SlideShare a Scribd company logo
1 of 12
DISCUSSION 1
The Internet of Things (IoT) is based upon emerging
applications of technologies. A number of security researchers
have expressed concerns that this blending of emerging
technologies with the Internet will provide new opportunities
for cyber criminals and terrorists.
Pick one of the emerging applications of technologies that
belongs to the Internet of Things (see the readings and videos
for this week) and research how it can be attacked by bad
guys. Using the security criteria from the five pillars of
information assurance, write a 250+ word analysis of the risks
and vulnerabilities associated with your chosen technology. The
five pillars are:
1 confidentiality
2 integrity
3 availability
4 authentication
5 nonrepudiation
Remember to cite your sources using APA format in-text
citations and include an APA format reference list at the end of
your response posting.
DISCUSSION 2
The International Telecommunications Union (2005) report
described four categories of technologies which can be linked
together to form an Internet of Things.
Enabling Technologies:
1. Tagging things: RFID and similar technologies
2. Feeling things: Sensor technologies
3. Thinking things: Smart technologies
4. Shrinking things: Nanotechnology
Choose one of these categories.
What are the leading technologies in your selected category?
How do they contribute to the Internet of Things?
What types of privacy or security concerns surround the
technologies in your selected category?
Your initial posting should be 250+ words and be supported by
citations and references in APA format.
Reference
International Telecommunications Union. (2005). ITU Internet
reports 2005: The Internet of things [Executive Summary].
Retrieved from
http://www.itu.int/osg/spu/publications/internetofthings/Internet
ofThings_summary.pdf
MATH233 Unit 1 Individual Project
To communicate most effectively, network administrators
attempt to maximize bandwidth and throughput speeds to
achieve high data transmission rates within the building’s
CAT5e cables. These performance data transfer rates are given
in multiples of unit bits per second (bps). In the table below, the
school’s IT department estimates the network throughput that is
required in the near future. The network manager has asked you
to use these data to analyze the current traffic load and the
network's overall capacity.
Estimates given in the table below suggest that your network
throughput can transfer Gigabits (Gb) of data in seconds for
each user.
For each question, be sure to show all your work details for full
credit.Round all numerical answers to three decimal places.
1. Research and define the concepts of maximum theoretical
throughput, channel capacity, and bandwidth. Next, explain the
difference between CAT5e and CAT6 Ethernet cables. What
specific speeds can each of these cables handle? Listing
credible cited resources, please answer these below.
2. In the table below, based on the first letter of your last name,
please select one number from each of the ranges in the x and y
columns.
Table A: Estimates of bit-transmissions and times
First Letter of Your lastName
Seconds
Gigabits (Gb)
A – D
2 to 3.99
2 to 3.99
E – H
4 to 7.99
4 to 7.99
I – L
8 to 15.99
8 to 15.99
M – P
16 to 31.99
16 to 31.99
Q – T
32 to 63.99
32 to 63.99
U – Z
64 to 79.99
64 to 79.99
Given that the throughput is the table’s Gigabits per seconds
(Gbps), calculate and record this transfer rate for your chosen
values with the formula:
3. Your school’s maximum network bandwidth is 1 Gbps. Does
your answer from above exceed that or not? Based strictly on
your value, do you think the maximum bandwidth should be
raised? Will the network infrastructure need to be upgraded to
support CAT6 cables? How did you arrive at this conclusion?
Include the factors that influenced your decision.
4. According to your research, the school’s throughput speed
R(t) in Gbps, with respect to time in seconds, is best modeled
with the rational function:
Generate a graph of this function using Excel or another
graphing utility. (There are free downloadable programs like
Graph 4.4.2 or Mathematics 4.0; or, there are also online
utilities such as this site and many others.) Insert the graph into
the Word document containing your answers and work details.
Be sure to label and number the axes appropriately.
5. Peak Measured Throughput (PT): Peak or instantaneous
throughputs (PT) measure values useful for systems that rely on
bursts of data in a CAT5e cable. Unlike continuous streaming,
information travels in short bursts. For example, during in-class
demonstrations, a computer lab’s user experiences high traffic
usage spikes on a very high-bandwidth that is transmitted over a
relatively short period of time. Activity is important during
these in-use peak times. Peak rates are measured limits taken
with respect to throughput as time approaches zero. So for the
above function, use algebraic techniques to find:
Based strictly on this result, do you think your school should
raise its current network’s bandwidth of 1 Gbps? How did you
arrive at this conclusion?
6. Maximum Sustained Throughput (ST): One of the most
accurate indicators of system performance for high duty cycle
networks is the maximum sustained throughput (ST) averaged
over a long period of time. This value measures the network
capacity fully utilized over its entire existence. Essentially,
high volumes of continuously streamed transmissions max out
the amounts of data being transferred in because the network is
busy processing current data and unable to efficiently enter the
cable. This builds up the delivery time causing latency
instabilities. In this case, sustained rates are measured limits
taken with respect to throughput as time increases towards
infinity. So for the above function, use algebraic techniques to
find the following:
Based strictly on this result, do you think your school should
raise its current network’s bandwidth of 1 Gbps? How did you
arrive at this conclusion?
7. Based on all of your previous results, do you think your
