Discuss the role of the federal government

Assignment Help Computer Network Security
Reference no: EM131071858

Write an 15 page (minimum length) paper in which you identify and assess emerging cyber security approaches and technologies as well as discuss government efforts to nurture the development of these emerging technologies.

An emerging technology is a technology that is in the genesis stage, is still being researched and developed, and has not been proven, standardized, or widely adopted. One way (but not the only way) to identify emerging cyber security approaches and technologies can be based on its novelty and interest as demonstrated by the availability of 5 or more recent (less than 12 months old) research papers from IEEE or ACM sources that address the identified cyber security technology/approach. By that criteria, fingerprint biometrics, eye biometrics, voice print ID as a class are all unacceptable topics. There may be a new research result in one of these areas, but the basic idea and first deployments of these technologies occurred over 30 years ago. These technologies are not emerging.

Your paper must include: Cover Page, Table of Contents, Introduction, Section Headings and Subheadings, Conclusions, APA compliant in-text citations and list of References, and page numbers. The paper must be formatted according to the mandatory paper format guidelines. The page count begins with the Introduction and ends with the Conclusions and does not include any figures or tables. The paper should include, at a minimum, your recommendations on liability and the reasoning behind it. Prepare your paper in Word (.doc or .docx). Include a minimum of 8 credible, external sources. At least 75% of references should be based on official reports, scholarly studies, or peer-reviewed journal articles. The latest edition of the APA manual is the authoritative reference for grammar questions for the assignment. The following two questions must be addressed in your paper.

1. How do the emerging cyber security technologies that you identified coupled with prioritized research and development improve cyber security?
A. Clearly define the emerging cyber security technologies that you identified as well as their main features.
B. Clearly define how an organization would use these emerging cyber security technologies.
C. Describe real-world examples of the use of these emerging cyber security technologies.

2. Discuss the role of the federal government in the support and nurturing of the emerging cyber security technologies that you identified.
A. Clearly discuss the benefits and drawbacks that government efforts to support new cyber escurity technologies may create.
B. Describe real-world examples that support your position.

A title page, table of contents and the reference pages are required. The page count starts with the Introduction and ends with the Conclusions. However, the page count DOES NOT include figures and tables. Prepare your paper in Word (.doc or .docx). Include a minimum of 8 credible, external sources. At least 75% of references should be based on official reports, scholarly studies, or peer-reviewed journal articles. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

The writing is easy to understand and the sentences are well written and makes sense.

Verified Expert

Reference no: EM131071858

Questions Cloud

Discuss the functions of grievance procedures : Discuss the functions of grievance procedures.
Computing the net income : The average total assets for company x equal $1,000,000 while the firm earns a net profit margin of 10% with an asset turnover ratio of two. What is their net income?
Find the vectors describing the forces on the cables : MA3410: Vectors and Functions of Several Variables Exercise. A 500-lb load hangs from three cables of equal length that are anchored at the points (-2, 0, 0), (1, √3, 0), and (1, -√3, 0). The load is located at (0, 0, -2√3). Find the vectors descri..
Estimate of the stock current price : The company's stock has a beta of 1.8, the risk-free rate is 3.5%, and the market risk premium is 6%. What is your estimate of the stock's current price? Round your answer to the nearest cent.
Discuss the role of the federal government : CSEC 670 Assignment - How do the emerging cyber security technologies that you identified coupled with prioritized research and development improve cyber security?
Prepare the business combination valuation entries : Prepare the business combination valuation entries and pre-acquisition entries at I January 2017. Prepare the business combination valuation entries and pre-acquisition entries at 31 December 2017.
Amount of financing offered by the french government : Suppose it turns out that having $800 million in franc financing actually adds to Disney's economic exposure. How should this affect Disney's willingness to accept the full amount of financing offered by the French government?
Evaluate the strength of inductive generalizations : To prepare to write this discussion, read Chapter, focusing especially the section on "Strengthening Inductive Reasoning" in Chapter. Take a look as well at the required resources from this week, including What is a Strong Argument?
Computing the expected rate of return : Its dividend is expected to grow at a constant rate of 9.00%p per year. If walter's stock currently trades for $18.00 per share, what is the expected rate of return?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Calculate sales tax in cell e36 by multiplying the tax rate

On the Stock Investments worksheet, pull in the current stock prices from finance.google.com.On the right side of the page, you will find the World markets section. Select that data to be imported into the worksheet. Make sure you place it in the ..

  Describe a malware attack that causes the victim

Describe a malware attack that causes the victim to receive physical advertisement and describe how to modify a NAT router to prevent packets with spoofed IP addresses from exiting a private network.

  Expected time to find user passwords by dictionary attack

Suppose that eight more characters were added to the password and that the DES algorithm was changed so as to use all 16 password characters. What would be the expected time to find all users' passwords using a dictionary attack?

  Evaluate the effect of this ruling on forensic investigation

Evaluate the effect of this ruling on forensic investigations from a forensics standpoint and determine whether or not you would consider this an "open door" for criminal activity. Justify your answer

  Identify all potential security threats on personal computer

Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system

  Examine the information security and other technology

analyze the information security and other technology issues discussed in the article. develop a security strategy that

  What are the core components of a pki

What are the core components of a PKI? Briefly describe each component - Explain the problems with key management and how it affects symmetric cryptography.

  The discussion board db is part of the core of online

the discussion board db is part of the core of online learning. classroom discussion in an online environment requires

  Computer program controlling a weapons system

Inspection of a computer program controlling a weapons system shows 54 "if" statements (23 with "else" clauses), 4 "switch" statements

  Cryptosystem

Block cipher, Primitive root, Confusion, Diffusion, Digital signature, Conventional Symmetric-Key Encryption

  Examine the many different types of attacks

There are many different types of infrastructure attacks. These include, but are not limited to, malware, insertion, buffer overflow, etc. Examine the many different types of attacks and select the two that you believe are the easiest for succes..

  What types of physical controls can be implemented

What types of physical controls can be implemented to protect the perimeter of a building

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd