Technology Selection Paper This assignment is Part 1 of a three-part Analysis of Alternatives evaluation exercise. You will post your draft of this paper no later than Friday of Week 6 in the weekly conference for review and evaluation by your peers. Your final paper should incorporate feedback from your peers and will be submitted for grading via your assignment folder. Follow the instructions posted by your instructor regarding peer review and “best paper” voting. For this paper, you will construct a recommendation to study and evaluate a specific technology. To support your recommendation you will use information from either your Technology Review #1 or Technology Review #2. By the time you are finished with your recommendation, you will have performed all four stages of the technology scan. GETTING STARTED Choose one of your technology reviews (#1 or #2) and rewrite the paper to serve as a background paper for a decision briefing for senior executives. These executives will be meeting to decide which emerging technologies or emerging applications of technologies will become part of one or more security-focused Internal Research & Development projects during the next budget cycle. Write down your thoughts and ideas about the security implications of this technology using (a) the Five Pillars of Information Assurance and/or (b) the Five Pillars of Information Security. For your paper, you do not need to include all ten “pillars” but you should address a minimum of three. If you are targeting an “A” on your paper, address at least five of the pillars. Throughout your recommendation (see below), you must keep your focus upon the security posture of this technology and its applications (e.g. products or services built upon this technology or which incorporate this technology). Note: If you had deficiencies in your survey of the professional literature for your chosen technology, you should correct that problem now. You may also add sources and, if necessary, remove inappropriate sources from your survey. Refer back to the original Detailed Project Description for your selected paper (TR1 or TR2). RECOMMENDATIONS FOR STUDY This assignment builds upon the technology scan which you performed for your three technology review papers and incorporates the final stage: recommending. Your focus in this paper must be upon identifying and presenting information from authoritative sources which supports a recommendation to select this technology for further study as part of an Internal Research & Development project (IR&D). Your recommendation should be based upon the following (at a minimum): characteristics (features and capabilities) of the technology interactions among the selected technology, people, environments, and processes (how will it be used; use cases if known) risks or vulnerabilities associated with adoption of this technology costs and benefits associated with adoption of this technology Addressing Costs and Benefits: Do not tell the reader how much the technology will cost. Discuss instead how much it might cost to SECURE this technology against cyber-attacks and/or how difficult it will be to deny criminals and terrorists the use of this technology. WRITING YOUR PAPER Your paper must provide the reader with an overview of the technology followed by information about the potential security risks and/or benefits of its use (the security posture ).You MUST use information paraphrased from the papers found during your Survey of the Professional Literature (with appropriate in-text citations). Revise the original paper then add the recommendation section. Your Technology Selection Paper should be at least three pages in length but no more than five pages (excluding the title page and references page). This means that you may need to shorten your original paper (cut out material) so that you can incorporate the additional information required for this assignment. GRADING Grading Rubric: Consult the grading rubric for specific content and formatting requirements for this assignment. APA Format: See the resources posted under Content > Course Documents > APA Resources. Additional Requirements: Your papers must comply with the formatting guidance provided by your instructor. All papers in this course must also comply with APA Style for references and citations.

    Technology Selection: Fat Axioms Analytics

    Introduction

    Ladies and gentlemen, the banking diligence today is saturated with every habit of technology utilizing twain wired and wireless connectivity. The technology the bank continues to cement in its schemes is increasingly compound in sketch so as to operative to feel the fat axioms processing requirements of the establishment. This presents a crowd of vulnerabilities to abstinence a cyber-attack. However, the power to restraintestcomplete an invasion helps to arrest that the construction suffers minimal waste from an invasion. This is owing it is referpotent likely to fully arrest a netproduct scheme from cyber-attacks. Nevertheless, fat axioms as an emerging technology promises to revolutionize the safety of referable attributable attributableification schemes restraint constructions that market with vast amounts of axioms such as banks. There are a compute of Fat Axioms analytics tools that if instrumented they can adequately secure the cyber environment from cybercrime activities. Restraint that this debate, this description recommends Microsoft Azure Axioms Bricks as undivided of the best carelessness tools that the establishment should instrument

    Microsoft Azure Axioms bricks

    Features and Capabilities

    Axioms Bricks is a Fat Axioms analytics program that offers an optimized extinguishedrival help through the Apache iota platform. Among the hold extinguished characteristics of the Axioms Bricks carelessness elucidations is the deed that it is deployed by proportioned undivided click of the mouse. In specification, the carelessness elucidation characteristic auto-scaling capabilities and a proceed-spell that has the cappower of fit the product o9f iota tasks by up to ×10-×100. With Microsoft Azure axioms Bricks carelessness elucidation, it is likely to proceed vast productloads in a ultimate, consume-prolific habit. In specification, it includes intimidation monitoring tools, an interactive referableebook platform and a fixed of carelessness protocols that frame it be consentaneous with a compute of manifestationrs. environments. Microsoft Azure can be manifestationd conjointly with Apache iota to optimize fat axioms analytics.

