emerging application of technology in a critical infrastructure 1

Technology Review #2: Emerging Application of Technology in a Critical Infrastructure

Objective

The purpose of this technology review is to identify, discuss, and evaluate the cybersecurity implications of an emerging application of technology in the context of a critical infrastructure sector. Your selected technology may be hardware, software, or systems that rely upon both hardware and software. Your research will also include an examination of the cybersecurity implications of using this technology in critical infrastructures. This type of research is also referred to as a survey of the literature. Allowable sources for your literature survey are journal articles, papers published in conference proceedings, and research studies published in dissertations.

Overview

Your audience is a group of senior executives who will be meeting to decide which emerging applications of technologies should be selected for a security-focused, Internal Research & Development projects during the next budget cycle. Each of these executives is responsible for developing products and systems that support next generation systems in the nation’s critical infrastructure sectors.

The high-level visibility for your deliverable means that you need to start from a strong foundation of suitable research-based journal articles, papers published in conference proceedings, and doctoral dissertations. The basic question that must be answered about the selected technology is: what are the cybersecurity implications (good or bad) for the selected critical infrastructure sector?

In addition, the executives have expressed the following information needs, which must be met by the deliverable for this assignment:

(a)characteristics of the critical infrastructure,

(b)characteristics of the technology,

(c)use of the technology to support or improve cybersecurity,

(d)use of the technology to reduce or manage risk,

(e)use of the technology to increase resistance to threats/attacks,

(f)use of the technology to decrease vulnerabilities in an existing technology application,

(g)use or exploitation of the technology by attackers, criminals, terrorists, etc. to accomplish their goals.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!