Professional Documents
Culture Documents
Topic Identification Matrix G9PCM 2
Topic Identification Matrix G9PCM 2
Major Topic
Area of Interest
Specific
Variables/Topic
Title
Santos, Ashly
Studies
and mine
cryptocurrencies. A
allow attackers to
take control of
security cameras.
dealing with
improving an
efficient
authentication and
authorization
resource intensity to
token maintenance.
The application
versus performance
of a secure
application protocol
stack
implementation can
also be tuned to
support a Layer 7
(application)
security filtering
mechanism, such as
a Web Application
firewall.
Things market
grows, hackers'
gaining control of
layer-by-layer
security challenges
in Physical,
Network, and
Application layers.
The study
recommends a
unified secure
architectural
solution for
architecting,
designing IOT
applications. This
design philosophy
Design approach
when identifying
security measures
author identified
research gaps in
Operation Security
paper by posing a
challenge to enable a
wager between
performance and
building security
controls when
designing IoT
architectures.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.