Posted: January 30th, 2022
Emerging Application of Technology (Consumer or Business), computer science homework help
Question description
Know-how
Overview #1: Rising
Utility of Know-how (Shopper or Enterprise).
This paper is the
first of two Know-how Evaluations that you’re going to evaluation and write for this
course. For this paper, it is important to pick an rising software program of know-how
which is acceptable for future use in a consumer-oriented companies or merchandise
(i.e. a model new product for personal or residence use) or a business-oriented product or
service.
The know-how
analysis papers can be utilized to rearrange your know-how alternative paper for the
Analysis of Choices prepare later throughout the course. Your viewers for these
papers is a bunch of senior executives who could be meeting to
decide which rising utilized sciences or rising functions of utilized sciences must
be chosen for various
security-focused, Inside Evaluation & Enchancment duties by the following
funds cycle. Each of these
executives is liable for a enterprise area that may (a) develop merchandise
which incorporate the rising utilized sciences or (b) depend on such merchandise to
assist their group’s operations.
For this paper, you may perform the
first three ranges of the know-how scan:
Know-how
scanning is an evaluation model that is used when it’s advisable develop a list of
candidate know-how choices. A know-how scan can be utilized when you
should pay money for particulars in regards to the latest developments in security merchandise
and utilized sciences.
The
know-how scan has four ranges: scoping, searching, evaluating, and
recommending.
SCOPING
The scoping part of this know-how scan has already been
carried out. Your scope is ranges three, 4, and early stage 5 as confirmed throughout the decide
below.
Image
Provide: https://www.homeworkessaymarket.com/write-my-paper/atp.nist.gov/eao/gcr02-841/chapt2.htm
SEARCHING
To start out, select a
know-how which is throughout the early-stage know-how enchancment, product
enchancment or early manufacturing/promoting ranges of the product lifecycle
(Phases three, 4, or early stage 5 throughout the decide above). It is doable you may use data articles,
press releases, and authorities or agency Internet pages that can allow you to uncover an
acceptable know-how. (Concede to quote these sources in your paper.)
Utilized sciences which can be in the mean time in
these ranges embody:
·
Giant Information Analytics
·
Wearable Computing Items (choose 1 explicit
machine)
·
Bodily Unclonable Options (PUFs)
(items & electrical circuits)
·
Graphene
·
Dielectric skinny motion pictures
·
Magneto-electric magnetic sensors
·
Nano imprinting
·
Nano machines
·
Neuromorphic laptop computer chips
You is likely to be impressed to seek for and
study additional acceptable utilized sciences sooner than deciding upon your
know-how different for this venture.
While you decide to evaluation a know-how
that is not on the steered utilized sciences document (see above), it is important to first
request and acquire your trainer’s permission. Your trainer may require that you just do
preliminary library searches for evaluation papers and technical papers to indicate
that you would discover a ample number of property to complete the venture.
Survey of the
Expert Literature
All through your survey of the expert
literature, you may set up 10 evaluation papers or technical papers which
current technical particulars about your chosen know-how (see alternative
requirements for each paper). These papers ought to be dated 2011, 2012, 2013, 2014,
or 2015 (5 yr window).
Allowable sources for evaluation papers / technical papers are:
(a) expert journals, (b) conference proceedings, (c) dissertations or
theses, and (d) technical magazines (printed by each the ACM or IEEE). If
an article from considered one of many above sources does not have a reference document
containing on the very least three references you would use it in your analysis paper but it surely certainly
WILL NOT COUNT within the course of the “10 evaluation or technical papers” requirement.