    Interaction with Its Environment

    Undivided of the senior developments to betide I the room of electronic axioms administration was when instruments became `multi-editable’, this instrument that diverse tribe could be afloat on the identical instrument at the identical spell. Similarly, the identical concept has been cementd in the earth of axioms experiences and axioms engineering (Russom, 2011). Microsoft Azure Axioms Bricks succeed adduce this revolutionary technology to the establishment’s axioms administration. The interactive referableebooks build amid axioms bricks can be shared speed. Real-spell collaboration instrument that diverse tribe in the construction could be afloat on undivided instrument abetting. A toil can be denominated lower innovatinglightlight parameters and be delivered safely and in spell. Interactive visualization can be optimized by integration PowerBI into the scheme. In specification, Microsoft Azure Axioms Bricks technology is comfortpotent to manifestation. A manifestationr can be operative to manifestation low sources of axioms conjointly, proceed algorithms abetting and be operative to gather the operations of the technology straightway to achieve producting straightway. The program has mighty tools that suffer the manifestationr recevery and awaken departed toils. Specificational characteristics such as R axioms and Python experience stacks are integrated into the scheme. This helps the schemes official to track conclusions and engender descriptions.

    Vulnerabilities Associated with The Adoption of The Technology

    It has been referableed that tool’s enlargeer enacts de-serialization of its socket axioms in an evasive environment. This instrument that every the programs that succeed be instituted programmatically using enlargeers API discourse succeed be vulneroperative to an harsh legislation that would enlarge by an invasioner with admittance to a national utensil or a nationalized manifestationr statement. It interests the axioms bricks elucidation schemes solely by-passing the iota-shell (Zakir et al, 2015). At this sharp-end, the hacker would be operative to enact commands as the bonafide manifestationr of the statement.  In specification, where axioms bricks analytics schemes possess been instrumented, the hackers possess an occasion to follow practice of the `trust’ on the home server and post a lure conjoin. The intention of the conjoin is to legerdemain the manifestationr to referable attributable attributableorious the locality, the conjoin may import scrutinizeing the locality succeed guide to a subject-matter weblocality excluding this is referpotent usually the circumstance. The hacker is solely looking restraint an admittance sharp-end. Therefore, in circumstance undivided chooses to scrutinize the website; they are giving the invasioner a uncounted ignoring into the netproduct environment. The invasioner follows curb of the admittance sharp-end and they can enact malicious commands with rest.

    Costs and Benefits

    Undivided of the senior benefits of adopting the technology is the deed that it provides a developer with a fixed of referable attributable attributableification administration erection protocols. In specification, it is consume prolific past it is likely to proceed multifarious programs at the identical spell (Srinivasa and Bhatnagar, 2012). its rest of manifestation instrument that the establishment succeed referpotent be required to run specificational consumes to retinue or surpassing innovatinglightlight staff to product with the scheme. The personnel that had been marketing with axioms partition can amply lowerhold and interact with the scheme. Nevertheless, the scheme has challenges in that it is a proportionately innovatinglightlight concept, in specification, the availoperative examination is referpotent definitive and past insights in the room of Fat Axioms Analytics are uninterruptedly cropping up. This may cevery restraint common changes which may interest the recognized affair of the establishment and to an extension its overevery product.

    Conclusion

    It is irresistible that the establishment adopts Microsoft Azure Axioms Bricks Fat Axioms partition technology. This is owing it is the guideing extinguishedrival axioms analytics program and it can be integrated with other schemes to optimize fat axioms and netproduct infrastructure hardening activities. The Azure technology succeed facilitate axioms partition and enhance vulnerpower overthrow.

    References

    Russom, P. (2011). Fat axioms analytics. TDWI best practices description, fourth quarter19(4), 1-34.

    Srinivasa, S., & Bhatnagar, V. (2012). Fat axioms analytics. In Proceedings of the First International Conference on Fat Axioms Analytics BDA (pp. 24-26).

    Zakir, J., Seymour, T., & Berg, K. (2015). BIG DATA ANALYTICS. Issues in Referable attributable attributableification Schemes16(2).