Emerging application of technology

Assignment Help Computer Network Security
Reference no: EM132725741

CSIA 459 Evaluating Emerging Technologies - University of Maryland

Technology Review #1: Emerging Application of Technology (Consumer or Business).

Objective
The purpose of this technology review is to identify an emerging application of technology, suitable for use by businesses or consumers, and then research the cybersecurity implications of the technology using journal articles, papers published in conference proceedings, and research studies published in dissertations. This type of research is also referred to as a survey of the literature.

Overview
Your audience is a group of senior executives who will be meeting to decide which emerging technologies or emerging applications of technologies should be selected for one or more security-focused, Internal Research & Development projects during the next budget cycle. Each of these executives is responsible for a business area that will (a) develop products that incorporate emerging applications of technology or (b) depend upon such products to support their organization's operations.
The high-level visibility for your deliverable means that you need to start from a strong foundation of suitable research-based journal articles, papers published in conference proceedings, and doctoral dissertations. The basic question that must be answered is: what are the cybersecurity implications (good or bad) of a specific emerging application of technology.
In addition, the executives have expressed the following information needs, which must be met by the deliverable for this assignment.
(a) characteristics of the technology,
(b) use of the technology to support or improve cybersecurity,
(c) use of the technology to reduce or manage risk,
(d) use of the technology to increase resistance to threats/attacks,
(e) use of the technology to decrease vulnerabilities in an existing technology application,
(f) use or exploitation of the technology by attackers, criminals, terrorists, etc. to accomplish their goals.

Choose an Emerging Application of Technology
To begin, choose an emerging application of technology, which is suitable for future use in a consumer-oriented product or service (i.e. a new product for personal or home use) or a business-oriented product or service. Applications of technology that are currently in the emerging stages include:
• Machine Learning and/or Artificial Intelligence
• Data Science (especially when used to identify patterns and indicators of threats and attacks)
• Blockchain Technology
• 5G Telecommunications Networks
• Physical Unclonable Functions (PUFs) (devices & electrical circuits)
• Graphene
• Nano machines
• Neuromorphic computer chips
You are encouraged to look for and investigate additional appropriate technologies before deciding upon your technology choice for this assignment.
If you decide to research a technology that is not on the suggested technologies list (see above), you must first request and receive your instructor's permission. Your instructor may require that you do preliminary library searches for research papers and technical papers to prove that you can find a sufficient number of resources to complete the assignment.
Find Appropriate Sources ("Survey the Literature")
Brainstorm keywords that you can use to help find articles, papers, and other scholarly publications ("sources') which discuss your chosen emerging application of technology.

Create Your Bibliography (List of Sources)

Choose the 10 best sources from your searches for articles, papers, and dissertations. Focus on the ones that give details about your technology and how it can be used in an emerging application of technology. Next, write the reference list entry (APA, MLA, or another appropriate professional citation style) for each source. Alphabetize your list of reference list entries. After you have the correctly ordered list, number your entries from 1 to 10. Note: different reference entry formats are used for different types of sources. Review the UMGC Library's "Get Help > Citing and Writing for samples and explanations of the formatting rules. If you are using APA format, your list should look something like the following.
1. Authors. (date). Article title. Publication name, vol(issue), #-#.
2. Authors. (date). Paper title. Published in the Proceedings of conference-name, pp. #-#.
3. Author ...

In an annotated bibliography, the annotation is a paragraph or two placed under the reference list entry for each source. For this assignment, the annotation should be a combination of factual information from the source and your evaluation (opinion) of that information. To accomplish this, you should read the abstract, introduction section, and closing sections for each article or paper. For dissertations, look over the Introduction and the Literature Review (usually Chapters 1 & 2). From this information, develop a one to three paragraph informative or descriptive summary of the source that includes: (a) a description of technology and its characteristics, (b) planned uses of the technology (products, services, etc.), and (c) your thoughts and opinions as to how you could use this paper to justify selecting the technology for an Internal Research & Development study.

In each annotation, you should provide at least one specific example of a characteristic and/or application of the technology, e.g. an emerging technology, which impacts cybersecurity.

