Emerging cyber security approaches and technologies

Assignment Help Basic Computer Science
Reference no: EM13915272

Individual Assignment

Write an 18 page (or longer) paper in which you identify and assess emerging cyber security approaches and technologies as well as discuss government efforts to nurture the development of these emerging technologies.

An emerging technology is a technology that is in the genesis stage, is still being researched and developed, and has not been proven, standardized, or widely adopted. One way (but not the only way) to identify emerging cyber security approaches and technologies can be based on its novelty and interest as demonstrated by the availability of 5 or more recent (less than 12 months old) research papers from IEEE or ACM sources that address the identified cyber security technology/approach. By those criteria, fingerprint biometrics, eye biometrics, voice print ID as a class are all unacceptable topics. There may be a new research result in one of these areas, but the basic idea and first deployments of these technologies occurred over 30 years ago. These technologies are not emerging.

Your paper must include: Cover Page, Table of Contents, Introduction, Section Headings and Subheadings, Conclusions, APA compliant in-text citations and list of References, and page numbers. The paper must be formatted according to the mandatory paper format guidelines. The page count begins with the Introduction and ends with the Conclusions and does not include any figures or tables. The paper should include, at a minimum, your recommendations on liability and the reasoning behind it. Prepare your paper in Word (.doc or .docx). Include a minimum of 8 credible, external sources. At least 75% of references should be based on official reports, scholarly studies, or peer-reviewed journal articles. The latest edition of Strunk & White is the authoritative reference for grammar questions for the assignment. The following two questions must be addressed in your paper.

1. How do the emerging cyber security technologies that you identified coupled with prioritized research and development improve cyber security?

A. Clearly define the emerging cyber security technologies that you identified as well as their main features.

B. Clearly define how an organization would use these emerging cyber security technologies.

C. Describe real-world examples of the use of these emerging cyber security technologies.

2. Discuss the role of the federal government in the support and nurturing of the emerging cyber security technologies that you identified.

A. Clearly discuss the benefits and drawbacks that government efforts to support new cyber escurity technologies may create.

B. Describe real-world examples that support your position.

A title page, table of contents and the reference pages are required. The page count starts with the Introduction and ends with the Conclusions. However, the page count DOES NOT include figures and tables. Prepare your paper in Word (.doc or .docx). Include a minimum of 8 credible, external sources. At least 75% of references should be based on official reports, scholarly studies, or peer-reviewed journal articles. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

Before you submit your paper, you will need to run your assignment through Turnitin.com and receive an originality report. DO NOT WAIT UNTIL THE LAST MINUTE TO DO THIS. It might take several hours to a day or two for Turnitin.com to do this. Resubmissions can take a day or more. For instructions, go to the "Turnitin.com Instructions" conference posting under the "Important Documents and Rubrics" conference. After your paper meets all of the stated criteria in the posting,

Reference no: EM13915272

Questions Cloud

Preparing strategy audit report : Using the tools and framework learned in class and throughout the program, prepare a 15-page strategy audit of your company with a companion presentation.
What can we do to build good credit scores : What can we do to build good credit scores? In the long term and in the very short term? What does not work? What happens when one can’t pay one’s debt? What are the basics of bankruptcy proceedings?
Abstract and introduction : Need paper done with 8-10 pages not including cover page or reference. Please include abstract and introduction, that's already two pages out of your 8-10 pages. Please be original but if you do use other work please paraphrase.
Compare the present value of economic profit : Samantha Roberts has a job as a pharmacist earning $30,000 per year, and she is deciding whether to take another job as the manager of another pharmacy for $40,000 per year or to purchase a pharmacy that generates a revenue of $200,000 per year.Compa..
Emerging cyber security approaches and technologies : Write an 18 page (or longer) paper in which you identify and assess emerging cyber security approaches and technologies as well as discuss government efforts to nurture the development of these emerging technologies.
Members can only be used by its own methods and friends : 1. A class's ______ members can only be used by its own methods and friends. a.  public  b.  protected   c.  private    d.  final
What is the meaning of mutually exclusive events : What is the meaning of mutually exclusive events? What is meant by collectively exhaustive? In your responses, please give an example of each.
Operating activities using indirect method : Scranton, Inc. reports net income of $254,000 for the year ended December 31. It also reports $98,100 depreciation expense and a $6,200 gain on the sale of equipment. Its comparative balance sheet reveals a $40,300 decrease in accounts receivable, a ..
The trial balance of pacilio security services inc : Billed $120,000 of monitoring services for the year. Credit card sales amounted to $36,000, and the credit card company charged a 4 percent fee. The remaining $84,000 were sales on account. Sales tax is not charged on this service.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Java program to input values into array

Write a Java program to input the following values into an array named prices: 10.95, 16.32, 12.15, 8.22, 15.98, 26.22, 13.54, 6.45, 17.59.

  What is the chance that exactly one request is made

What is the chance that The bus is idle (0 requests), Exactly one request is made and More than one request is made.

  Draw.setscale(-1.0, 1.0); bullseye(); }}

Given code import java.awt.*; public class BullsEye{ public static void bullsEye(){ //Draw a BullsEye below. The bullseye should be centered on (0,0).

  About power point presentation

Weekly tasks or assignments (Individual or Group Projects) will be due by Monday, and late submissions will be assigned a late penalty in accordance with the late penalty policy found in the syllabus.

  How many bits are needed to encode book in ascii with parity

Estimate how many characters, including spaces, a typical computer-science textbook contains. How many bits are needed to encode a book in ASCII with parity?

  Discuss what methods can be used to circumvent the attack

discuss what methods can be used to circumvent the attack, prevent it, or minimize the disruption caused by the event.

  What information to save-process moves from running to idle

When a process moves from running to idle, the state of the machine has to be saved. Obviously this cannot mean the whole state, as there would be no place to save it. Just what information has to be saved?

  Utilize a constant called taxrate to hold the tax rate

Program should read in a file called "sales.txt". The contents of the text file are below. Read in all data from the file. Sore units in integers and store sales in doubles.The first integer is the first unit sales. The first double is the first $ o..

  Write a complete interactive menu-driven program

Write a complete interactive, menu-driven program using the binary file built previously and your primary and secondary indexes in memory.

  Distance between nodes u and v

The distance between nodes u and v in graph is the length of the shortest path from u to v. Given a d-dimensional hypercube and a designated source node s, how many nodes are distance i from s, where 0

  What is pseudocode

What is pseudocode? Why is it a useful way to describe a solution?

  On the off chance that more pictures

On the off chance that more pictures and/or recordings like those in Restrepo were found in the standard news, would general assessment of the war change, be encouraged or continue through to the end?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd