0% found this document useful (0 votes)
3 views

Assignment 01

The assignment for CSC432 at COMSATS University requires students to select a recent paper on cybersecurity related to IoT applications. Students must analyze a specified scenario of attack, identifying a vulnerability, cyber-attack, threat, and countermeasure, while also discussing relevant security objectives within the C-I-A framework. The assignment emphasizes understanding fundamental concepts and ethical issues in information security.

Uploaded by

Maryam Farooq
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Assignment 01

The assignment for CSC432 at COMSATS University requires students to select a recent paper on cybersecurity related to IoT applications. Students must analyze a specified scenario of attack, identifying a vulnerability, cyber-attack, threat, and countermeasure, while also discussing relevant security objectives within the C-I-A framework. The assignment emphasizes understanding fundamental concepts and ethical issues in information security.

Uploaded by

Maryam Farooq
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

COMSATS University, Islamabad (CUI)

Department of Computer Science


Assignment – 01

Course: CSC432- Information Security Time Allowed (-) / Total Marks: 10


Date: 07-03-2025 Class / Semester: BSSE-5A / Spring- 2025
Reg. no: _________________________________ NAME ___________________

[CLO1]: (Discuss the fundamental concepts, policies, standards and ethical issues of information security.)

Question#01:
a) For this assignment you must select a recent paper (within the last five years) on the topic
cyber security to IoT Application. There are many articles you can find. For example, the
following recent special issues have a variety of papers on the topic:
Kuzlu, M., Fair, C. and Guler, O., 2021. Role of artificial intelligence in the Internet of Things (IoT)
cybersecurity. Discover Internet of things, 1(1), p.7.
In the lectures, we defined vulnerability, cyber-attack, threat and countermeasure. Based
on the paper you have read, please specify a scenario of attack that you think may be
possible to apply to some component of the IoT applications. In your discussion you
must specify (i) a vulnerability, (ii) a cyber-attack, (iii) a threat, and (iv) a possible
countermeasure. This question is trying to get you thinking in terms of “security”.
b) Using the same paper, discuss and justify which security objectives within the C-I-A
framework is being addressed. It may be more than one.

End

You might also like