The requirement to “survey the expert literature” ought to
be met by using evaluation papers/publications and technical papers which can be
accessible from the subsequent UMUC on-line library databases:
·
ACM Digital Library http://ezproxy.umuc.edu/login?url=https://www.homeworkessaymarket.com/write-my-paper/acm.org/dl
·
Dissertations & Theses (Skilled Quest) http://ezproxy.umuc.edu/login?url=http://search.proquest.com/pqdtft/superior?accountid=14580
·
IEEE Laptop computer Society Digital Library http://ezproxy.umuc.edu/login?url=https://www.homeworkessaymarket.com/write-my-paper/laptop computer.org/portal/web/csdl/residence
·
Science Direct http://ezproxy.umuc.edu/login?url=https://www.homeworkessaymarket.com/write-my-paper/sciencedirect.com/science/search
EVALUATING
On this stage, you may take into account and
report upon the information found all through your survey of the expert
literature. Be taught the abstract, introduction half, and shutting sections for
each of the sources acknowledged in your survey of the expert literature.
From this information, develop a summary of the know-how that options: (a) a
description of know-how and (b) deliberate makes use of of the know-how (merchandise,
suppliers, and plenty of others.). IMPORTANT: your know-how analysis ought to incorporate information
from each of your 10 “papers” from the expert literature.
Remember: It is doable you may use completely different sources in
addition to the papers which comprise your survey
of the expert literature.
Subsequent, brainstorm the protection
implications of this know-how (if these aren’t notably talked about by
your sources). It’s essential to take into consideration use of the know-how to boost
cybersecurity and makes use of which is ready to negatively have an effect on the protection posture of an
group or the protection of explicit particular person prospects or prospects of the product. It
is important that you just take into consideration BOTH SIDES OF THIS ISSUE.
Remember: Understand that the protection
posture of a system or product is framed by the use of menace, threats,
vulnerabilities, and plenty of others. Enhancements to the protection posture (constructive security
implications) will result in lowered menace, elevated resistance to threats or
assaults, and decreased vulnerability.
Harmful impacts on the protection posture will result in elevated menace,
decreased resistance to threats / assaults, and elevated vulnerability
(weak spot).
Homework help – Write down your concepts and ideas
regarding the security implications of this know-how using (a) the 5 Pillars
of Information Assurance and/or (b) the 5 Pillars of Information Security. For
your paper, you do not need to incorporate all ten “pillars” nevertheless it’s best to sort out
a minimal of three. If you happen to’re concentrating on an “A” in your paper, sort out on the very least
5 of the pillars.
· 5
Pillars of Information Assurance: confidentiality, integrity, availability,
authentication, and non-repudiation. These are outlined
in CNSSI-4009 and talked about pretty correctly by Okay. S. Wilson in Conflicts Among the many many Pillars of Information Assurancehttp://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edswsc&AN=000322695100011&web page=eds-live&scope=web page
· 5
Pillars of Information Security: security, detection, response,
documentation, prevention. If you happen to’re not acquainted with the
origins of the 5 pillars of Information Security, study a duplicate of the
distinctive article by Amir Ameri at http://cf.rims.org/Journal/PrintTemplate.cfm?AID=2409
It’s essential to current explicit examples
using traits and/or functions of the know-how, e.g. an rising
know-how which could be utilized to manufacture cell phone circumstances which can be a lot much less
breakable is also chosen to interchange current provides because of the model new supplies
will decrease the possibility of breakage. Decreased menace of breakage will decrease the possibility of lack of
availability introduced on by a broken case. Reducing the possibility of a
adversarial event will decrease the possibility
associated to that event.
WRITING
YOUR EVALUATION
Your paper ought to current the reader with
an overview of the know-how adopted by particulars in regards to the potential
security risks and/or benefits of its use (the protection posture ).You MUST use information paraphrased from the
papers found all through your Survey of the Expert Literature (with
acceptable in-text citations).
Your Know-how Overview papers must be
on the very least three pages in dimension nevertheless no more than 5 pages (excluding the title
net web page and references net web page).
You is likely to be anticipated to jot down grammatically proper English in
every venture.
Order | Check Discount
Sample Homework Assignments & Research Topics
Tags:
150-200 words discussion with a scholarly reference,
200-300 words response to classmate discussion question,
250 word analysis essay,
are dissertation writing services legal,
bachelor of nursing assignments