Technology Review #1: Emerging Application of Technology (Consumer or Business). Objective The purpose of this technology review is to identify an emerging application of technology, suitable for use by businesses or consumers, and then research the cybersecurity implications of the technology using journal articles, papers published in conference proceedings, and research studies published in dissertations. This type of research is also referred to as a survey of the literature. Overview Your audience is a group of senior executives who will be meeting to decide which emerging technologies or emerging applications of technologies should be selected for one or more security-focused, Internal Research & Development projects during the next budget cycle. Each of these executives is responsible for a business area that will (a) develop products that incorporate emerging applications of technology or (b) depend upon such products to support their organization’s operations. The high-level visibility for your deliverable means that you need to start from a strong foundation of suitable research-based journal articles, papers published in conference proceedings, and doctoral dissertations. The basic question that must be answered is: what are the cybersecurity implications (good or bad) of a specific emerging application of technology. In addition, the executives have expressed the following information needs, which must be met by the deliverable for this assignment. characteristics of the technology, use of the technology to support or improve cybersecurity, use of the technology to reduce or manage risk, use of the technology to increase resistance to threats/attacks, use of the technology to decrease vulnerabilities in an existing technology application, use or exploitation of the technology by attackers, criminals, terrorists, etc. to accomplish their goals. Instructions Format your deliverable as a “descriptive or informative” annotated bibliography. The UMUC library provides information about how to complete this type of assignment. See http://sites.umuc.edu/library/libhow/bibliography_apa.cfm (sub-heading “To get started”). In addition to the list of sources and annotations, you must provide an introductory paragraph. See the rubric for additional requirements for this assignment. Choose an Emerging Application of Technology To begin, choose an emerging application of technology, which is suitable for future use in a consumer-oriented product or service (i.e. a new product for personal or home use) or a business-oriented product or service. Applications of technology that are currently in the emerging stages include: Big Data Analytics (especially when used to identify patterns and indicators of threats and attacks) Wearable Computing Devices (choose 1 specific device) Physical Unclonable Functions (PUFs) (devices & electrical circuits) Graphene Dielectric thin films Magneto-electric magnetic sensors Nano imprinting Nano machines Neuromorphic computer chips You are encouraged to look for and investigate additional appropriate technologies before deciding upon your technology choice for this assignment. If you decide to research a technology that is not on the suggested technologies list (see above), you must first request and receive your instructor’s permission. Your instructor may require that you do preliminary library searches for research papers and technical papers to prove that you can find a sufficient number of resources to complete the assignment. Find Appropriate Sources (“Survey the Literature”) Brainstorm keywords that you can use to help find articles, papers, and other scholarly publications (“sources’) which discuss your chosen emerging application of technology. Allowable source types are: (a) professional journals, (b) conference proceedings, (c) dissertations or theses, and (d) technical magazines (published by either the ACM or IEEE). Each of your selected sources must have a reference list containing at least 3 references for authoritative papers. (See http://sites.umuc.edu/library/libhow/scholarlyjournals.cfm) Your selected sources must come from publications indexed in one or more of the following library databases: ACM Digital Library http://ezproxy.umuc.edu/login?url=http://www.acm.org/dl Dissertations & Theses (Pro Quest) http://ezproxy.umuc.edu/login?url=http://search.proquest.com/pqdtft/advanced?accountid=14580 IEEE Computer Society Digital Library http://ezproxy.umuc.edu/login?url=http://www.computer.org/portal/web/csdl/home Science Direct http://ezproxy.umuc.edu/login?url=http://www.sciencedirect.com/science/search Since the point of this search is to find information about emerging applications of technology, your sources must have a publication date of 2013 or later (2013, 2014, 2015, 2016, 2017). For papers indexed in Science Direct, you may also use papers that are marked “In Press.” To complete this part of the assignment, you may need to review 15 – 20 sources (search results) in