435
APD2F2102IT(NC)
Contents
Contents...........................................................................................................................................2
1. Abstract.................................................................................................................................3
2. Introduction...........................................................................................................................3
3. Research Background/Literature review..............................................................................4
4. Problem statement................................................................................................................4
5. Aims and Objectives of the research....................................................................................5
6. Research Questions...............................................................................................................5
7. Significance of the research..................................................................................................5
8. Methodology.........................................................................................................................6
9. Overview of the proposed system.........................................................................................7
References........................................................................................................................................7
Security in Smart house
Tresor Kalembo Tshibangu
Tresortshibangu081@gmail.com

air alludes to remote systems administration. (Shea,


1. Introduction 2021)
Throughout the last few years, Smart Home Computer hardware is often defended by an
advancement is a constantly developing field that is equivalent suggests that accustomed protect different
facing uncommon difficulties. Nonetheless, the new valuable or sensitive instrumentation specifically,
advances in data and correspondences advances have serial numbers, doors and locks, and alarms. The
driven the Smart Home improvement to a decent protection of data and system access, on the opposite
degree of development. (Shea, 2021) hand, is achieved through different techniques,
A Smart Home is a living climate that joins the several of them quite complicated. (Hayes, 2021)
suitable innovation, called Smart Home innovation, Security in technology, likewise, called
to meet the inhabitant's objectives of solace living, cybersecurity, the insurance of the safety of a
life wellbeing, security, and productivity. Shrewd computer system, in this report focusing on smart
home innovation accomplishes these objectives by home, and data from mischief, burglary, and
building a climate that comprises an assortment of unapproved use. (Hayes, 2021)
home frameworks. (Shea, 2021) Just as in any other computer system, every aspect of
A Smart Home envelops six sorts of Smart Home the house will be secured by similar means used to
frameworks: Home Appliances, Lighting, and ensure other significant or delicate gear specifically,
Climate Control framework, Home Entertainment serial, or chronic numbers, entryways and locks, and
System, Home Communication framework, and cautions, the reassurance of information and
Home Security System. Every one of the above framework access, then again, is accomplished
frameworks is portrayed by various necessities like through totally different ways, several of them
information rate or distance dependent on the terribly unpredictable. (Hayes, 2021)
applications that help it. In this way, unique actual 2. Research Background/Literature
media are fitting for various Smart Home
review
frameworks. (Shea, 2021)
A security framework or system that is customed
In a Smart Home, the actual media that can be
keep holders of a house, and their belongings,
utilized by the Smart Home frameworks are the
protected from interlopers, thieves or unauthorized
accompanying: the current wiring, new wiring, and
people. A smart building security system or
the air. The current wiring alludes to the current
framework, notwithstanding, a lot more advantages
electrical wiring, the current phone wiring, and the
are to be gained with the use of a customized security
current cajole cabling. New wiring requires the
system. (Robles & Kim, 2010)
establishment of new cabling in the dividers and the
Home mechanization innovation tells mortgage 3. Problem statement
holders of any issues with the goal that they can
During this research the following questions will be
explore. In this paper, we talk about savvy home and
answered. What are the types of security threats
security, we likewise audit the device identified with
smart housing is facing? Who can help to ensure that
brilliant home security. (Robles & Kim, 2010)
the system is secured? How do attacks happen? How
Network protection has acquired significant
can we prevent those attacks from happening?
consideration somewhat recently because of its
4. Aims and Objectives of the research
capacity to get government information against the
The aim of this paper is to explain the different types
exponential growth of digital or computerized attacks
of threats that the security of smart housing is facing
or dangers. (ukdiss.com, 2021)
while mainly focusing on data manipulation. Hence,
Notwithstanding, as Information Technology is
this paper intends not only to explain the different
progressing, so are the issues and dangers to online
threats and risks that smart homes are facing, but also
protection. Network protection is yet battling to
how the clients can increase their chances of securing
address multi-dimensional Cyberattacks which are
their home from unwanted and uninvited guests.
acquiring high ground because of its consistently
In this report, our objectives will be to educate
expanding refinement. Consequently, there is a
anyone on how we can get our smart home more
should know about the significance of issues and
secure, and the following questions will help us reach
dangers to network safety. (ukdiss.com, 2021)
that objective such as what are the types of security
For a future analyst, new student, or IT proficient
threats smart housing is facing? who can help to
they should dissect the inquiries like what sort of foes
ensure that the system is secured? how do attacks
network safety is battling? how are the foes spurred?
happen? how can we prevent those attacks from
what sort of methods would they say they are
happening?
utilizing to assault the weak spaces of network
safety? A rundown of articles is gathered and 5. Research Questions
examined to know the responses to these basic How can we ensure the safety of a smart house in this
inquiries to have an unmistakable comprehension of current age where technology is one step on will call,
different issues and dangers to network safety. in an age where cyber-attacks can make unrepairable

(ukdiss.com, 2021) damages?

Along these lines, the fundamental point of this paper 6. Significance of the research
is to break down and feature all issues and dangers on Security has always and will always be the biggest
network protection for an unmistakable and thorough concern in any computing system and the safety and
comprehension of cyber-attacks. This is an endeavor reliability of a network and the data it houses is the
to impact the methodology for future specialists and main concern. For smart homes, the level of security
security experts to resolve issues and dangers can determine a life-or-death situation.
identified with network safety. (ukdiss.com, 2021) During this research I based my research in order to
educate people on how to stay safe from cyber-
attacks.
The most common way of staying aware of new Man-in-the-Middle (MitM) assaults are snooping
advances, security patterns, and danger insight is a assaults that include an aggressor blocking and
difficult undertaking. It is important to shield data handing off messages between two gatherings who
and different resources from digital dangers, which accept they are speaking with one another. (Shea,
take many structures. Sorts of digital dangers include: 2021)
Ransomware is another sort of malware. It The more we know about technology the scary the
incorporates an attacker locking the setback's PC concept of being unsafe and the more we need to
structure, in this case the attacker can lock the protect ourselves.
homeowner outside or inside his own house, archives 7. Methodology
normally through encryption and mentioning a
The research methodology chosen for this research is
portion to interpret and open them. (Shea, 2021)
called case study methodology this is because in the
Phishing is a type of social design where fake email
case study methodology and among its 3 categories
or instant messages that look like those from
of case which are explanatory case study, descriptive
trustworthy or realized sources are sent. Regularly
case study and exploratory case study.
irregular assaults, the purpose of these messages is to
During this case we focused on 2 main issues which
take delicate information, like a charge card or login
are the how to keep our home system safe and the
data. (Shea, 2021)
why must we keep it safe.
Spare phishing is a kind of phishing assault that has
For this methodology I went for both quantitative and
an expected objective client, association, or business.
quantitative approach.
(Shea, 2021)
8. Overview of the proposed system
Insider dangers are security breaks or misfortunes
Educating people around the fact that the human
brought about by people - for instance, workers,
being is the weakest link to an information system is
project workers, or clients. Insider dangers can be
extremely important. Even if a person knows the
noxious or careless in nature. (Shea, 2021)
danger and the extensions of the damages that a
Distributed Denial of Service assaults are those
cyber-criminal can cause, a constant education of the
where various frameworks disturb the traffic of a
house holder on the new technology threats as well as
designated framework, like a server, site, or another
an implication of a third party for a better protect of
organization asset. By flooding the objective with
the home system.
messages, association solicitations, or bundles, the
assailants can slow the framework or crash it, 9. Conclusion
keeping real traffic from utilizing it. (Shea, 2021)
In conclusion we can say that the risk is too big to be
Advanced persistent threats are delayed designated
ignored, just like big companies are suffering from
assaults in which an aggressor invades an
cyber-criminals and their numerous attacks, so are
organization and stays undetected for extensive
the smart houses. Keeping one’s system safe might
stretches of time with the expected to take the
just make the difference between life and death.
information. (Shea, 2021)
References
AbcAssignmentHelp.com., 2021. CHALLENGES IN CYBER SECURITY : LITERATURE REVIEW, s.l.: s.n.

Azmi, R., Tibben, W. & Win, K. T., 2016. Motives behind Cyber Security Strategy Development:A Literature
Review of National Cyber Security Strategy, s.l.: Australasian Conference on Information Systems.

Caulfield, J., 2020. research paper introduction. [Online]


Available at: https://www.scribbr.com/research-paper/research-paper-introduction/
[Accessed 1 November 2021].

Cavelty, M. D., 2013. From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-
Security Discourse. 15th ed. s.l.:International Studies Review.

Dewar, R., 2014. The "Triptych of Cyber Security' : A Classification of Active Cyber. 6th International Conference
on Cyber Security ed. s.l.:International Conference on Cyber Conflict.

JR, V., 2013. Cyber Security and IT infrastructure protection. s.l.:Oxford:OUP.

Lee, I., 2020. Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management, s.l.:
School of Computer Sciences, College of Business and Technology, Western Illinois University.

Robles, R. J. & Kim, T.-h., 2010. A Review on Security in Smart Home Development , Daejeon: School of
Multimedia, Hannam University.

Shea, S., 2021. What is cybersecurity?. [Online]


Available at: https://searchsecurity.techtarget.com/definition/cybersecurity
[Accessed 1 November 2021].

Soomoro, Shah & Ahmed, 2016. Information security management needs more holistic approach: A literature
review, s.l.: International Journal of Information Management.

The Editors Encyclopaedia Britannica, 2021. technology : computer security. [Online]


Available at: https://www.britannica.com/technology/computer-security
[Accessed 15 August 2021].

ukdiss.com, 2021. Cybersecurity: Analysis of Issues and Threats, s.l.: ukdiss.com.

Ulum, M., 2017. Literature review on cyber security discourse, s.l.: s.n.

You might also like