school should raise its current network’s bandwidth of 1 Gbps?
How did you arrive at this conclusion?
References
Desmos. (n.d.). Retrieved from https://www.desmos.com/
Graph 4.4.2. (n.d.). Retrieved from the Graph Web site:
http://www.padowan.dk/
Mathematics 4.0. (n.d.). Retrieved from the Microsoft Web site:
http://microsoft-mathematics.en.uptodown.com/
Page 1 of 3
Technology Review #1: Emerging Application of Technology
(Consumer or Business).
This paper is the first of two Technology Reviews that you will
research and write for this course. For this paper, you must
choose an emerging application of technology which is suitable
for future use in a consumer-oriented product or service (i.e. a
new product for personal or home use) or a business-oriented
product or service.
The technology review papers will be used to prepare your
technology selection paper for the Analysis of Alternatives
exercise later in the course. Your audience for these papers is a
group of senior executives who will be meeting to decide which
emerging technologies or emerging applications of technologies
should be selected for one or more security-focused, Internal
Research & Development projects during the next budget cycle.
Each of these executives is responsible for a business area that
will (a) develop products which incorporate the emerging
technologies or (b) depend upon such products to support their
organization’s operations.
For this paper, you will perform the first three stages of the
technology scan:
Technology scanning is an evaluation model that is used when
you need to develop a list of candidate technology solutions. A
technology scan can also be used when you need to obtain
information about the latest advancements in security products
and technologies.
The technology scan has four stages: scoping, searching,
evaluating, and recommending.
SCOPING
The scoping phase of this technology scan has already been
performed. Your scope is stages 3, 4, and early stage 5 as shown
in the figure below.
Image Source: http://www.atp.nist.gov/eao/gcr02-
841/chapt2.htm
SEARCHING
To begin, select a technology which is in the early-stage
technology development, product development or early
production/marketing stages of the product lifecycle (Stages 3,
4, or early stage 5 in the figure above). You may use news
articles, press releases, and government or company Web sites
to help you find an appropriate technology. (Remember to cite
these sources in your paper.)
Technologies which are currently in these stages include:
· Big Data Analytics
· Wearable Computing Devices (choose 1 specific device)
· Physical Unclonable Functions (PUFs) (devices & electrical
circuits)
· Graphene
· Dielectric thin films
· Magneto-electric magnetic sensors
· Nano imprinting
· Nano machines
· Neuromorphic computer chips
You are encouraged to look for and investigate additional
appropriate technologies before deciding upon your technology
choice for this assignment.
If you decide to research a technology that is not on the
suggested technologies list (see above), you must first request
and receive your instructor’s permission. Your instructor may
require that you do preliminary library searches for research
papers and technical papers to prove that you can find a
sufficient number of resources to complete the assignment.
Survey of the Professional Literature
During your survey of the professional literature, you will
identify 10 research papers or technical papers which provide
technical information about your selected technology (see
selection requirements for each paper). These papers must be
dated 2011, 2012, 2013, 2014, or 2015 (five year window).
Allowable sources for research papers / technical papers are: (a)
professional journals, (b) conference proceedings, (c)
dissertations or theses, and (d) technical magazines (published
by either the ACM or IEEE). If an article from one of the above
sources does not have a reference list containing at least 3
references you may use it in your review paper but it WILL
NOT COUNT towards the “10 research or technical papers”
requirement.
The requirement to “survey the professional literature” must be
met by using research papers/publications and technical papers
which are available from the following UMUC online library
databases:
· ACM Digital Library
http://ezproxy.umuc.edu/login?url=http://www.acm.org/dl
· Dissertations & Theses (Pro Quest)
http://ezproxy.umuc.edu/login?url=http://search.proquest.com/p
qdtft/advanced?accountid=14580
· IEEE Computer Society Digital Library
http://ezproxy.umuc.edu/login?url=http://www.computer.org/por
tal/web/csdl/home
· Science Direct
http://ezproxy.umuc.edu/login?url=http://www.sciencedirect.co
m/science/search
EVALUATING
In this stage, you will evaluate and report upon the information
found during your survey of the professional literature. Read
the abstract, introduction section, and closing sections for each
of the sources identified in your survey of the professional
literature. From this information, develop a summary of the
technology that includes: (a) a description of technology and (b)
planned uses of the technology (products, services, etc.).
IMPORTANT: your technology review must incorporate
information from each of your 10 “papers” from the
professional literature.
Note: You may use other sources in addition to the papers
which comprise your survey of the professional literature.
Next, brainstorm the security implications of this technology (if
these are not specifically discussed by your sources). You
should consider use of the technology to improve cybersecurity
and uses which will negatively impact the security posture of an
organization or the security of individual consumers or users of
the product. It is very important that you consider BOTH SIDES
OF THIS ISSUE.
Note: Remember that the security posture of a system or product
is framed in terms of risk, threats, vulnerabilities, etc.
Improvements to the security posture (positive security
implications) will result in reduced risk, increased resistance to
threats or attacks, and decreased vulnerability. Negative
impacts on the security posture will result in increased risk,
decreased resistance to threats / attacks, and increased
vulnerability (weakness).
Write down your thoughts and ideas about the security
implications of this technology using (a) the Five Pillars of
Information Assurance and/or (b) the Five Pillars of
Information Security. For your paper, you do not need to
include all ten “pillars” but you should address a minimum of
three. If you are targeting an “A” on your paper, address at least
five of the pillars.
· Five Pillars of Information Assurance: confidentiality,
integrity, availability, authentication, and non-repudiation.
These are defined in CNSSI-4009 and discussed quite nicely by
K. S. Wilson in Conflicts Among the Pillars of Information
Assurance
http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/
login.aspx?direct=true&db=edswsc&AN=000322695100011&sit
e=eds-live&scope=site
· Five Pillars of Information Security: protection, detection,
reaction, documentation, prevention. If you are not familiar
with the origins of the five pillars of Information Security, read
a copy of the original article by Amir Ameri at
http://cf.rims.org/Magazine/PrintTemplate.cfm?AID=2409
You should provide specific examples using characteristics
and/or applications of the technology, e.g. an emerging
technology which can be used to manufacture cell phone cases
which are less breakable may be chosen to replace current
materials because the new material will decrease the risk of
breakage. Decreased risk of breakage will decrease the
probability of loss of availability caused by a broken case.
Decreasing the probability of a negative event will decrease the
risk associated with that event.
WRITING YOUR EVALUATION
Your paper must provide the reader with an overview of the
technology followed by information about the potential security
risks and/or benefits of its use (the security posture ).You
MUST use information paraphrased from the papers found
during your Survey of the Professional Literature (with
appropriate in-text citations).
Your Technology Review papers should be at least three pages
in length but no more than five pages (excluding the title page
and references page).
Your papers must comply with the formatting guidance provided
by your instructor. All papers in this course must also comply
with APA Style for references and citations. See the resources
posted under Content > Course Documents > APA Resources.
You are expected to write grammatically correct English in
every assignment that you submit for grading. Do not turn in
any work without (a) using spell check, (b) using grammar
check, (c) verifying that your punctuation is correct and (d)
reviewing your work for correct word usage and correctly
structured sentences and paragraphs. Together, these items
constitute the professionalism category in the assignment
grading rubrics (worth 20% of the assignment’s grade).
Grading Rubric: Consult the grading rubric for this assignment
for specific information about content and formatting
requirements.
Title of PaperYour NameMonth Day, Year
Running head: TECHNOLOGY REVIEW 1
3
Running head: TECHNOLOGY REVIEW
Overview
Provided an excellent overview of an emerging technology or
emerging application of technology. The overview appropriately
used information from the survey of the professional literature
in addition to information from other sources, i.e. news articles,
industry or government white papers and authoritative Web
sites.
Demonstrated excellence in the use of standard cybersecurity
terminology to support discussion of the technology.
Appropriately used terminology from five or more pillars of
IA/IS.Analysis
Identified 10 or more papers from the professional literature.
All papers used in the survey were from the four approved
sources (ACM Digital Library, IEEE Computer Society Digital
Library, Pro Quest Dissertations and Theses, and Science
Direct). Appropriately used 10 or more papers from the survey
of the literature throughout the discussion (as demonstrated by
correctly formatted and placed citations).
Demonstrated excellence in the use of standard cybersecurity
terminology to support discussion of the technology.
Appropriately used terminology from five or more pillars of
IA/IS.
First Sub-section
Provided an excellent discussion of how the emerging
technology or emerging application of technology could be used
to improve or support cybersecurity by reducing risk, increasing
resistance to threats/attacks, decreasing vulnerabilities, etc.
Discussion provided five or more specific examples of how
these improvements would impact cybersecurity for
information, information systems, and/or networks. The
discussion appropriately used five or more "pillars" and was
based upon information from the survey of the professional
literature in addition to information from other sources, i.e.
news articles, industry or government white papers and
authoritative Web sites.
Demonstrated excellence in the use of standard cybersecurity
terminology to support discussion of the technology.
Appropriately used terminology from five or more pillars of
IA/IS.
Second Sub-section
Provided an excellent discussion of how the emerging
technology or emerging application of technology could be used
by attackers to further their own goals and/or how specific
anticipated or known vulnerabilities could be exploited.
Discussion fully described how the technology could by
attackers against information, information systems, and/or
networks. The discussion appropriately used information from
the survey of the professional literature in addition to
information from other sources, i.e. news articles, industry or
government white papers and authoritative Web sites.
Demonstrated excellence in the use of standard cybersecurity
terminology to support discussion of the technology.
Appropriately used terminology from five or more pillars of
IA/IS.Summary and Conclusions
Paragraph
References
Reynolds, G. W. (2010). Ethics in the information age (3rd ed.).
Boston, MA: Course Technology.

More Related Content

Similar to DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docx

01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docxhoney725342
 
CST 630 Exceptional Education - snaptutorial.com
CST 630   Exceptional Education - snaptutorial.comCST 630   Exceptional Education - snaptutorial.com
CST 630 Exceptional Education - snaptutorial.comDavisMurphyA97
 
CST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comCST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comdonaldzs8
 
Cst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comCst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comrobertlesew6
 
IntroductionThe capstone project is a �structured walkthrough� pen.pdf
IntroductionThe capstone project is a �structured walkthrough� pen.pdfIntroductionThe capstone project is a �structured walkthrough� pen.pdf
IntroductionThe capstone project is a �structured walkthrough� pen.pdffantasiatheoutofthef
 
43194352-Feasibility-study.ppt
43194352-Feasibility-study.ppt43194352-Feasibility-study.ppt
43194352-Feasibility-study.pptIsmathIqbal2
 
CST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.comCST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.comclaric241
 
CST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.comCST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.comagathachristie266
 
CST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.comCST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.comVSNaipaul15
 
CST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.comCST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.comKeatonJennings104
 
CST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comCST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comagathachristie113
 
Bolton Health Service Secure Network Design.docx
Bolton Health Service Secure Network Design.docxBolton Health Service Secure Network Design.docx
Bolton Health Service Secure Network Design.docxwrite31
 
CST 630 RANK Achievement Education--cst630rank.com
CST 630 RANK Achievement Education--cst630rank.comCST 630 RANK Achievement Education--cst630rank.com
CST 630 RANK Achievement Education--cst630rank.comkopiko147
 
Popular Thesis Topics in Networking
Popular Thesis Topics in NetworkingPopular Thesis Topics in Networking
Popular Thesis Topics in NetworkingTechsparks
 
IRJET- Determining Document Relevance using Keyword Extraction
IRJET-  	  Determining Document Relevance using Keyword ExtractionIRJET-  	  Determining Document Relevance using Keyword Extraction
IRJET- Determining Document Relevance using Keyword ExtractionIRJET Journal
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET Journal
 
CST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comCST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comchrysanthemu49
 

Similar to DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docx (20)

01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
 
CST 630 Exceptional Education - snaptutorial.com
CST 630   Exceptional Education - snaptutorial.comCST 630   Exceptional Education - snaptutorial.com
CST 630 Exceptional Education - snaptutorial.com
 
CST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comCST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.com
 
Cst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comCst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.com
 
IntroductionThe capstone project is a �structured walkthrough� pen.pdf
IntroductionThe capstone project is a �structured walkthrough� pen.pdfIntroductionThe capstone project is a �structured walkthrough� pen.pdf
IntroductionThe capstone project is a �structured walkthrough� pen.pdf
 
43194352-Feasibility-study.ppt
43194352-Feasibility-study.ppt43194352-Feasibility-study.ppt
43194352-Feasibility-study.ppt
 
CST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.comCST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.com
 
Network Readiness Guide
Network Readiness GuideNetwork Readiness Guide
Network Readiness Guide
 
CST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.comCST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.com
 
CST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.comCST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.com
 
CST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.comCST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.com
 
CST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comCST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.com
 
Bolton Health Service Secure Network Design.docx
Bolton Health Service Secure Network Design.docxBolton Health Service Secure Network Design.docx
Bolton Health Service Secure Network Design.docx
 
CST 630 RANK Achievement Education--cst630rank.com
CST 630 RANK Achievement Education--cst630rank.comCST 630 RANK Achievement Education--cst630rank.com
CST 630 RANK Achievement Education--cst630rank.com
 
Popular Thesis Topics in Networking
Popular Thesis Topics in NetworkingPopular Thesis Topics in Networking
Popular Thesis Topics in Networking
 
MARNEW at IETF 94
MARNEW at IETF 94MARNEW at IETF 94
MARNEW at IETF 94
 
IRJET- Determining Document Relevance using Keyword Extraction
IRJET-  	  Determining Document Relevance using Keyword ExtractionIRJET-  	  Determining Document Relevance using Keyword Extraction
IRJET- Determining Document Relevance using Keyword Extraction
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
 
CST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comCST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.com
 
Network upgrade
Network upgradeNetwork upgrade
Network upgrade
 

More from elinoraudley582231

Assignment ContentTo learn how to apply SPCM to a process,.docx
Assignment ContentTo learn how to apply SPCM to a process,.docxAssignment ContentTo learn how to apply SPCM to a process,.docx
Assignment ContentTo learn how to apply SPCM to a process,.docxelinoraudley582231
 
Assignment ContentTo prepare for the Week 2 Assessment, .docx
Assignment ContentTo prepare for the Week 2 Assessment, .docxAssignment ContentTo prepare for the Week 2 Assessment, .docx
Assignment ContentTo prepare for the Week 2 Assessment, .docxelinoraudley582231
 
Assignment ContentThroughout this course you will study the di.docx
Assignment ContentThroughout this course you will study the di.docxAssignment ContentThroughout this course you will study the di.docx
Assignment ContentThroughout this course you will study the di.docxelinoraudley582231
 
Assignment ContentThroughout this course, you have been using .docx
Assignment ContentThroughout this course, you have been using .docxAssignment ContentThroughout this course, you have been using .docx
Assignment ContentThroughout this course, you have been using .docxelinoraudley582231
 
Assignment ContentThis week’s readings and activities focu.docx
Assignment ContentThis week’s readings and activities focu.docxAssignment ContentThis week’s readings and activities focu.docx
Assignment ContentThis week’s readings and activities focu.docxelinoraudley582231
 
Assignment ContentThis week you will continue your work on the.docx
Assignment ContentThis week you will continue your work on the.docxAssignment ContentThis week you will continue your work on the.docx
Assignment ContentThis week you will continue your work on the.docxelinoraudley582231
 
Assignment ContentThis week, you will continue building th.docx
Assignment ContentThis week, you will continue building th.docxAssignment ContentThis week, you will continue building th.docx
Assignment ContentThis week, you will continue building th.docxelinoraudley582231
 
Assignment ContentThis week you will finalize your present.docx
Assignment ContentThis week you will finalize your present.docxAssignment ContentThis week you will finalize your present.docx
Assignment ContentThis week you will finalize your present.docxelinoraudley582231
 
Assignment ContentThis weeks’ discussion of correlation and ca.docx
Assignment ContentThis weeks’ discussion of correlation and ca.docxAssignment ContentThis weeks’ discussion of correlation and ca.docx
Assignment ContentThis weeks’ discussion of correlation and ca.docxelinoraudley582231
 
Assignment ContentThis week, you will continue building the .docx
Assignment ContentThis week, you will continue building the .docxAssignment ContentThis week, you will continue building the .docx
Assignment ContentThis week, you will continue building the .docxelinoraudley582231
 
Assignment ContentThis week you will continue your work on.docx
Assignment ContentThis week you will continue your work on.docxAssignment ContentThis week you will continue your work on.docx
Assignment ContentThis week you will continue your work on.docxelinoraudley582231
 
Assignment ContentThis week you learned about the application .docx
Assignment ContentThis week you learned about the application .docxAssignment ContentThis week you learned about the application .docx
Assignment ContentThis week you learned about the application .docxelinoraudley582231
 
Assignment ContentThis assignment offers you the opportuni.docx
Assignment ContentThis assignment offers you the opportuni.docxAssignment ContentThis assignment offers you the opportuni.docx
Assignment ContentThis assignment offers you the opportuni.docxelinoraudley582231
 
Assignment ContentThis assignment has two parts.Part 1.docx
Assignment ContentThis assignment has two parts.Part 1.docxAssignment ContentThis assignment has two parts.Part 1.docx
Assignment ContentThis assignment has two parts.Part 1.docxelinoraudley582231
 
Assignment ContentThis assignment is designed to help you .docx
Assignment ContentThis assignment is designed to help you .docxAssignment ContentThis assignment is designed to help you .docx
Assignment ContentThis assignment is designed to help you .docxelinoraudley582231
 
Assignment ContentThere are various schools within Buddhis.docx
Assignment ContentThere are various schools within Buddhis.docxAssignment ContentThere are various schools within Buddhis.docx
Assignment ContentThere are various schools within Buddhis.docxelinoraudley582231
 
Assignment ContentThere are two deliverables for this assi.docx
Assignment ContentThere are two deliverables for this assi.docxAssignment ContentThere are two deliverables for this assi.docx
Assignment ContentThere are two deliverables for this assi.docxelinoraudley582231
 
Assignment ContentThere are offenders whose criminality is.docx
Assignment ContentThere are offenders whose criminality is.docxAssignment ContentThere are offenders whose criminality is.docx
Assignment ContentThere are offenders whose criminality is.docxelinoraudley582231
 
Assignment ContentThere are many different threats to the conf.docx
Assignment ContentThere are many different threats to the conf.docxAssignment ContentThere are many different threats to the conf.docx
Assignment ContentThere are many different threats to the conf.docxelinoraudley582231
 
Assignment ContentThe strategic sourcing plan is a plan fo.docx
Assignment ContentThe strategic sourcing plan is a plan fo.docxAssignment ContentThe strategic sourcing plan is a plan fo.docx
Assignment ContentThe strategic sourcing plan is a plan fo.docxelinoraudley582231
 

More from elinoraudley582231 (20)

Assignment ContentTo learn how to apply SPCM to a process,.docx
Assignment ContentTo learn how to apply SPCM to a process,.docxAssignment ContentTo learn how to apply SPCM to a process,.docx
Assignment ContentTo learn how to apply SPCM to a process,.docx
 
Assignment ContentTo prepare for the Week 2 Assessment, .docx
Assignment ContentTo prepare for the Week 2 Assessment, .docxAssignment ContentTo prepare for the Week 2 Assessment, .docx
Assignment ContentTo prepare for the Week 2 Assessment, .docx
 
Assignment ContentThroughout this course you will study the di.docx
Assignment ContentThroughout this course you will study the di.docxAssignment ContentThroughout this course you will study the di.docx
Assignment ContentThroughout this course you will study the di.docx
 
Assignment ContentThroughout this course, you have been using .docx
Assignment ContentThroughout this course, you have been using .docxAssignment ContentThroughout this course, you have been using .docx
Assignment ContentThroughout this course, you have been using .docx
 
Assignment ContentThis week’s readings and activities focu.docx
Assignment ContentThis week’s readings and activities focu.docxAssignment ContentThis week’s readings and activities focu.docx
Assignment ContentThis week’s readings and activities focu.docx
 
Assignment ContentThis week you will continue your work on the.docx
Assignment ContentThis week you will continue your work on the.docxAssignment ContentThis week you will continue your work on the.docx
Assignment ContentThis week you will continue your work on the.docx
 
Assignment ContentThis week, you will continue building th.docx
Assignment ContentThis week, you will continue building th.docxAssignment ContentThis week, you will continue building th.docx
Assignment ContentThis week, you will continue building th.docx
 
Assignment ContentThis week you will finalize your present.docx
Assignment ContentThis week you will finalize your present.docxAssignment ContentThis week you will finalize your present.docx
Assignment ContentThis week you will finalize your present.docx
 
Assignment ContentThis weeks’ discussion of correlation and ca.docx
Assignment ContentThis weeks’ discussion of correlation and ca.docxAssignment ContentThis weeks’ discussion of correlation and ca.docx
Assignment ContentThis weeks’ discussion of correlation and ca.docx
 
Assignment ContentThis week, you will continue building the .docx
Assignment ContentThis week, you will continue building the .docxAssignment ContentThis week, you will continue building the .docx
Assignment ContentThis week, you will continue building the .docx
 