order to find 10 papers or articles that are usable for this assignment. The sources you choose must provide technical information about your selected technology (see selection requirements for each paper). Create Your Bibliography (List of Sources) Choose the 10 best sources from your searches for articles, papers, and dissertations. Focus on the ones that give details about your technology and how it can be used in an emerging application of technology. Next, write the APA format reference list entry for each source. Alphabetize your list of reference list entries. After you have the correctly ordered list, number your entries from 1 to 10. Note: different reference entry formats are used for different types of sources. Review the UMUC Library’s “Get Help > Citing and Writing > APA Examples” for samples and explanations of the formatting rules. (http://sites.umuc.edu/library/libhow/apa_examples.cfm ) Your list should look something like the following. Authors. (date). Article title. Publication name, vol(issue), #-#. Authors. (date). Paper title. Published in the Proceedings of conference-name, pp. #-#. Author … Write Your Annotations In an annotated bibliography, the annotation is a paragraph or two placed under the reference list entry for each source. For this assignment, the annotation should be a combination of factual information from the source and your evaluation (opinion) of that information. To accomplish this, you should read the abstract, introduction section, and closing sections for each article or paper. For dissertations, look over the Introduction and the Literature Review (usually Chapters 1 & 2). From this information, develop a one to three paragraph informative or descriptive summary of the source that includes: (a) a description of technology and its characteristics, (b) planned uses of the technology (products, services, etc.), and (c) your thoughts and opinions as to how you could use this paper to justify selecting the technology for an Internal Research & Development study. In each annotation, you should provide at least one specific example of a characteristic and/or application of the technology, e.g. an emerging technology, which impacts cybersecurity. For example, for an annotation for an article about graphene’s applications to product design, you could discuss how it could be used to manufacture cell phone cases or laptop cases which are less breakable than cases made with current materials. This could positively impact availability because the new case design using graphene would be expected to decrease the risk of breakage. Decreased risk of breakage will decrease the probability of loss of availability caused by a broken case. Decreasing the probability of a negative event will decrease the risk associated with that event Note: Remember that the security posture of a system or product is framed in terms of risk, threats, vulnerabilities, etc. Improvements to the security posture (positive security implications) will result in reduced risk, increased resistance to threats or attacks, and decreased vulnerability. Negative impacts on the security posture will result in increased risk, decreased resistance to threats / attacks, and increased vulnerability (weakness). As you write the annotations for each article / paper / dissertation, make sure that you include YOUR thoughts and ideas about the security implications of this technology. Use standard terminology from the Five Pillars of Information Assurance and/or the Five Pillars of Information Security. You do not need to include all ten “pillars” but you should address a minimum of three. If you are targeting an “A” on your paper, address at least five of the pillars. (Sources for definitions of the Five Pillars of IA and Five Pillars of IS are listed under Content > Course Resources.) Five Pillars of Information Assurance (IA): confidentiality, integrity, availability, authentication, and non-repudiation. Five Pillars of Information Security (IS): protection, detection, reaction, documentation, prevention. As you brainstorm the security implications of this technology (if these are not specifically discussed by your source), you should consider use of the technology to improve cybersecurity. Then consider applications or uses which will negatively impact the security posture of an organization or the security of individual consumers or users of the product. It is very important that you consider BOTH SIDES OF THIS ISSUE. Putting It All Together Your annotated bibliography for your selected technology should be at least three pages in length and no more than ten pages (excluding the title page and references page). Your annotated bibliography must comply with the formatting guidance provided under Content > Course Resources > APA Resources (see the sample papers and the template file). Your annotated bibliography must comply with APA 6th Edition Style for references and citations. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.

