Write an 15 page (minimum length) paper in which you identify and assess emerging cyber security approaches and technologies as well as discuss government efforts to nurture the development of these emerging technologies.
An emerging technology is a technology that is in the genesis stage, is still being researched and developed, and has not been proven, standardized, or widely adopted. One way (but not the only way) to identify emerging cyber security approaches and technologies can be based on its novelty and interest as demonstrated by the availability of 5 or more recent (less than 12 months old) research papers from IEEE or ACM sources that address the identified cyber security technology/approach. By that criteria, fingerprint biometrics, eye biometrics, voice print ID as a class are all unacceptable topics. There may be a new research result in one of these areas, but the basic idea and first deployments of these technologies occurred over 30 years ago. These technologies are not emerging.
Your paper must include: Cover Page, Table of Contents, Introduction, Section Headings and Subheadings, Conclusions, APA compliant in-text citations and list of References, and page numbers. The paper must be formatted according to the mandatory paper format guidelines. The page count begins with the Introduction and ends with the Conclusions and does not include any figures or tables. Prepare your paper in Word (.doc or .docx). Include a minimum of 8 credible, external sources. At least 75% of references should be based on official reports, scholarly studies, or peer-reviewed journal articles. The latest edition of the APA manual is the authoritative reference for grammar questions for the assignment. The following two questions must be addressed in your paper.
1. How do the emerging cyber security technologies that you identified coupled with prioritized research and development improve cyber security?
A. Clearly define the emerging cyber security technologies that you identified as well as their main features.
B. Clearly define how an organization would use these emerging cyber security technologies.
C. Describe real-world examples of the use of these emerging cyber security technologies.
2. Discuss the role of the federal government in the support and nurturing of the emerging cyber security technologies that you identified.
A. Clearly discuss the benefits and drawbacks that government efforts to support new cyber escurity technologies may create.
B. Describe real-world examples that support your position.
A title page, table of contents and the reference pages are required. The page count starts with the Introduction and ends with the Conclusions. However, the page count DOES NOT include figures and tables. Prepare your paper in Word (.doc or .docx). Include a minimum of 8 credible, external sources. At least 75% of references should be based on official reports, scholarly studies, or peer-reviewed journal articles. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines. The assignment is due at the end of Week 3, by Sunday 11:59PM U.S. Eastern Time.
Before you submit your paper, you will need to run your assignment through Turnitin.com and receive an originality report. DO NOT WAIT UNTIL THE LAST MINUTE TO DO THIS. It might take several hours to a day or two for Turnitin.com to do this. Resubmissions can take a day or more. For instructions, go to the “Turnitin.com Instructions” conference posting under the “Important Documents and Rubrics” conference. After your paper meets all of the stated criteria in the posting, attach the paper AND the originality report in your Assignments Folder by the end of the week 3, by Sunday 11:59PM U.S. Eastern Time.
Prepare your paper in either Word (.doc or .docx) format and submit it through your Assignments Folder. The PDF version of the assignment generated by Turnitin must also be submitted. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.
Other correspondence from the instructor. I would like my topic to be on ?The Blockchain?
I am kind of stuck on a topic for my IA. I want to write about The Blockchain as an emerging technology but was not sure if it is a topic that you’re looking for. If not, do you have any ideas that I can squeeze 15 pages from because I’m not sure if Blockchain will. Please advise. Thanks, Professor.
OJ, not sure what angle you may have been thinking to address using Blockchain as the basis so sort of difficult to advise whether it’s a good topic. From a cyber security perspective, would you be looking at blockchain as the basis for a potentially larger global financial exchange mechanism and then examine the inherent vulnerabilities therein? I could see something along the lines of comparing that use versus the current financial transactions network, examining whether this approach lends any additional security or protection to the financial transactions that occur between banks and other financial institutions. Would that be something of interest or in line with your thinking?
If you think the data is not out there to support what you want to address, consider presenting what you think (based on the data available, your knowledge of the cyber challenges out there, and the pending financial difficulties that scaremongerers publish) and laying out how this might offer support to an enhanced, secure financial transaction approach. That would, in my view, take some detail to present the concept, explain its merits, explain its benefit to cyber security, and then address some of the mechanics of how it would be implemented. Make sense? If so, then I think there’s enough there for your paper — you actually might have to write much of it as original thinking (which is a really good thing).