Assignment ContentThis week you will continue your work on.docx
Assignment ContentThis week you will continue your work on.docxAssignment ContentThis week you will continue your work on.docx
Assignment ContentThis week you will continue your work on.docx
 
Assignment ContentThis week you learned about the application .docx
Assignment ContentThis week you learned about the application .docxAssignment ContentThis week you learned about the application .docx
Assignment ContentThis week you learned about the application .docx
 
Assignment ContentThis assignment offers you the opportuni.docx
Assignment ContentThis assignment offers you the opportuni.docxAssignment ContentThis assignment offers you the opportuni.docx
Assignment ContentThis assignment offers you the opportuni.docx
 
Assignment ContentThis assignment has two parts.Part 1.docx
Assignment ContentThis assignment has two parts.Part 1.docxAssignment ContentThis assignment has two parts.Part 1.docx
Assignment ContentThis assignment has two parts.Part 1.docx
 
Assignment ContentThis assignment is designed to help you .docx
Assignment ContentThis assignment is designed to help you .docxAssignment ContentThis assignment is designed to help you .docx
Assignment ContentThis assignment is designed to help you .docx
 
Assignment ContentThere are various schools within Buddhis.docx
Assignment ContentThere are various schools within Buddhis.docxAssignment ContentThere are various schools within Buddhis.docx
Assignment ContentThere are various schools within Buddhis.docx
 
Assignment ContentThere are two deliverables for this assi.docx
Assignment ContentThere are two deliverables for this assi.docxAssignment ContentThere are two deliverables for this assi.docx
Assignment ContentThere are two deliverables for this assi.docx
 
Assignment ContentThere are offenders whose criminality is.docx
Assignment ContentThere are offenders whose criminality is.docxAssignment ContentThere are offenders whose criminality is.docx
Assignment ContentThere are offenders whose criminality is.docx
 
Assignment ContentThere are many different threats to the conf.docx
Assignment ContentThere are many different threats to the conf.docxAssignment ContentThere are many different threats to the conf.docx
Assignment ContentThere are many different threats to the conf.docx
 
Assignment ContentThe strategic sourcing plan is a plan fo.docx
Assignment ContentThe strategic sourcing plan is a plan fo.docxAssignment ContentThe strategic sourcing plan is a plan fo.docx
Assignment ContentThe strategic sourcing plan is a plan fo.docx
 

Recently uploaded

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 

Recently uploaded (20)