    Tech critique: Proud Axioms Analytics

    Annotated Bibliography

    Introduction

    With technology increasingly nature used restraint opposed functions equal the simplest of tasks, the number of cyber onsets is jump to acception exponentially. Therefore it becomes irresistible restraint cyberspace users to shield their environments and be quick restraint restraintthcoming onsets. Historical axioms environing restraintegoing instruction coupled with the techniques of `Proud Axioms Analytics’ can acceleration elaborationers to irritate trends in cyber onsets and be operative to apprehend activities that are likely to direct to the insafety of the cyber environment of n existence. Cyber criminals are frequently on the appearout restraint these vulnerabilities except where the scheme is copiously patched using the concluding techniques; the possibility of facing an onset is greatly base. The cethcoming tenets stipulate an apprehension into the concept of `Proud Axioms Analytics’ and its contact in cyber trustworthyty issues.

     

    • Cardenas, A. A., Manadhata, P. K., &Rajan, S. P. (2013). Proud axioms analytics restraint trustworthyty. IEEE Trustworthyty & Privacy11(6), 74-76.

     

    The emergence of BDAs in late years has indispensablely transitional the anticipation of the admissiones and tools used restraint cyber trustworthyty and instruction skillful-treatment protocols. This condition explores the violent engagement betwixt cyber trustworthyty schemes developers and cyber-onset guileers. The event is that cyber criminals are devising past innovative ways of launching happy cyber-attacks. The condition emphasizes that the cyberspace class must be proactive in judgment ways of corrective these onsets.

     

    • Chen, H., Chiang, R. H., &Storey, V. C. (2012). Duty conception and analytics: from proud axioms to a proud collision. MIS Quarterly, 1165-1188.

     

    The regularity of instruction schemes and the power to discern trustworthyty issues, incidents and equalts are irresistible restraint integral existence that transacts its duty using cyberspace. This condition rendezvouses on the challenges that are cognate to the decomposition and the storage of wide alien and interdependent instruction and sources of axioms. The aim of the promulgation is to critique the husk of modeling, software engineering, and crop of algorithms that are consistent with the protocols of Proud Axioms analytics restraint duty and cyber trustworthyty conception.

     

    • Chen, H., Kazman, R., Monarch, I., & Wang, P. (2016). Forebodeing and fixing vulnerabilities precedently they supervene. Proceedings of the 2nd Intersocial Workshop on Proud Axioms Software Engineering 

     

    This condition emphasizes the deficiency to accept a proactive admission to combating cybersafety issues. The committers rendezvoused on a scheme that has been specifically planned restraint this purpose. The scheme in rendezvous is the `Proactive Cybersafety Schemes (PCS)’ the condition is an in-profundity appear how the scheme uses Proud Axioms to demonstrate and allay vulneroperative areas established on axioms cognate to truth of   attacks. The trial produced using the scheme stipulates copious instruction restraint the implementation of strategies meant to allay abutting restraintthcoming onsets. The condition attempts to exalt the PCS as an emerging technology that could dramatize a indispenspowerful role in highlighting areas of a network environment that may be impressible to cyber-attacks.

     

    • Cohen, J, Dolan, M., Heller stein, J.M,  & Walton, C. (2009). MAD Skills: New Decomposition, Practices restraint proud axioms. Proc. VLDB Endow., 2(2), 1481-1402

     

    The condition is on Magnetic, Agile, Deep (MAD) that has proven to accept ameliorate results when it comes to cybersafety conception that the social “Enterprise Axioms Engagementehouse”. The condition’s purpose of marrow is its exhibition of the admission rearwards the guile of MAD, its benefits and the techniques that are cognate to its contact in Proud Axioms decomposition. The committers begin their views relating the benefits of the technology and its sophistication that accelerations it to foundation cyber trustworthyty efforts. The condition is momentous restraint the event that it stipulates a instruction restraint neat trustworthyty measures used with axioms storage and axioms regularitying techniques.

     

    • Cuzzocrea, A., & Song, I. (2014). Big Graph Analytics. Proceedings of the 17th International Workshop on Data Warehousing and OLAP – DOLAP 14

     

    Proud Axioms decomposition can be applied when regularitying any axioms and instruction in an coercionm. This condition rendezvouses on scaling of proud axioms and instruction either cool from other sources or extracted from an coercionm’s axiomsbase. It defends that decomposition is produced efficiently according to the intentions of the user and order requirements. It identifies immanent cybersafety issues that may be skilled when regularitying wide amounts of axioms. The power identifies and discerns the vulnerabilities can acceleration scheme developers to beget a scheme that copiously unyielding in a mode that it can oppose the activities of cybercriminals.