For example, for an annotation for an article about graphene's applications to product design, you could discuss how it could be used to manufacture cell phone cases or laptop cases which are less breakable than cases made with current materials. This could positively impact availability because the new case design using graphene would be expected to decrease the risk of breakage. Decreased risk of breakage will decrease the probability of loss of availability caused by a broken case. Decreasing the probability of a negative event will decrease the risk associated with that event

Note: Remember that the security posture of a system or product is framed in terms of risk, threats, vulnerabilities, etc. Improvements to the security posture (positive security implications) will result in reduced risk, increased resistance to threats or attacks, and decreased vulnerability. Negative impacts on the security posture will result in increased risk, decreased resistance to threats / attacks, and increased vulnerability (weakness).
As you write the annotations for each article / paper / dissertation, make sure that you include YOUR thoughts and ideas about the security implications of this technology. Use standard terminology from the readings and glossaries provided in the LEO classroom.
As you brainstorm the security implications of this technology (if these are not specifically discussed by your source), you should consider use of the technology to improve cybersecurity. Then consider applications or uses which will negatively impact the security posture of an organization or the security of individual consumers or users of the product. It is very important that you consider BOTH SIDES OF THIS ISSUE.
Putting It All Together
1. Consult the grading rubric for specific content and formatting requirements for this assignment.
2. Your 5-8 page annotated bibliography should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper.
3. Your paper should use standard terms and definitions for cybersecurity.
4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the "professional appearance" requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.
5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment's page count.
6. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.
7. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).

Attachment:- Technology Review.rar

Reference no: EM132725741

Questions Cloud

What are the company variable expenses per unit : $2.20 per unit and will break even at this level of sales. Fixed expenses will be $80,000. What are the company's variable expenses per unit?
Should finex and sons lease or borrow : Should Finex and Sons lease or borrow? The unit under consideration has a purchase price of $60,000, which would be depreciated
Strategy formulation process of an organization : Explain why environmental analysis is considered to be an important activity for the strategy formulation process of an organization.
How do corporations go public and continue to grow : How do corporations go public and continue to grow? What are agency problems? What is corporate governance
Emerging application of technology : Emerging Application of Technology - identify an emerging application of technology, suitable for use by businesses or consumers, and then research
Examine the nature and functions of strategic management : Examine the nature and functions of strategic management. Examine internal effectiveness and resources, and how they impact organizational strategies.
What are the major factors that an organization needs : What are the major factors that an organization needs to analyze before it can consider entering a foreign market?
Why is corporate finance important to all managers : DellaTorre is very bright, and she would like to understand in general terms what will happen to her money. Why is corporate finance important to all managers
How is strategic management controlled : What is strategic management? How is strategic management integrated to achieve a competitive advantage? How is strategic management controlled?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Title - WLAN Data throughput and Security Overheads

Title: 802.11 WLAN data throughput and security overheads. Perform number of experiments to measure actual throughput rates for system using physical experiment

  Describe at least three possible risk management efforts

Describe at least three possible risk management efforts that could be used to assess threats and unknown issues. Determine why defining priorities is an important part of the process when enumerating and having efficient risk control measures.

  Risk management and malicious attacks

With regards to risk-response planning, there are four (4) responses to negative risks that an organization may pursue: avoid, transfer, mitigate, and accept. Develop an original and unique scenario to describe and contrast each of these responses..

  Develop the identity management and security awareness plan

Utilizing your comprehensive security plan outline as a guide, develop the identity management and security awareness training plan strategy for the organization. Upload the assignment in Microsoft Word format.

  Type of security problems computer services encounter

Students would enter the room, pick up their jobs, and leave. What kinds of security problems might computer services encounter with a system such as this?

  Discuss the current it cybersecurity policy

Discuss the current (as per the case study) IT cybersecurity policy. Describe the functionality of the new technology selected for implementation and the challenges associated with the current cybersecurity policy.

  Complete the comptia network and certification practice exam

In order to identify your strengths and weaknesses, you will first complete the CompTIA Network+ Certification Practice exam.

  Explain laws that would be effective to convict offenders

Identify the laws that would be effective to convict offenders. Determine what computer crime fighting government programs exist within your region that can complement your security operations.

  What you have done to protect network against the attacks

Prepare a 3-4-page memo in Word outlining what you have done as the network administrator to protect the network against such attacks.

  Explain protocol for sending encrypted message

Consider following protocol for sending an encrypted message from Alice to Bob in presence of Key Distribution Center (KDC).

  Describe activities that set up emergency operations center

Describe the activities that need to occur to set up the emergency operations center for your company, and where your company should locate the center.

  Compute runtime of an average exhaustive key-search on des

Compute the runtime of an average exhaustive key-search on DES assuming the implementational details. How many COPACOBANA machines do we need in the case of an average search time of one hour?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd