Ais 3 Report Notes

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

GROUP 6

WAYS TO SECURE ENDPOINTS


1. Outfit employee endpoints with multi-factor authentication
2. Use one-way password hashing with strong encryption to protect passwords.
3. Delete unnecessary customer and employee data from endpoint devices
4. Validate inputs to avoid code injection attacks.
5. Consider implementing Microsoft’s Enterprise Mobility + Security
6. Use rate limiting to prevent unreasonable access and block DoS attacks
7. Update your security and recovery plans to reflect the latest additions/changes to your network
infrastructure

GROUP 2
OTHER EXAMPLES OF METRICS
1. CONNECTION SPEED
- Measures the connection speed and quality of your connected device to the internet
- Analyze different aspects of your internet connection, namely ping (latency), download speed,
and upload speed.
- Wi-Fi speed test as example
- Under operational metrics
2. DWELL TIME
- Under organizational metrics
- Track amount of time that users spends or strays on the page, to see work patterns of
employees.
- Paxyroll as an example.
3. BUYING/SELLING BEHAVIOR
- Enable secure online payments without the third-party intermediaries
- Financial transfer records (amount, time, conversion details)
- Crypto as example, an encrypted data string that denotes a unit of currency. It is monitored and
organized by peer-to-peer network called a blockchain, which also serves as a secure ledger of
transactions, e.g., buying, selling, and transferring.

GROUP 1
OTHER EXAMPLES OF INTERNET THINGS
1. Windows IoT: Facial Recognition Door
- This project utilizes a Raspberry Pi, basic Webcam, and an internet connection to create a door
that unlocks itself via facial recognition.
2. IoT-based Smart Mirror
- According to Home Streamliner, a smart mirror consists of a monitor and tiny computer behind
a two-way mirror. The display can act much like a smart watch, showing you the time, news,
weather forecast or your calendar.
3. Smart Doors
- It opens after scanning your face and palm for identity
- Includes in-built delivery receptacles - one for packages and one for perishables
- Inside of the door, a mirrored display shows all the info you'd want on your way in or out: traffic
and weather updates, grocery receipts and more
4. Smart Irrigation
- monitor weather, soil conditions, evaporation and plant water use to automatically adjust the
watering schedule to actual conditions of the site
- Weather-based controllers, also referred to as evapotranspiration (ET)
- Soil moisture sensor-based smart irrigation controllers
5. Air Monitoring System
- has become crucial for the environment
- uses air sensors to sense the presence of harmful gases
- data collected can be used by the local authorities to make a detailed analysis
6. Smart Alarm Clock
- self-setting alarm, uses your google calendar to check your appointments to set the alarm
- can procure data from GPS
- considers the weather to automatically adjust your wake time
7. Weather Monitoring System
- The Weather Reporting System is primarily utilized to monitor the constantly changing climatic
and weather conditions over-regulated areas like homes, industry, agriculture, and so on.
8. Smart Wheelchair
- An advanced prototype of the smart wheelchair has integrated sensors that continually
generate mass data from the patient actually sitting in it, for example the pressure distribution
in the seat and backrest.
9. Smart Streetlight System
- The goal of an automated streetlight management system using IOT is to conserve energy by
reducing both manpower and electricity waste.
10. Electronic Door Lock
- Users are identified by an RFID card in access control systems, which are typically found in
offices or hospitals.
- Access permissions can be changed. The administration software allows you to change the key's
access rights quickly and easily. The digital lock is notified of the changes.
- Updates are made remotely. Many digital locks are linked to a network, allowing access rights to
be changed remotely.

GROUP 8
EXAMPLES OF NETWORK AND HOW THE NETWORK DEVICES WORK IN THE CHOSEN EXAMPLES
1. Google Drive
- Google Drive allows you to exchange images, movies, and files, it serves as an illustration of a
computer network. A user may save files on Google Drive and then share those items with
another user. This network enables remote file exchange between various PCs and gadgets via
an internet connection.
How network devices work in Google Drive?
- To illustrate, A is a student, and he needs to transfer his files from his computer to his
classmate’s device. Using the router that will connect his computer to the internet, he can now
upload files to his Google Drive that will allow him to share the files to his classmate’s computer.
- Network devices used: router, computer

2. Traffic Monitoring Devices


- Vehicles in moving traffic are automatically and continually monitored by a traffic monitoring
system. A wide range of parameters from vehicles, infrastructure, and the environment are
recorded, gathered, evaluated, and visualized using sensors that are installed in or next to the
road.

How network devices work in Traffic Monitoring Devices?


- Global Positioning System (GPS), Sensors, Cameras, and Bluetooth or WiFi make up the traffic
monitoring system. The traffic personnel will be notified via the Internet when the sensor
detects traffic. The cameras are also used to monitor the state of the roads and in case of
emergencies. For instance, the sensors will alert the traffic personnel through Bluetooth or WiFi
when they detect slow-moving autos in a certain region. The traffic officials will then work to
clear the traffic while sending notifications to various navigation applications alerting cars to
nearby traffic. All of this will be made possible via the Internet.
- Networks devices used: router, computer, other frequently used devices, cameras, sensors

3. IP Camera
- Internet Protocol Camera, is a digital video camera used for surveillance and at the same time,
captures and transmits data over a fast Ethernet link.
- Whether it’s about protecting your home or any private property from prying eyes, there are
two common types of systems used for video surveillance, IP Cameras and CCTV Cameras. While
both the cameras are used basically for the same purpose, they differ in how they function to
meet specific security needs.
- An IP Camera, or Internet Protocol Camera, is a digital video camera used for surveillance and at
the same time, captures and transmits data over a fast ethernet link. CCTV, or Closed-Circuit
Television, is a system in which the signals are closely monitored for surveillance and security
purposes.
- Networks devices used: router, modem, computer, POE switch, network video recorder, other
devices

How network devices work in IP Camera?


Switch
- A PoE switch for IP cameras is a device used to connect and power the IP cameras via Ethernet
cables.
- The PoE switch network device function in IP camera system is to interconnect the cameras to
an NVR (Network Video Recorder) and transmit the data (video and audio) to be recorded in
such a device like the monitor on the image.
Local PC
- On the second line, the PoE switch is used to transmit power and data via a network cable from
the IP Camera to the Local PC. If your camera is PoE enabled, you do not need extra external
power supply.
Router
- Connect an IP Camera to Computer and other device via Switch, Router, and Modem
- The IP Camera is connected to the PoE switch and the PoE switch is connected to the LAN or
local network of the router and the WAN (Wide Area Network) connection is the connection to
the cable modem which provides the internet. From that, the PC and other devices can see and
access what the IP Camera is capturing or monitoring.

You might also like