...1. Future areas of Application 2.1 Health Monitoring A health center is able to monitor the blood sugar levels of a chronic diabetes patient and possibly take early action in case of a sudden change in the normal trends. Whenever the patient tests his blood sugar level in the convenience of his home, the meter uploads the information to a ‘cloud’ which then is fed into the database of the health center for regular monitoring. It is estimated that over 640 million IoT devices will be used for healthcare by 2020. However the downside is the potential hacking risk posing threat to the patients relying on these devices. 2.2 Inventory Management IoT comes in handy by helping to replenishing production critical spare parts automatically without the intervention of a store keeper or a foreman. A preset counter decrements itself whenever a new order for a spare part is received from the production line. The ‘smart’ storage is programmed to send an automatic message directly to the supplier when a minimum buffer level was reached. The supplier of the part can then proactively make arrangements to deliver the part in time. 2.3 Wearables...
Words: 459 - Pages: 2
...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA NT2580 NT2670 Introduction to Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to Security Auditing for Compliance Countermeasures Information Security Email and Web Services NT1230 NT1330 Client-Server Client-Server Networking I Networking II IS3230 IS3350 NT1230 NT1330 Issues Client-Server Client-Server SecurityContext in Legal Access Security Networking I Networking II NT1110...
Words: 2305 - Pages: 10