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 

DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docx

  • 1. DISCUSSION 1 The Internet of Things (IoT) is based upon emerging applications of technologies. A number of security researchers have expressed concerns that this blending of emerging technologies with the Internet will provide new opportunities for cyber criminals and terrorists. Pick one of the emerging applications of technologies that belongs to the Internet of Things (see the readings and videos for this week) and research how it can be attacked by bad guys. Using the security criteria from the five pillars of information assurance, write a 250+ word analysis of the risks and vulnerabilities associated with your chosen technology. The five pillars are: 1 confidentiality 2 integrity 3 availability 4 authentication 5 nonrepudiation Remember to cite your sources using APA format in-text citations and include an APA format reference list at the end of your response posting. DISCUSSION 2 The International Telecommunications Union (2005) report described four categories of technologies which can be linked together to form an Internet of Things. Enabling Technologies: 1. Tagging things: RFID and similar technologies 2. Feeling things: Sensor technologies 3. Thinking things: Smart technologies 4. Shrinking things: Nanotechnology Choose one of these categories. What are the leading technologies in your selected category? How do they contribute to the Internet of Things?
  • 2. What types of privacy or security concerns surround the technologies in your selected category? Your initial posting should be 250+ words and be supported by citations and references in APA format. Reference International Telecommunications Union. (2005). ITU Internet reports 2005: The Internet of things [Executive Summary]. Retrieved from http://www.itu.int/osg/spu/publications/internetofthings/Internet ofThings_summary.pdf MATH233 Unit 1 Individual Project To communicate most effectively, network administrators attempt to maximize bandwidth and throughput speeds to achieve high data transmission rates within the building’s CAT5e cables. These performance data transfer rates are given in multiples of unit bits per second (bps). In the table below, the school’s IT department estimates the network throughput that is required in the near future. The network manager has asked you to use these data to analyze the current traffic load and the network's overall capacity. Estimates given in the table below suggest that your network throughput can transfer Gigabits (Gb) of data in seconds for each user. For each question, be sure to show all your work details for full credit.Round all numerical answers to three decimal places. 1. Research and define the concepts of maximum theoretical throughput, channel capacity, and bandwidth. Next, explain the difference between CAT5e and CAT6 Ethernet cables. What specific speeds can each of these cables handle? Listing credible cited resources, please answer these below. 2. In the table below, based on the first letter of your last name, please select one number from each of the ranges in the x and y columns.
  • 3. Table A: Estimates of bit-transmissions and times First Letter of Your lastName Seconds Gigabits (Gb) A – D 2 to 3.99 2 to 3.99 E – H 4 to 7.99 4 to 7.99 I – L 8 to 15.99 8 to 15.99 M – P 16 to 31.99 16 to 31.99 Q – T 32 to 63.99 32 to 63.99 U – Z 64 to 79.99 64 to 79.99 Given that the throughput is the table’s Gigabits per seconds (Gbps), calculate and record this transfer rate for your chosen values with the formula: 3. Your school’s maximum network bandwidth is 1 Gbps. Does your answer from above exceed that or not? Based strictly on your value, do you think the maximum bandwidth should be raised? Will the network infrastructure need to be upgraded to support CAT6 cables? How did you arrive at this conclusion? Include the factors that influenced your decision.
  • 4. 4. According to your research, the school’s throughput speed R(t) in Gbps, with respect to time in seconds, is best modeled with the rational function: Generate a graph of this function using Excel or another graphing utility. (There are free downloadable programs like Graph 4.4.2 or Mathematics 4.0; or, there are also online utilities such as this site and many others.) Insert the graph into the Word document containing your answers and work details. Be sure to label and number the axes appropriately. 5. Peak Measured Throughput (PT): Peak or instantaneous throughputs (PT) measure values useful for systems that rely on bursts of data in a CAT5e cable. Unlike continuous streaming, information travels in short bursts. For example, during in-class demonstrations, a computer lab’s user experiences high traffic usage spikes on a very high-bandwidth that is transmitted over a relatively short period of time. Activity is important during these in-use peak times. Peak rates are measured limits taken with respect to throughput as time approaches zero. So for the above function, use algebraic techniques to find: Based strictly on this result, do you think your school should raise its current network’s bandwidth of 1 Gbps? How did you arrive at this conclusion? 6. Maximum Sustained Throughput (ST): One of the most accurate indicators of system performance for high duty cycle networks is the maximum sustained throughput (ST) averaged over a long period of time. This value measures the network capacity fully utilized over its entire existence. Essentially, high volumes of continuously streamed transmissions max out
  • 5. the amounts of data being transferred in because the network is busy processing current data and unable to efficiently enter the cable. This builds up the delivery time causing latency instabilities. In this case, sustained rates are measured limits taken with respect to throughput as time increases towards infinity. So for the above function, use algebraic techniques to find the following: Based strictly on this result, do you think your school should raise its current network’s bandwidth of 1 Gbps? How did you arrive at this conclusion? 7. Based on all of your previous results, do you think your school should raise its current network’s bandwidth of 1 Gbps? How did you arrive at this conclusion? References Desmos. (n.d.). Retrieved from https://www.desmos.com/ Graph 4.4.2. (n.d.). Retrieved from the Graph Web site: http://www.padowan.dk/ Mathematics 4.0. (n.d.). Retrieved from the Microsoft Web site: http://microsoft-mathematics.en.uptodown.com/ Page 1 of 3 Technology Review #1: Emerging Application of Technology (Consumer or Business). This paper is the first of two Technology Reviews that you will research and write for this course. For this paper, you must choose an emerging application of technology which is suitable for future use in a consumer-oriented product or service (i.e. a new product for personal or home use) or a business-oriented product or service. The technology review papers will be used to prepare your technology selection paper for the Analysis of Alternatives
  • 6. exercise later in the course. Your audience for these papers is a group of senior executives who will be meeting to decide which emerging technologies or emerging applications of technologies should be selected for one or more security-focused, Internal Research & Development projects during the next budget cycle. Each of these executives is responsible for a business area that will (a) develop products which incorporate the emerging technologies or (b) depend upon such products to support their organization’s operations. For this paper, you will perform the first three stages of the technology scan: Technology scanning is an evaluation model that is used when you need to develop a list of candidate technology solutions. A technology scan can also be used when you need to obtain information about the latest advancements in security products and technologies. The technology scan has four stages: scoping, searching, evaluating, and recommending. SCOPING The scoping phase of this technology scan has already been performed. Your scope is stages 3, 4, and early stage 5 as shown in the figure below. Image Source: http://www.atp.nist.gov/eao/gcr02- 841/chapt2.htm SEARCHING To begin, select a technology which is in the early-stage technology development, product development or early production/marketing stages of the product lifecycle (Stages 3, 4, or early stage 5 in the figure above). You may use news articles, press releases, and government or company Web sites to help you find an appropriate technology. (Remember to cite these sources in your paper.) Technologies which are currently in these stages include: · Big Data Analytics · Wearable Computing Devices (choose 1 specific device) · Physical Unclonable Functions (PUFs) (devices & electrical
