CSIA 459 University of Maryland Evaluating Emerging Technology Development Paper: Website Design Answers 2021

CSIA 459 University of Maryland Evaluating Emerging Technology Development Paper: Website Design Answers 2021

CSIA 459 University of Maryland Evaluating Emerging Technology Development Paper: Website Design Answers 2021

Question Title:

CSIA 459 University of Maryland Evaluating Emerging Technology Development Paper

Full Question:

Unformatted Attachment Preview

CSIA 459: Evaluating Emerging Technologies
Technology Review #2: Emerging Application of Technology in a Critical Infrastructure
Objective
The purpose of this technology review is to identify, discuss, and evaluate the cybersecurity implications
of an emerging application of technology in the context of a critical infrastructure sector. Your selected
technology may be hardware, software, or systems that rely upon both hardware and software. Your
research will also include an examination of the cybersecurity implications of using this technology in
critical infrastructures. This type of research is also referred to as a survey of the literature. Allowable
sources for your literature survey are journal articles, papers published in conference proceedings, and
research studies published in dissertations.
Overview
Your audience is a group of senior executives who will be meeting to decide which emerging
applications of technologies should be selected for a security-focused, Internal Research & Development
projects during the next budget cycle. Each of these executives is responsible for developing products
and systems that support next generation systems in the nation’s critical infrastructure sectors.
The high-level visibility for your deliverable means that you need to start from a strong foundation of
suitable research-based journal articles, papers published in conference proceedings, and doctoral
dissertations. The basic question that must be answered about the selected technology is: what are the
cybersecurity implications (good or bad) for the selected critical infrastructure sector?
In addition, the executives have expressed the following information needs, which must be met by the
deliverable for this assignment:
(a)
(b)
(c)
(d)
(e)
(f)
(g)
characteristics of the critical infrastructure,
characteristics of the technology,
use of the technology to support or improve cybersecurity,
use of the technology to reduce or manage risk,
use of the technology to increase resistance to threats/attacks,
use of the technology to decrease vulnerabilities in an existing technology application,
use or exploitation of the technology by attackers, criminals, terrorists, etc. to accomplish their
goals.
Instructions
Format your deliverable as a “descriptive or informative” annotated bibliography. The UMGC library
provides information about how to complete this type of assignment. See
https://sites.umgc.edu/library/libhow/bibliography_apa.cfm (sub-heading “To get started”). APA style is
recommended but, you may use another professional format for your annotated bibliography.
Copyright © 2021 by University of Maryland Global Campus. All rights reserved.
CSIA 459: Evaluating Emerging Technologies
In addition to the list of sources and annotations, you must provide an introductory paragraph.
See the rubric for additional requirements for this assignment.
Note: If you have problems accessing any of the library databases, contact the UMGC librarians via the
contact methods listed on the library’s home page https://sites.umgc.edu/library/index.cfm . They will
be able to assist you with login issues and/or search engine questions (but will not do your research for
you).
Choose a Critical Infrastructure Sector
“There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or
virtual, are considered so vital to the United States that their incapacitation or destruction would have a
debilitating effect on security, national economic security, national public health or safety, or any
combination thereof” (Department of Homeland Security, 2016, p.1).
Choose a critical infrastructure sector to focus your technology review. For definitions of critical
infrastructures, see https://www.dhs.gov/critical-infrastructure-sectors. You may wish to choose your
emerging application of technology first and then select an appropriate critical infrastructure in which
your selected technology can be applied or deployed.
Choose an Emerging Application of Technology
Choose an emerging application of technology that can be used in the computers, digital devices, and
other electronic / electrical technologies (including networks and network infrastructures) that are
deployed in or used to build, operate, support, or maintain a critical infrastructure sector (e.g. utilities,
pipelines, transportation, smart cities, etc.).
Suggested technologies include:







Autonomous Vehicles (ground, sea, or air): Transportation Systems Sector
Deep Space Communication Networks: Communications Sector
Implantable Medical Devices: Healthcare and Public Health Sector
Precision Agriculture (integrated systems using satellite imagery, GPS, Sensors, Robots):
Food & Agriculture Sector
Robot inspectors for physical infrastructures (buildings, roads, railways, pipelines, etc.):
Multiple Sectors
Smart Grid (also called Advanced Metering Infrastructure): Energy Sector
Wearable Sensors for Hazardous Materials Detection (e.g. CBRNE): Emergency Services
Sector
Copyright © 2021 by University of Maryland Global Campus. All rights reserved.
CSIA 459: Evaluating Emerging Technologies
You are encouraged to look for and investigate additional appropriate technologies before deciding
upon your technology choice for this assignment.
If you decide to research a technology that is not on the suggested technologies list (see above), you
must first request and receive your instructor’s permission. Your instructor may require that you do
preliminary library searches for research papers and technical papers to prove that you can find a
sufficient number of resources to complete the assignment.
Find Appropriate Sources (“Survey the Literature”)
You may find it helpful to begin by reading the tables of contents for recent issues of the
Communications of the ACM, IEEE Computer Magazine, IEEE Pervasive Computing, and IEEE Security &
Privacy. These professional journals frequently publish highly readable, research-based articles about
the cybersecurity implications of new and emerging technologies in the context of critical infrastructure
sectors.
Next, brainstorm keywords that you can use to find additional articles, papers, and other scholarly
publications (“sources’) which discuss and/or evaluate your selected emerging application of technology
in the context of your chosen critical infrastructure.
Your selected sources must come from publications indexed in one or more of the following library
databases:




