This document is for Coventry University students for their own use in completing their
assessed work for this module and should not be passed to third parties or posted on any
website. Any infringements of this rule should be reported to
[email protected].
Faculty of Engineering, Environment and Computing
7026CEM – Security of Emerging Connected
Systems
Assignment Brief
Module Title Security of Emerging Connected Systems |
Individual | Cohort 2122JANMAY |
Module Code 7026CEM |
Coursework Title – Coursework 2 IoT systems design and security evaluation. |
Hand out date: 19th Nov 2022 |
||
Lecturer Dr. Basil Elmasri |
Due date and time: 5th Dec 2022 18:00 UK time. |
||
Estimated Time (hrs): 25 – 30. Word Limit*: 2500, not including appendices, logs, screenshots, PoC code, etc. |
Coursework type: Report |
This assessment is worth 10 credits |
|
Submission arrangement online: File types and method of recording: docx only. Mark and Feedback date: 10th Jan 2023. Mark and Feedback method: TurnItIn/Aula online grading and feedback. |
Module Learning Outcomes Assessed: 3. Propose and implement effective ‘defence-in-depth’ solutions to mitigate the key technical internet security vulnerabilities that organisations face. 4. Design and implement secure private networks for IoT and Bring Your Own Device (BYOD). 5. Discuss and debate a wide range of current research and technological advances in network security. |
This document is for Coventry University students for their own use in completing their
assessed work for this module and should not be passed to third parties or posted on any
website. Any infringements of this rule should be reported to
[email protected].
Task and Mark distribution: |
This document is for Coventry University students for their own use in completing their
assessed work for this module and should not be passed to third parties or posted on any
website. Any infringements of this rule should be reported to
[email protected].
to the junior specialist, the reasons why they need to do each particular step in the security analysis, and if appropriate, why they need to do the steps in a particular order. 4. The report must be written to be a guideline and a tutorial article rather than just a security analysis report of domus (which might be a failure in this piece in CW2), as well as guiding the junior specialist how to write such review report. However, if the manufacture or the developer of domus reads the report, then they should be able to look at it as if it was a security review of the system, which points out in details the vulnerabilities and technical recommendations about the vulnerabilities. • The “domus” zipped file is a collection of docker build scripts and Makefiles. • Although you have access to the non-live versions of the systems, their Dockerfiles, Makefiles and so on, this does not count as a vulnerability. This is just the mechanism by which you gain access to the virtualised IoT environment. o You can, however, examine all these files to see if there might be vulnerabilities or security flaws you can demonstrate in the running system. o This is the equivalent of having the source code for the IoT systems and being able to review the code, making this a “white box” test. Domus system The “domus” system is comprised of: • An MQTT server that coordinates internal messaging and provides a web front-end for the user • A Database server that stores local information, settings and so on • A number of devices within the system. o a temperature sensor o a heating system o a light sensor All the services are containerised to minimise platform dependency. For the purposes of this coursework, you can assume that the underlying platform is secure unless the container itself is compromised. You will be given a separate container for each of the services, and they will function in “virtual mode” while not on actual hardware. You are also provided with a document describing the design of the infrastructure outside of the containers. You must include this in your assessment, but rather than look for vulnerabilities in the implementation for this part, you must assess the design decisions presented. Piece 2 – Task Breakdown (20%): Another sensor is available to be added to the domus system. A partially prepared set of files has been made available, where you must configure it in order to make work properly with the rest of the domus system. |
This document is for Coventry University students for their own use in completing their
assessed work for this module and should not be passed to third parties or posted on any
website. Any infringements of this rule should be reported to
[email protected].
You must make sure that the sensor FULLY interacts properly with the rest of the system. You should produce either or Piece 3 – Task Breakdown (10%): You MUST discover and report the following information related to the system: 1. All IP addresses of EVERY entity in the system, including the added sensor. 2. One of vulnerabilities has detailed leaked information of the users of the “domus” system. You must list them all in your report. Report (10%): A report suitable for both technical staff and non-technical management; the style/structure of the report, and the use of language and grammar. Use proper way of citations, check Coventry University’s guide on writing. Style recommendations: o Use 3rd person and passive voice rather than 1st and 2nd person. o Use MS Word with Arial /Sans Serif font or Times New Roman, size 12, and 1.15 line spacing. o Paragraphs are left alignment or justified. o Acronyms should be capitalised, explained, and added to a table of acronyms at the beginning of the report. o Figures, tables, and graphs should be captioned and added to list of figures, tables, and graphs. o Add a table of contents at the beginning of the report. o Avoid using American English and use British English. o Wikipedia must not be used as a reference, through it can be used as a key point or a start for reading and gaining knowledge, with checking the right references. |
Marking scheme and criteria next page… |
– a detailed technical design of how the sensor should be implemented and tested to show that it works with the rest of the system, – for additional marks, fully implement and test your design. You must discuss any security concerns and vulnerabilities in the added sensor. |
This document is for Coventry University students for their own use in completing their
assessed work for this module and should not be passed to third parties or posted on any
website. Any infringements of this rule should be reported to
[email protected].
|
This document is for Coventry University students for their own use in completing their
assessed work for this module and should not be passed to third parties or posted on any
website. Any infringements of this rule should be reported to
[email protected].
Notes: 1. You are expected to use the Coventry University APA style for referencing. For support and advice on this students can contact Centre for Academic Writing (CAW). 2. Please notify your registry course support team and module leader for disability support. 3. Any student requiring an extension or deferral should follow the university process as outlined here. 4. The University cannot take responsibility for any coursework lost or corrupted on disks, laptops or personal computer. Students should therefore regularly back-up any work and are advised to save it on the University system. 5. If there are technical or performance issues that prevent submitting coursework through the online coursework submission system on the day of a coursework deadline, an appropriate extension to the coursework submission deadline will be agreed. This extension will normally be 24 hours or the next working day if the deadline falls on a Friday or over the weekend period. This will be communicated via your Module Leader. 6. Assignments that are more than 10% over the word limit will result in a deduction of 10% of the mark i.e. a mark of 60% will lead to a reduction of 6% to 54%. The word limit includes quotations, but excludes the bibliography, reference list and tables. 7. You are encouraged to check the originality of your work by using the draft Turnitin links on Aula. 8. Collusion between students (where sections of your work are similar to the work submitted by other students in this or previous module cohorts) is taken extremely seriously and will be reported to the academic conduct panel. This applies to both courseworks and exam answers. 9. A marked difference between your writing style, knowledge and skill level demonstrated in class discussion, any test conditions and that demonstrated in a coursework assignment may result in you having to undertake a Viva Voce in order to prove the coursework assignment is entirely your own work. 10. If you make use of the services of a proof reader in your work you must keep your original version and make it available as a demonstration of your written efforts. Also, please read the university Proof Reading Policy. 11. You must not submit work for assessment that you have already submitted (partially or in full), either for your current course or for another qualification of this university, with the exception of resits, where for the coursework, you maybe asked to rework and improve a previous attempt. This requirement will be specifically detailed in your assignment brief or specific course or module information. Where earlier work by you is citable, i.e. it has already been published/submitted, you must reference it clearly. Identical pieces of work submitted concurrently may also be considered to be self-plagiarism. |
This document is for Coventry University students for their own use in completing their
assessed work for this module and should not be passed to third parties or posted on any
website. Any infringements of this rule should be reported to
[email protected].
Mark allocation guidelines are given in the attached coursework brief.