     

    • Grove, R. (2009). Web Established Contact Crop. Jones & Bartlett acquirements.

     

    The condition is a minute decomposition of diverse web-established theories, languages, concepts, practices, and tools that are applicoperative when developing schemes that are aimed at trade with diverse cyber trustworthyty threats. The committer stipulates an in-profundity decomposition of the senior contacts that can be used to finish happy implementation of Proud Axioms techniques in cyber trustworthyty interventions. The condition is of indispenspowerful prize to cyber trustworthyty efforts as it stipulates a conceptual framework that can be used to set-up relioperative network edifice restraint trade with cyber trustworthyty issues.

     

    • Herodotou, H., Lim, H., Luo, G., Borisov, N,., Dong, L., Cetin, F.B., &Babu, s. (2011). Starfish?: A self-tuning scheme restraint Proud Axioms Analytics. CIDR, 11, 261-272

     

    Starfish is an emerging technology in cyber trustworthyty. The committers of this condition aimed at introducing the scheme as a “`self-tuning” scheme that defends willingness in the contact of axioms decomposition techniques as measures of combating cyber trustworthyty purposes. Starfish technologies stipulates a platform that allows effortless inseparable-force outside requiring manual manipulation. Similar to the MAD technology, the Starfish technology utilizes profundity, slightness, and magnetism to defend efficient and trustworthy analytic and storage functions. The condition stresses the consequence of Starfish technology restraint its opposed principles that wave the inseparable-force of Proud Axioms analytics restraint trustworthy, defend and efficient axioms decomposition and storage.

     

    • Mahmood, T., & Afzal, U. (2013, December). Trustworthyty analytics: Proud axioms analytics restraint cyber trustworthyty: A critique of trends, techniques, and tools. In Instruction arrogance (ncia), 2013 2nd social consultation on (pp. 129-134). IEEE.

     

    The condition is dubious of the event that the apparition of the internet has facilitated the emergence of diverse types of cyber trustworthyty and the number of onset. The committers attempt to begin Proud Axioms analytics as a technique of counteracting cyber threats. The at the continued popularity of Proud Axioms analytics in the province of cyber trustworthyty has been astride account other cyber trustworthyty techniques disused. The committers survive adamant that past elaboration requires nature produced on the contact of Proud Axioms analytics to cyber trustworthyty efforts. Analytics enoperative scheme administrators to frequent surveillance of their network environments and be operative to discern patterns that can be used to forebode and adapt restraint restraintthcoming onsets.

     

    • Peitz, M., &Waldfogel, J. The Oxford handbook of the digital administration. New York.

     

    In their write-up, Peitz and Waldfoge stipulated a open decomposition of the senior concerns that are unquiet with the collision of emerging technologies cyber trustworthyty. The argument stipulates inseparserviceeffectual apprehensions to the contact of cyber trustworthyty techniques such as proud axioms analytics. It too gives a roadmap restraint conducting elaboration activities on the consequence of“ Proud Axioms analytics to axioms storage as well-mannered-mannered as instruction decomposition including rendezvousing on indispenspowerful challenges facing duty, idiosyncratic and council entities and they strive to croak with the issues begined by cyber trustworthyty issues.

     

    • Sagiroglu, S., &Sinanc, D. (2013, May). Proud axioms: A critique. In Collaboration Technologies and Schemes (CTS), 2013 Intersocial Consultation on (pp. 42-47). IEEE.

     

    The condition stipulates a open decomposition of the emerging reliance of duty conception on Proud Axioms analytics. The committers rendezvous on the contents of instruction technology media and the profundity deficiencyed restraint programs to be operative to demonstrate and indicate cyber threats justly and as correspondently as practicable. The condition stresses the deficiency to be operative to shield one’s cyberspace and recommends the Proud Axioms decomposition as an copious technique of instruction and axioms skillful-treatment and trustworthyty.