Project - Internet of Things - ثاني ثانوي

66 Project loT applications are complex systems with many technical and operational layers to function properly and effectively. 1 Choose an industry where loT is commonly used but is vulnerable to cyberattacks and data exploitation. Describe how a security vulnerability could be used to attack this system and what the repercussions are for the end users. 2 Create a PowerPoint presentation that describes the industry that you have chosen, Illustrates the vulnerability problem, and contains a proposal for a solution to this problem. وزارة التعليم 173-1445

Project

IoT applications are complex

Choose an industry where IoT

Create a PowerPoint presentation

Wrap up Now you have learned to: > Distinguish cloud, log, and edge layers for loT applications. > Classify the main technological enablers of loT systems. > Classify the networking protocols and systems that connect loT applications. > Identify how loT applications are used in the economic and government sectors > Describe how loT applications will evolve in the near future. > Define the main technological challenges that loT engineers are facing. > Distinguish the security concerns of loT systems. > Describe how loT applications are currently regulated. KEY TERMS Authentication Authorization Data at Rest Data in Motion Denial of Service (DoS) Attack Edge Analytics Edge Computing Eulge Device Electronic Product Code (EPC) Endpoint Fog Computing Gateway Internet Protocol (IP) IoT Enabler IoT Services IPv6 Latency Near-Field Communication (NFC) Protocols Radio Frequency IDentification (RFID) Regulations Regulatory Framework Smart Grid Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Wireless Sensor Networks 67

Project

Now you have learned to:

KEY TERMS Authentication