Information Sciences Research Methodology PG (6797) ICT Eng Research Methods (9826) Assignment 2 Guide
Information Sciences Research Methodology PG (6797) ICT Eng Research Methods (9826) Assignment 2 Guide
Mature assessment frameworks from ISACA and NIST were integrated as the logical foundation.
This phase involves determining the product needs (based on market possibilities and
competition analysis) then designing, developing, and testing it to see whether it meets those
criteria. SHD construction should include safety concerns, initiating measures such as how
different components may be linked. These encryption techniques point to ways the SHEs may be
designed to enhance security while minimizing data access. First is a "Secure Development
Methodology"; second, there are "Security Capabilities for Hardware and Software." The project
plan of the SHD lifespan includes both of these components.
Methods
Businesses increasingly rely on the Internet of Things (IoT) to make activities, procedures, and
items better. However, although technology offers limitless possibilities, it also poses enormous
difficulties, especially in cyber threats and associated security measures. How can we keep billions
of linked devices safe and robust across the world? 'Cybersecurity by Layout' seems to be a viable
option as a sensible one. Many cyber-threats threaten the lives, welfare, and health of people
living in 'Smart Homes .' Therefore, they were chosen as an analytical unit in this study. Using
"design science" as a technique, we created a comprehensive strategy to protecting Smart Home
Environments (SHEs) against cyberattacks, emphasizing "good practices" that may be
implemented throughout the SHEs product lifetime. 'Cyber Security Proficiency Evaluation' tool
has been created for SHEs in conjunction to these recommended practices. With their validation
and gradual improvement, both objects are prepared for new use and modifications.
Explain who will your research be relevant to including the relevant research community. Think
in terms of the ‘stakeholders’ we discussed who may benefit from your research, andexplain
how so.
A cybersecurity project's typical stakeholders comprise software engineers, people management
personnel, financial management personnel, brand management personnel. Participants are in
charge of large-scale cybersecurity in places like intelligent urban spaces. It's only via
interconnection that smart cities and architecture can come to their full potential. According to
the whitepaper, everyone has a role to play in ensuring the integrity of the system.
Additional Topics
2. Discuss how you would address issues of research quality and how it would be assured?
Quality data includes both accuracy and trustworthiness, as well as relevance; data may be
trustworthy while yet being meaningless to a company. Reducing re-fielding costs and saving time
may all be achieved by improving data integrity.
References List