Skip to content
Snippets Groups Projects
Unverified Commit a34b8f1d authored by Dr Nawfal Al Hashimy's avatar Dr Nawfal Al Hashimy Committed by GitHub
Browse files

Update README.md

parent f583d3e2
No related branches found
No related tags found
No related merge requests found
......@@ -5,4 +5,6 @@ Currently, many IoT devices are very susceptible to cyber-attack due to insuffic
- Investigating and conducting a risk assessment on the main vulnerabilities and threats faced by IoT devices within this scenario.
- Recommend security policies that can mitigate these threats, justifying these policies taking into account secondary factors including the cost to implement and any loss to productivity these policies might incur.
- Model these policies using Scyther, a formal method based protocol verification tool. The scope of this project will be investigating and modelling the best policies and procedures for IoT devices in the smart grid/energy sector.
- Model these policies using Scyther, a formal method based protocol verification tool.
The scope of this project will be investigating and modelling the best policies and procedures for IoT devices in the smart grid/energy sector.
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment