Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

18ECP101L-MASSIVE OPEN ONLINE COURSE-1

SEMESTER V
YEAR: AUG 2021

CYBER SECURITY AND THE INTERNET OF


THINGS

Report Submitted by
RESHMI S KUMAR [RA1911004010550]

Faculty in-charge
ELAMARAN E

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

FACULTY OF ENGINEERING AND TECHNOLOGY

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY

S.R.M. Nagar, Kattankulathur - 603203, Kancheepuram District


TABLE OF CONTENTS
S.NO TITLE PAGE NO.
1. COURSE DETAILS 2

2. INSTRUCTOR PROFILE 4

3. INTRODUCTION OF THE COURSE 5

4. COURSE TIMELINE 5

5. SYLLABUS 6

6. WEEK-1 CONTENTS 8

7. WEEK-2 CONTENTS 9

8. WEEK-3 CONTENTS 9

9. WEEK-4 CONTENTS 10

COURSE GRADE DETAILS (INCLUDING


10. 11
QUIZ/ ASSIGNMENT GRADES)

11. COURSE OUTCOME 11

PROOF OF COURSE COMPLETION


12. 12
1. COURSE DETAILS

COURSE PLATFORM- Coursera


COURSE TITLE- CYBER SECURITY AND THE INTERNET OF THINGS

OFFERING UNIVERSITY- University System of Georgia

COURSE DURATION- 4 weeks

DASHBOARD:
2. INSTRUCTOR PROFILE

● Dr. Humayun Zafar is a Professor of Information


Security and Assurance and FinTech Coordinator at Kennesaw
State University, where he has also served as a Research
Fellow. He received his doctorate from the University of Texas at San
Antonio. His cyber security research has appeared
in numeral journals and conferences. In 2014 he
received an award from the Graduate school of Kennesaw State for his
Research and Creative Activity.
● He routinely presents at professional conferences such as Mobility live
and has appeared in the media numerous times for his
expertise in the area of security and mobility. Check out this podcast.
● In summer 2013 he designed the MAD Junior program to impart STEM
knowledge to middle school students through creation of mobile games.
He recently received multiple grants from Google (via the Tides
Foundation) to continue with the program and partner with local
non-profit agencies such as Computers For Youth (CFY) to encourage
minorities to enroll in STEM programs.
● Over the years, Dr. Zafar has taught numerous online undergraduate and
graduate courses that pertain to cyber security at Kennesaw State
University.
● He is an avid tennis player and is pretty active on the marathon circuit.
He also holds multiple cybersecurity certifications.
3. INTRODUCTION OF THE COURSE

The most recent trends and activities in the internet capabilities and
concerns about programmed devices. There are complexities and areas of
necessary awareness when the industrial sector becomes connected to our
home.
● Security policies and practices have not yet caught up to the internet
capabilities of some of our most common products.
● The “connected home”, “consumer wearables”, or even an employee’s
HVAC system may cause an unanticipated threat to your business
environment.
● Will explore current security and privacy related concerns in each of
these areas. Every module will include readings, videos, case studies,
and a quiz to help make sure you understand the material and concepts
we talk about.
● To learn, reflect, and plan for a smart community approach to IoT.
Portions of this course may seem extremely technical in nature. That is
because the “things” in IoT represents engineering.

4. COURSE TIMELINE

DATE OF ENROLLMENT: 21st July 2021


DATE OF COMPLETION: 24th August 2021
5. SYLLABUS
WEEKLY REFERENCE MATERIAL
MODULE 1:
https://www.coursera.org/learn/iot-cyber-security/supplement/B37Dc/what-is-the-internet-of-thing
s

MODULE 2:
https://www.coursera.org/learn/iot-cyber-security/supplement/36Z63/the-internet-of-things-promis
e-for-the-future-an-introduction

MODULE 3:
https://www.coursera.org/learn/iot-cyber-security/supplement/NzZP7/internet-of-things-to-generat
e-400-zettabytes-of-data-by-2018

MODULE 4:
https://www.coursera.org/learn/iot-cyber-security/supplement/8zUQy/internet-of-things-new-securi
ty-and-privacy-challenges

6. WEEK 1 CONTENTS

In this course, we will talk about the so-called “Internet of Things” and what it means in the
industrial sector, the “connected home”, and “consumer wearables” arenas.
● Welcome to the Internet of Things!
● How To Succeed In This Course.
● How Organizations Address IoT.
● IoT in the Business World.
● What is the Internet of Things?
● The Internet of Things – Promise for the Future? An Introduction.
● Internet of Things to generate 400 zettabytes of data by 20181.
● Internet of Things – New security and privacy challenges.
7. WEEK 2 CONTENTS
In this module, you will explore how IoT devices are used in
the industrial sector. You will explore some of the common
devices in use today, learn how they work, and how
businesses and consumers benefit. You will also be exposed
to some of the security and privacy-related issues found in
this sector.
● Module Overview.
● IoT and its Use in Organizations.
● IoT and Organizational Risks.
● The Future of Corporate IoT.
● Industrial Sector and IoT: A Second Look.
● Learning Objectives.
● Internet of Things in Industries: A Survey.
● The Internet of Things in an Enterprise Context.
● Internet of Things Technology and its Application in Smart
Grid.
● A Survey on Internet of Things: Security and Privacy Issues.
● Internet of Things in healthcare: Interoperability and
security issues.
● Putting It All Together.

8. WEEK 3 CONTENTS

In this module, we will guide you through some of the


more common IoT devices in use in a modern “connected
home”, and how they are used. We will also show you
some of the big security and privacy-related issues found
with these devices, and their use in our homes
● Module overview
● Your Connected Home
● Learning Objectives
● Smart Community: An Internet of Things
Application
● Internet of Things: A Survey on Enabling
Technologies, Protocols, and Applications (p.
2347-2360 only)
● The Internet of Things: Risks in the Connected Home
● How IoT is challenging enterprise security
● Putting It All Together

9. WEEK 4 CONTENTS

In this module, we will expose you to IoT devices in the


consumer wearables sector. You will learn about some of
the more popular devices, how they are used, what data
they can report about you, and how that data may be used.
As with the other modules, we will also help you explore
current security and privacy-related concerns that are out
there.
● Module overview
● Consumer Wearables and the Organizational Risks
● Future Opportunities for IoT
● IoT and the Cloak of Invisibility
● Learning Objectives
● Sensor Mania! The Internet of Things, Wearable
Computing, Objective Metrics, and the Quantified
Self
● CES 2016: Fashion meets function in smartwatches,
fitness trackers and other wearables
● Wearable Technology and the Internet of Things
● As IoT risks rise, security vendors won’t meet
challenge, says Gartner
● Regulating the Internet of Things: First Steps Toward
Managing Discrimination, Privacy, Security, and
Consent (p. 128-131 only)
Putting It All Together

10. COURSE GRADE DETAILS

11. COURSE OUTCOMES


(Write about future scope and application of the course)
Cybersecurity is an essential business skill for the evolving
workplace. For-profit companies, government agencies, and
not-for-profit organizations all need technologically proficient,
business-savvy information technology security professionals. In
this Specialization, you will learn about a variety of processes for
protecting business assets through policy, education and training,
and technology best practices. You’ll develop an awareness of the
risks and cyber threats or attacks associated with modern
information usage, and explore key technical and managerial
topics required for a balanced approach to information
protection. Topics will include mobility, the Internet of Things,
the human factor, governance and management practices.

12. PROOF OF COURSE COMPLETION

COURSE CERTIFICATE

You might also like