ACM Digital Library https://ezproxy.umgc.edu/login?url=https://www.acm.org/dl
Dissertations & Theses (Pro Quest)
https://ezproxy.umgc.edu/login?url=https://search.proquest.com/pqdtft/advanced?accountid=1
4580
IEEE Computer Society Digital Library https://www-computer-org.ezproxy.umgc.edu/csdl/home
Science Direct
https://ezproxy.umgc.edu/login?url=https://www.sciencedirect.com/science/search
Since the point of this search is to find information about emerging applications of technology for a
critical infrastructure, your sources must have a publication date of 2017 or later (2017, 2018, 2019,
2020, 2021). For papers indexed in Science Direct, you may also use papers that are marked “In Press.”
Allowable source types are: (a) professional journals, (b) conference proceedings, (c) dissertations or
theses, and (d) technical magazines (published by either the ACM or IEEE). Each of your selected sources
must have a reference list containing at least 3 references for authoritative papers. (See
https://sites.umgc.edu/library/libhow/scholarlyjournals.cfm)
To complete this part of the assignment, you may need to review 15 – 20 sources (search results) in
order to find 10 papers or articles that are usable for this assignment. The sources you choose must
Copyright © 2021 by University of Maryland Global Campus. All rights reserved.
CSIA 459: Evaluating Emerging Technologies
provide technical information about your selected technology (see selection requirements for each
paper).
Create Your Bibliography (List of Sources)
Choose the 10 best sources from your searches for articles, papers, and dissertations. Focus on the ones
that give details about your technology and how it can be used in an emerging application of
technology. Next, write the reference list entry (APA, MLA, or another appropriate professional citation
style) for each source. Alphabetize your list of reference list entries. After you have the correctly ordered
list, number your entries from 1 to 10. Note: different reference entry formats are used for different
types of sources. Review the UMUC Library’s “Get Help > Citing and Writing for samples and
explanations of the formatting rules. If you are using APA format, your list should look something like
the following.
1. Authors. (date). Article title. Publication name, vol(issue), #-#.
2. Authors. (date). Paper title. Published in the Proceedings of conference-name, pp. #-#.
3. Author …
Write Your Annotations
In an annotated bibliography, the annotation is a paragraph or two placed under the reference list entry
for each source. For this assignment, the annotation should be a combination of factual information
from the source and your evaluation (opinion) of that information. To accomplish this, you should read
the abstract, introduction section, and closing sections for each article or paper. For dissertations, look
over the Introduction and the Literature Review (usually Chapters 1 & 2). From this information, develop
a one to three paragraph informative or descriptive summary of the source that includes: (a) a
description of technology and its characteristics, (b) planned uses of the technology in the critical
infrastructure, and (c) your thoughts and opinions as to how you could use this paper to justify selecting
the technology for an Internal Research & Development study.
In each annotation, you should provide at least one specific example of a characteristic and/or
application of the technology, e.g. an emerging technology, which impacts cybersecurity.
For example, for an annotation for an article about robots used to inspect dams and bridges, you could
focus upon the need to secure the WiFi communications used to operate the device (“command and
control” links). Improving the security of the WiFi transmissions would reduce the risk that attackers
could take control of the robot or otherwise interfere with its operations. This in turn will decrease the
probability of loss of availability caused by a successful attack. Decreasing the probability of a negative
event will decrease the risk associated with that event
Note: Remember that the security posture of a system or product is framed in terms of risk,
threats, vulnerabilities, etc. Improvements to the security posture (positive security
Copyright © 2021 by University of Maryland Global Campus. All rights reserved.
CSIA 459: Evaluating Emerging Technologies
implications) will result in reduced risk, increased resistance to threats or attacks, and decreased
vulnerability. Negative impacts on the security posture will result in increased risk, decreased
resistance to threats / attacks, and increased vulnerability (weakness).
As you write the annotations for each article / paper / dissertation, make sure that you include YOUR
thoughts and ideas about the security implications of this technology. Use standard terminology per the
resources in this course and in your previous coursework.
As you brainstorm the security implications of this technology (if these are not specifically discussed by
your source), you should consider use of the technology to improve cybersecurity. Then consider
applications or uses which will negatively impact the security posture of the identified critical
infrastructure. It is very important that you consider BOTH SIDES OF THIS ISSUE.
Putting It All Together
1. Consult the grading rubric for specific content and formatting requirements for this assignment.
2. Your 5-8 page annotated bibliography should be professional in appearance with consistent use
of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your
paper.
3. Your paper should use standard terms and definitions for cybersecurity. See Course Content >
Cybersecurity Concepts Review for recommended resources.
4. The CSIA program recommends that you follow standard APA formatting since this will give you
a document that meets the “professional appearance” requirements. APA formatting guidelines
and examples are found under Course Resources > APA Resources. An APA template file (MS
Word format) has also been provided for your use
CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.
5. You must include a cover page with the assignment title, your name, and the due date. Your
reference list must be on a separate page at the end of your file. These pages do not count
towards the assignment’s page count.
6. You are expected to write grammatically correct English in every assignment that you submit for
grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c)
verifying that your punctuation is correct and (d) reviewing your work for correct word usage
and correctly structured sentences and paragraphs.
7. You are expected to credit your sources using in-text citations and reference list entries. Both
your citations and your reference list entries must follow a consistent citation style (APA, MLA,
etc.).
Copyright © 2021 by University of Maryland Global Campus. All rights reserved.

