1.7 General Overview of the Research Design As a part of the present study, a vulnerability test was performed, which incorporated the theoretical basis of how disparate manufactured systems interconnect. The vulnerability test assisted in meeting the research objectives. In particular, the vulnerability tests pertained to various wireless sensor network (WSN) products, ubiquitous networks, and pervasive computing in the categories of appliances, Smartphones, multimedia systems, lighting, heating, and home alarm systems, as these elements are most pertinent in the systems considered within the Smart Home domain. Devices operating within the Smart Home domain either consume user data or traverse the construct of availability-based systems. The case studies comprising this research were conducted in a controlled environment. The first case study focused on counter- reconnaissance efforts to enhance discovery of possible cyber intrusions relevant to an IoT network, as well as determine the propensity of cyber intrusions to implant into the IoT network. The reconnaissance and discovery efforts helped determine how secure Smart Home technology IoT systems are independent of other connected devices. The second case study focused on the effectiveness of a proposed Debian 7 based (open source Intrusion Detection Software (IDS)) solution. Finally, the aim of the third case study was to explore the IoT object behavior as it applies to the handling of cyber security and safety, resilience to cyber-threats, and personally identifiable information.I