B5 Security of IoT systems and devices The management of security protection methods in IoT systems and devices.
•
Security threats to unmanned or unguarded systems and devices, including
physical tampering, hacking or unauthorised monitoring.
•
Remote management, including firmware updates to correct faults or recovery
operations.
•
Effects of malicious attacks, e.g. loss of data, loss of control of the device and
damage caused by the device.
•
Security protection methods, including use of device certificates at each end
to authenticate communications, data should be encrypted to prevent
interception, use of SSL certificates and use of code signing with digital
certificates to secure software and firmware updates.
Learning aim C: Carry out the prototyping of an integrated Internet of Things system or device to solve a problem C1 M2M integrated system or device operations The development and application of integrated operations for M2M systems or devices,
including:
•
connectivity and normalisation of M2M operations, including the integration of
different protocols and different data formats into one software interface,
ensuring accurate data string and interaction with all devices
•
device management ensures the connected devices are working properly,
seamlessly running patches and updates for software running on the device
•
database use with a scalable storage for device data, satisfying requirements
for hybrid cloud-based databases, e.g. with data volume, variety, velocity and
conformity to accuracy
•
processing and action management brings data to life with rule-based event
action triggers, enabling execution of smart actions based on a specific sensor,
e.g. event processing
•
visualisation enables humans to see patterns and observe trends from
visualisation dashboards, where data is vividly portrayed through graphical
2D and 3D models.