Purchase answer to see full
attachment

This question was handled by a Studyhelp247 Website Design tutor and the student left a positive review. 19+ custom answers have been given to students for this question in November 2021 alone. To avoid plagiarism and maintain student privacy, we do not resell answers. Get your custom solution now. It is affordable.

Bram Eldoff, Founder, Studyhelp247.com

Consider this Website Design Assignment Done
Beat its deadline and stringent requirements.

[advanced_iframe securitykey=”your key” use_shortcode_attributes_only=”true” src=”https://core.studyhelp247.com/main-site-question-post/” id=”example4″ height=”350″ width=”450″ show_part_of_iframe=”true” show_part_of_iframe_x=”-100″ show_part_of_iframe_y=”75″ show_part_of_iframe_width=”450″ show_part_of_iframe_height=”350″ show_part_of_iframe_new_window=”_top” show_part_of_iframe_new_url=”https://core.studyhelp247.com/new-question-posting/”]

>Approximate cost: $8 per page.<br>>Choose your own tutor.<br>>Get free revision, plagiarism reports, and a list of sources.<br>>Release the money only after delivery

How it Works

hw

Why you should post this Website Design question now.

Flawless Deliveries
Our tutors deliver fault free assignments after careful and detailed research. All instructions are followed to the letter.

100% Originality Guarantee
Every task delivered to students on our platform has 100% originality guarantee. Find plagiarism, get 100% money back.

Timely Deliveries
When you post a question here, we assure on-time delivery, or 100% money back. You cannot miss deadlines with us.

24/7 Customer Support
Our support agents are always online, ready to help you when using our platform. It only gets better.

Student-Friendly Prices
Getting quality help should not break your pocket. Find instant quality help for whatever budget you have.

Free Revisions
You can request your tutor for as many revisions as needed to ensure you are 100% satisfied with our services.

100% Privacy
Every action you take on our platform is anonymous. Once you receive your help, it is almost as if you weren’t here.

100% Refunds
If a tutor breaks any of our guarantees, you get 100% money back to ask questions in the future. No questions.

Here are other questions on different subjects that our tutors have handled with excellent results.

The first ones are IAUSS Canadian Business Law Elements Necessary to Create a Bailment Essay and How Do We Define the Concept of Opportunity Cost Discussion Questions which required in-depth research and computations. The third and fourth ones are CSIA 459 University of Maryland Evaluating Emerging Technology Development Paper and SAT tutor, which called for experts to help with online quizzes. All these were answered for students who were looking for study assistants for homework help 2021

Reviews from Students; Verified by Trustalyze

Studyhelp247 Exceeded my expectations.

Rated 5 out of 5
2 years ago

I believe in studyhelp247 now. Here, I found the best tutor to assist me with a complex math task. It was seamless using the site.

Avatar for SdfDsf
SdfDsf

Response from Studyhelp247

Thank you for using our platform to find academic help. We are happy that you found what you were looking for.

By far, the best source of affordable custom writing solutions.

Rated 5 out of 5
2 years ago

I came to studyhelp247 after seeing an ad and they have been great. It is quite affordable owing to the fact that there are no service fee charges.

Avatar for Student01
Student01

Response from Studyhelp247

Thank you for the great review. We are committed to providing the best platform to foster student excellennce. 🙂

Very responsive support

Rated 5 out of 5
2 years ago

I have enjoyed using studyhelp247. The support was very responsive and I received quality work

Avatar for Alsalem
Alsalem

Response from Studyhelp247

Thank you.
Our support agents are always available to assist you with any issue.

Great work done for me by Anastacia.

Rated 5 out of 5
2 years ago

Thank you for the great work that you delivered. I will be back for more. 🙂

Avatar for Elsie
Elsie

Response from Studyhelp247

Thank you for using our site.

Refund Reason

Assignment Help. All November

Nov 2021 Offer

Get 50% Discount 

Happy Student - Studyhelp247

Press ENTER or click get started below to submit. 

Via Email

A Minute,

THIS YEAR, YOU EXCEL

Post Any Question for           Instant Assistance from Qualified Tutors.

 

Pay 10% Less when Hiring.

 

Get a Professional Tutor / Writer for as Low as $1