Development of A Smart Arduino System For Monitoring and Addressing Cybersecurity Threats
Development of A Smart Arduino System For Monitoring and Addressing Cybersecurity Threats
Presented to:
Presented by:
Conde, Conjielha D.
Arevalo, N-Jay G.
1
APPROVAL SHEET
JERICO VILOG
Adviser
JERICO VILOG
2
ACKNOWLEDGEMENT
appreciation and gratitude for all of their tireless efforts and dedication on
their behalf.
patience, and great knowledge. They learned from his guidance as they
A particular thank you to their parents, who have provided them with
And lastly, the researcher also wants to express their gratitude to their
members for the joy they have had, the interesting conversation, and the
3
ABSTRACT
foundation for data gathering and analysis will be offered by the system’s
security, this creative Arduino system aims to educate student about the
all included in the research's scope, with an emphasis on how well it can
environments.
4
TABLE OF CONTENTS
ACKNOWLEDGEMENT................................................................2
ABSTRACT................................................................................3
TABLE OF CONTENTS................................................................4
CHAPTER I: INTRODUCTION.......................................................5
DEFINITION OF TERMS.......................................................................16
HARDWARE........................................................................................ 18
SOFTWARE......................................................................................... 19
METHOD OF RESEARCH.....................................................................21
SOURCE OF DATA...............................................................................23
BLIBLIOGRAPHY......................................................................24
CURRICULUM VITAE.................................................................25
5
CHAPTER I: INTRODUCTION
With the state of technology today, the biggest issue facing people,
networks and hacking of physical objects; the integrity of digital and physical
objects teeters on the edge. Therefore, the only solution to such fears is a
coming together of new technology that will be able to evaluate, detect, and
Over the last few years, incidents of cyberattacks and breaches have
digital realms. Much of the real world and cyberspace inadequacies rely on
nefarious agents are welcomed. awareness and need for monitoring systems
6
The emergence of "Smart" Systems. As the need for all-encompassing
systems that monitor in real time, allowing for proactive and automated
microcontroller in a box with built-in physical sensors (temp, motion, etc.) and
wireless sensing capabilities. One can create just about anything one desires.
7
especially in light of the rapid increase in the range and complexity of cyber
threats.
without real-time protection and effective threat response. This study aims to
device.
and mitigation?
threats?
for tracking and handling cybersecurity risks has great relevance. The system
8
can identify and react to threats in real-time, as well as the overall security
allowing for the development of specialized security solutions that can adjust
Arduino system, users can gain a robust and adaptable tool for monitoring
environment.
9
SCOPE AND DELIMITATION
environments such as homes, small offices, or schools. The system will use
study will; Design and develop a functional prototype using Arduino. And
then, test the system’s ability to detect basic cybersecurity threats. Evaluate
techniques. Since Arduino has limited processing power, the system cannot
cybersecurity professionals.
all facets of qualitative research and highlights their significance in the field.
people's work) that serve as the study's frames is the goal of this chapter.
10
REVIEW OF RELATED LITERATURE AND STUDIES
addressing cybersecurity threats from the past to the present. These studies
and literature also serve as a guide for the researchers as they develop the
a. Smart Home Automation and Security System using Arduino and IOT
using the internet of things (IOT). Our paper, "Sensing and controlling
technologies and the internet of things (IOT) using Arduino, which uses
embedded blocks and script programming for Arduino and sensors like
this study. The Arduino will be used to interface with the sensors.
Camera
11
Purbaya et al. (2017) found that the requirement for an area's
processing, this system will identify the individual who entered and
area and record video. The Graphical User Interface (GUI) will be
12
Microcontroller. The proponents will program the GUI to determine
when to take a picture of the video, which will then be shown on the
GUI for image processing to identify the object that was captured. The
a parallel port that can be turned from a USB port to a command that
will turn the switch on or off. The device will sound an alert until the
harming crops.
house warning systems are in high demand these days since they alert
they are distant from their homes. Presenting the design and execution
measures, such as using water to put out a fire and air ventilation to
13
preventing resource and human life losses brought on by unintended
circumstances.
communication protocols.
14
adaptability make it a feasible option for real-time monitoring in smart
security systems.
a. IoT Security and the Role of Arduino-based Systems (Zhao & Ge, 2020)
2019)
15
algorithms and intrusion detection methods implemented on Arduino-
Both studies provide valuable insights into the role of Arduino in IoT
DEFINITION OF TERMS
operate automatically.
appliances, and other physical objects that are embedded with sensors,
software, and network connectivity, allowing them to collect and share data.
16
Arduino- an Italian open-source hardware and software company, project,
applications.
This chapter covers the project's technical aspects, including how the
current system will function and the specifics of the technology that will be
HARDWARE
17
SOFTWARE
including the research design, tools and procedures used for data collecting,
METHOD OF RESEARCH
To gain deeper insights into the system’s impact, the study will also
18
determining how well the system performs in comparison to traditional threat
improvement.
SOURCE OF DATA
19
necessary requirements for originality, validity, and dependability, the data
meeting the goals of the study and answering the research questions.
20
CURRICULUM VITAE
21