How the functionality could used to support iot application


Homework

For your final step, synthesize the previous steps and labs to summarize the major findings and from this project.

Specifically, prepare a technical report that summarizes your findings. Include all of the following elements:

• The strengths and limitations associated with limiting access of web pages through the use of firewalls.

• A detailed description of how tunneling through firewall via SSH worked and how the process could be used protect a private subnet. Describe the implications of using a jump box for access to the private subnet. Cover concerns such as key storage, creation, and rotation at scale for a large organization.

• TLS communication challenges and results from your TLS 1.3 Java client-server implementation. Describe how this functionality could be used to support an IoT application with hundreds of thousands of remote sensor devices connecting across a distributed network.

• A discussion of major threats to WLANs and how each can be mitigated. Provide security monitoring best practices and describe suitable approaches to protecting a WLAN.

Delve further into these topics by conducting research beyond the classroom readings and lab exercises to gain further insight and enhance your report.

Naturally, I expect your report will include a title page, table of contents, list of tables and figures (if applicable), and a list of references. Organize the content into sections, with clear, meaningful headings.

Format your homework according to the give formatting requirements:

• The answer must be using Times New Roman font (size 12), double spaced, and typed, with one-inch margins on all sides.

• The response also includes a cover page containing the student's name, the title of the homework, the course title, and the date. The cover page is not included in the required page length.

• Also include a reference page. The references and Citations should follow APA format. The reference page is not included in the required page length.

References
• Joint Task Force Transformation Initiative. (2015, January 22). "SC-7 Boundary Protection," from Security and Privacy Controls for Federal Information Systems and Organizations.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: How the functionality could used to support iot application
Reference No:- TGS03180902

Now Priced at $30 (50% Discount)

Recommended (90%)

Rated (4.3/5)