Discuss Vulnerabilities, Threats, Intruders, and Attacks using IoT devices in medical health care.

Activity 2Humans are increasingly dependent on computer systems, mobile devices, and software, with a strong demand for access to computing resources on a 24/7 basis regardless of location. Medical Cyber-Physical Systems (MCPS) are life-critical, context-aware, and networked systems of medical devices that provide tight integration and coordination between the cyber world of computing and communications and the physical world of the traditional medical systems.  Write a research report Medical Cyber-Physical Systems (MCPS) that should have four sections as below:Task 2.1 (700 words): · Introduction: Introduction should answer the question ‘Why:’ why you choose that topic for research; why it is important; why you adopted a particular method or approach. You can discuss Vulnerabilities, Threats, Intruders, and Attacks using IoT devices in medical health care. Task 2.2 (1000 words): · Literature review: The literature section should discuss your findings in a manner to accentuate the progress in the field and the missing points that need to be addressed. The literature should be written as a summary of your interpretation of previous research and what your study proposes to accomplish. Please discuss how existing techniques are solving IoT medical health care issues. Critically, analyze the existing techniques and highlight their issues. Task 2.3 (1300 words):· Methodology: The methodology section should clearly show why your methods suit your objectives and convince the reader that you chose the best possible approach to answering your problem statement and research questions. Throughout the section, relate your choices to the central purpose of your research. You can propose a framework/algorithm/model to solve the issues discussed in task 2.2. Task 2.4 (500 words):· Discussion: Write a discussion section about the proposed work. The purpose of the discussion is to interpret and describe the significance of your findings in light of what was already known about the research problem being investigated and to explain any new understanding or insights that emerged as a result of your study of the problem.

Don't use plagiarized sources. Get Your Custom Essay on
Discuss Vulnerabilities, Threats, Intruders, and Attacks using IoT devices in medical health care.
Just from $13/Page
Order Essay
Place Order
Grab A 14% Discount on This Paper
Pages (550 words)
Approximate price: -
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)