Cybersecurity Solutions for Embedded Systems

INCS 810
Open Closing on May 16, 2025 / 1 spot left
Vancouver | New York Institute of Technology (NYIT)
Vancouver, British Columbia, Canada
Assistant Professor
2
Timeline
  • May 20, 2025
    Experience start
  • July 15, 2025
    Project Demo
  • July 19, 2025
    Experience end
Experience
2/3 project matches
Dates set by experience
Preferred companies
Anywhere
Any company type
Any industries

Experience scope

Categories
Security (cybersecurity and IT security) Information technology Machine learning Artificial intelligence Hardware
Skills
cyber security strategy intrusion detection systems embedded systems vulnerability assessments technical documentation vulnerability problem solving innovation artificial intelligence data as a service (daas)
Learner goals and capabilities

This experience focuses on equipping learners with fundamental cybersecurity skills and tools, particularly in the context of embedded systems and AI-based solutions. Participants will gain practical knowledge in identifying vulnerabilities, implementing security measures, and developing innovative solutions to protect embedded systems. By applying their classroom knowledge, learners can tackle real-world cybersecurity challenges, enhancing their problem-solving capabilities and technical expertise.

Learners

Learners
Graduate
Intermediate levels
15 learners
Project
20 hours per learner
Educators assign learners to projects
Teams of 5
Expected outcomes and deliverables
  • Comprehensive vulnerability assessment report for an embedded system
  • Prototype of an AI-based intrusion detection system, anomaly detection system
  • Implementation of security protocols for a specific embedded device
  • Technical documentation outlining cybersecurity solutions
  • Presentation of cybersecurity strategies and solutions to stakeholders
Project timeline
  • May 20, 2025
    Experience start
  • July 15, 2025
    Project Demo
  • July 19, 2025
    Experience end

Project Examples

Requirements
  • Developing a security framework for IoT devices used in smart homes
  • Creating an AI-driven anomaly detection system for industrial control systems
  • Designing a secure communication protocol for automotive embedded systems
  • Evaluating and enhancing the security of a wearable health monitoring device
  • Implementing encryption techniques for data transmission in embedded systems
  • FaaS for IoT edge, fog and cloud computing, serverless functions, and database management
  • Conducting a security audit of a consumer electronics product
  • Developing a risk management plan for an embedded system in a healthcare setting
  • Designing a secure boot process for an embedded operating system

Additional company criteria

Companies must answer the following questions to submit a match request to this experience:

  • Q1 - Text short
    Will you provide an opportunity for learners to present their work and receive feedback?
  • Q2 - Text short
    Will you be attending regular team meetings (every two weeks)?
  • Q3 - Text short
    Are there any specific resources or support that learners will need to complete the project successfully?
  • Q4 - Text short
    Are there any intellectual property considerations or restrictions for this project?
  • Q5 - Text short
    How often do you plan to communicate with learners throughout the project? Will you be able to provide a dedicated contact person who is available for [weekly/bi-weekly] sessions to address students' questions and respond to periodic messages throughout the project?