  • 7. circuits) · Graphene · Dielectric thin films · Magneto-electric magnetic sensors · Nano imprinting · Nano machines · Neuromorphic computer chips You are encouraged to look for and investigate additional appropriate technologies before deciding upon your technology choice for this assignment. If you decide to research a technology that is not on the suggested technologies list (see above), you must first request and receive your instructor’s permission. Your instructor may require that you do preliminary library searches for research papers and technical papers to prove that you can find a sufficient number of resources to complete the assignment. Survey of the Professional Literature During your survey of the professional literature, you will identify 10 research papers or technical papers which provide technical information about your selected technology (see selection requirements for each paper). These papers must be dated 2011, 2012, 2013, 2014, or 2015 (five year window). Allowable sources for research papers / technical papers are: (a) professional journals, (b) conference proceedings, (c) dissertations or theses, and (d) technical magazines (published by either the ACM or IEEE). If an article from one of the above sources does not have a reference list containing at least 3 references you may use it in your review paper but it WILL NOT COUNT towards the “10 research or technical papers” requirement. The requirement to “survey the professional literature” must be met by using research papers/publications and technical papers which are available from the following UMUC online library databases: · ACM Digital Library http://ezproxy.umuc.edu/login?url=http://www.acm.org/dl
  • 8. · Dissertations & Theses (Pro Quest) http://ezproxy.umuc.edu/login?url=http://search.proquest.com/p qdtft/advanced?accountid=14580 · IEEE Computer Society Digital Library http://ezproxy.umuc.edu/login?url=http://www.computer.org/por tal/web/csdl/home · Science Direct http://ezproxy.umuc.edu/login?url=http://www.sciencedirect.co m/science/search EVALUATING In this stage, you will evaluate and report upon the information found during your survey of the professional literature. Read the abstract, introduction section, and closing sections for each of the sources identified in your survey of the professional literature. From this information, develop a summary of the technology that includes: (a) a description of technology and (b) planned uses of the technology (products, services, etc.). IMPORTANT: your technology review must incorporate information from each of your 10 “papers” from the professional literature. Note: You may use other sources in addition to the papers which comprise your survey of the professional literature. Next, brainstorm the security implications of this technology (if these are not specifically discussed by your sources). You should consider use of the technology to improve cybersecurity and uses which will negatively impact the security posture of an organization or the security of individual consumers or users of the product. It is very important that you consider BOTH SIDES OF THIS ISSUE. Note: Remember that the security posture of a system or product is framed in terms of risk, threats, vulnerabilities, etc. Improvements to the security posture (positive security implications) will result in reduced risk, increased resistance to threats or attacks, and decreased vulnerability. Negative impacts on the security posture will result in increased risk, decreased resistance to threats / attacks, and increased
  • 9. vulnerability (weakness). Write down your thoughts and ideas about the security implications of this technology using (a) the Five Pillars of Information Assurance and/or (b) the Five Pillars of Information Security. For your paper, you do not need to include all ten “pillars” but you should address a minimum of three. If you are targeting an “A” on your paper, address at least five of the pillars. · Five Pillars of Information Assurance: confidentiality, integrity, availability, authentication, and non-repudiation. These are defined in CNSSI-4009 and discussed quite nicely by K. S. Wilson in Conflicts Among the Pillars of Information Assurance http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/ login.aspx?direct=true&db=edswsc&AN=000322695100011&sit e=eds-live&scope=site · Five Pillars of Information Security: protection, detection, reaction, documentation, prevention. If you are not familiar with the origins of the five pillars of Information Security, read a copy of the original article by Amir Ameri at http://cf.rims.org/Magazine/PrintTemplate.cfm?AID=2409 You should provide specific examples using characteristics and/or applications of the technology, e.g. an emerging technology which can be used to manufacture cell phone cases which are less breakable may be chosen to replace current materials because the new material will decrease the risk of breakage. Decreased risk of breakage will decrease the probability of loss of availability caused by a broken case. Decreasing the probability of a negative event will decrease the risk associated with that event. WRITING YOUR EVALUATION Your paper must provide the reader with an overview of the technology followed by information about the potential security risks and/or benefits of its use (the security posture ).You MUST use information paraphrased from the papers found during your Survey of the Professional Literature (with
  • 10. appropriate in-text citations). Your Technology Review papers should be at least three pages in length but no more than five pages (excluding the title page and references page). Your papers must comply with the formatting guidance provided by your instructor. All papers in this course must also comply with APA Style for references and citations. See the resources posted under Content > Course Documents > APA Resources. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. Together, these items constitute the professionalism category in the assignment grading rubrics (worth 20% of the assignment’s grade). Grading Rubric: Consult the grading rubric for this assignment for specific information about content and formatting requirements. Title of PaperYour NameMonth Day, Year Running head: TECHNOLOGY REVIEW 1 3 Running head: TECHNOLOGY REVIEW Overview Provided an excellent overview of an emerging technology or emerging application of technology. The overview appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web
  • 11. sites. Demonstrated excellence in the use of standard cybersecurity terminology to support discussion of the technology. Appropriately used terminology from five or more pillars of IA/IS.Analysis Identified 10 or more papers from the professional literature. All papers used in the survey were from the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used 10 or more papers from the survey of the literature throughout the discussion (as demonstrated by correctly formatted and placed citations). Demonstrated excellence in the use of standard cybersecurity terminology to support discussion of the technology. Appropriately used terminology from five or more pillars of IA/IS. First Sub-section Provided an excellent discussion of how the emerging technology or emerging application of technology could be used to improve or support cybersecurity by reducing risk, increasing resistance to threats/attacks, decreasing vulnerabilities, etc. Discussion provided five or more specific examples of how these improvements would impact cybersecurity for information, information systems, and/or networks. The discussion appropriately used five or more "pillars" and was based upon information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. Demonstrated excellence in the use of standard cybersecurity terminology to support discussion of the technology. Appropriately used terminology from five or more pillars of IA/IS. Second Sub-section
  • 12. Provided an excellent discussion of how the emerging technology or emerging application of technology could be used by attackers to further their own goals and/or how specific anticipated or known vulnerabilities could be exploited. Discussion fully described how the technology could by attackers against information, information systems, and/or networks. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. Demonstrated excellence in the use of standard cybersecurity terminology to support discussion of the technology. Appropriately used terminology from five or more pillars of IA/IS.Summary and Conclusions Paragraph References Reynolds, G. W. (2010). Ethics in the information age (3rd ed.). Boston, MA: Course Technology.