Get 15% off on your first assignment order and best assignment writing service for HND AssignmentsOrder Now

Have Any Question?

UK +4474648-84564

Free Support


Get Help in 7026CEM Security of Emerging Connected Systems


Get Help in 7026CEM Security of Emerging Connected Systems Assignments with HND Assignment Help at an affordable price and quality delivery on time.

  Module Title Security of Emerging Connected Systems  Individual  Cohort 2122JANMAY  Module Code 7026CEM
Coursework Title Coursework 2 –IoT systems design and security evaluation according to OWASP listsHand out date: 30th Mar 2022
  Lecturer Dr Basil ElmasriDue date and time: 19th Apr 2022 18:00:00
Estimated Time (hrs): 25 – 30. Word Limit*: 2500, not including appendices, logs, screenshots, PoCCoursework type: ReportThis assessment is worth 10 credits
Submission arrangement online: File types and method of recording: docx only. Mark and Feedback date: 10th May 2022. Mark and Feedback method (e.g. in lecture, written via Gradebook): TurnItIn/online grading and feedback.

Task and Mark distribution:


You are given access to an IoT environment, representing a home owned by early adopters in the current move to “smart homes”. The devices are all from a single manufacturer and you are required to evaluate the security aspects of the system before marketing and sale of the devices.

You will be given access to a testbed network to perform a practical security audit as well as associated documentation for review.

Task Breakdown

  1. A security evaluation report on the test-bed system. This is a “white-box” analysis, so you should execute it as a security review rather than a penetration test. You can examine any of the files and materials you are given, but any security vulnerability should be demonstrated with a proof-of-concept (POC) attack that would work without the information gained through white-box testing. Make sure you consider more than just direct attacks on the devices. Also, consider what information is exposed about the consumer.
  2. A report to the manufacturer on your findings that includes a short review of each problem, along with a brief overview of how it could be solved. For each issue, you should have a more detailed description of the steps you took to discover it, showing enough detail for it to be repeated by the developers.
  3. For each vulnerability and security issue, you have to analyse it according to the OWASP® Foundation security topics; the top 10 risks and vulnerabilities, 2014 and 2018.
  4. You have to research and report on each possible security issue and give:
    • The OWASP category for each security issue belongs to.
    • A technical explanation describing why and how the issue does belong to that category, e.g.:
      • Programming/application analysis security issue.
      • Networking security analysis issue.
      • Or any other field that the issue might relate to.
    • An alternative technical solution to prevent the issue or issues.


  • You will be given a collection of docker build scripts and Makefiles.
  • Although you have access to the non-live versions of the systems, their Dockerfiles, Makefiles and so on, this does not count as a vulnerability. This is just the mechanism by which you gain access to the virtualised IoT environment.
You can, however, examine all of these files to see if there might be vulnerabilities or security flaws you can demonstrate in the running system. This is the equivalent of having the source code for the IoT systems and being able to review the code, making this a “white box” test.
The system is comprised of: An MQTT server that coordinates internal messaging and provides a web front-end for the user Database server that stores local information, settings and so on a number of devices within the system. a temperature sensor heating system light sensor All of the services are containerised in order to minimise platform dependency. For the purposes of this coursework, you can assume that the underlying platform is secure unless the container itself is compromised. You will be given a separate container for each of the services, and they will function in “virtual mode” while not on actual hardware. You are also provided with a document describing the design of the infrastructure outside of the containers. You must include this in your assessment, but rather than look for vulnerabilities in the implementation for this part, you must assess the design decisions presented.   Report Some recommendations on writing a report: Use 3rd person and passive voice rather than 1st and 2nd person. Use MS Word with Arial or Sans Serif font, size 12, and 1.15 line spacing. Paragraphs are left in alignment. Acronyms should be capitalised, explained, and added to a table of acronyms at the beginning of the report. Figures, tables, and graphs should be captioned and added to the list of figures, tables, and graphs. Add a table of contents at the beginning of the report. Avoid using American English and try to use British English.

Get Help in 7026CEM Security of Emerging Connected Systems Assignments with HND Assignment Help at an affordable price and quality delivery on time.


  1. You are expected to use the Coventry University APA style for referencing. For support and advice on this students can contact the Centre for Academic Writing (CAW).
  2. Please notify your registry course support team and module leader for disability support.
  3. Any student requiring an extension or deferral should follow the university process as outlined here.
  4. The University cannot take responsibility for any coursework lost or corrupted on disks, laptops or personal computers. Students should therefore regularly back up any work and are advised to save it in the University system.
  5. If there are technical or performance issues that prevent submitting coursework through the online coursework submission system on the day of a coursework deadline, an appropriate extension to the coursework submission deadline will be agreed upon. This extension will normally be 24 hours or the next working day if the deadline falls on a Friday or over the weekend period. This will be communicated via your Module Leader.
  6. Assignments that are more than 10% over the word limit will result in a deduction of 10% of the mark i.e. a mark of 60% will lead to a reduction of 6% to 54%. The word limit includes quotations but excludes the bibliography, reference list and tables.
  7. You are encouraged to check the originality of your work by using the draft Turnitin links on Aula.
  8. Collusion between students (where sections of your work are similar to the work submitted by other students in this or previous module cohorts) is taken extremely seriously and will be reported to the academic conduct panel. This applies to both coursework and exam answers.
  9. A marked difference between your writing style, knowledge and skill level demonstrated in-class discussion, any test conditions and that demonstrated in a coursework assignment may result in you having to undertake a Viva Voce in order to prove the coursework assignment is entirely your own work.
  10. If you make use of the services of a proofreader in your work you must keep your original version and make it available as a demonstration of your written efforts. Also, please read the university Proof Reading Policy.
  11. You must not submit work for assessment that you have already submitted (partially or in full), either for your current course or for another qualification of this university, with the exception of resits, where for the coursework, you may be asked to rework and improve a previous attempt. This requirement will be specifically detailed in your assignment brief or specific course or module information. Where earlier work by you is citable, i.e. it has already been published/submitted, you must reference it clearly. Identical pieces of work submitted concurrently may also be considered to be self-plagiarism.

Get Help in 7026CEM Security of Emerging Connected Systems Assignments with HND Assignment Help

Students can avail of assignment help services for 7026CEM Security of Emerging Connected Systems Assignments with the HND Assignment help team as they offer 100% plagiarism free content, on-time delivery and an affordable price range. Our experts have deep knowledge of the subject and can obtain high marks. Contact us today for assignment help and get a winning edge over fellow students.