Sign In
Not register? Register Now!
Pages:
12 pages/β‰ˆ3300 words
Sources:
6 Sources
Style:
APA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 72.9
Topic:

Individual Assignment. Emerging Cybersecurity Technologies. IT Essay

Essay Instructions:

12/1/2017 Edit Rubric - New 670-Model-Individual Assignment-Rubric - CSEC 670 Model Cybersecurity Capstone (2182) - UMUC Learning Management … https://learn(dot)umuc(dot)edu/d2l/lp/rubrics/edit_structure.d2l?rubricId=394477&ou=300973 1/3 CSEC 670 Model Cybersecurity Capstone (2182) Course Home Content Discussions Assignments My Tools Resources Classlist Course Admin Help Edit Rubric - New 670-Model-Individual Assignment-Rubric Add Criterion Add Level Add Criteria Group Reorder Criteria Criteria Excellent Good - 90% Satisfactory - 80% Needs Improvement Clarity of discussion of emerging technologies and their main features (20%) 20 points Thorough discussion of three emerging technologies. Includes an exhaustive list of the main features and identity of the developer. Thoroughly discusses how each improves cyber security. Uses at least three real world examples. 18 points Thorough discussion of three emerging technologies. Includes the main features and identity of the developer and how it improves cyber security. Uses at least three real world examples. 17 points Adequate discussion of emerging technologies and main features. Includes the main features and identity of the developer and how it improves cyber security. Uses at least three real world examples. 16 points A less than adequate discussion of emerging technologies and main features. Includes the main features and identity of the developer and how it improves cyber security. Uses fewer than three real world examples. Clarity of discussion on how an organization would use these technologies (25%) 25 points Thorough discussion of use of these emerging technologies in an organization including three or more real world examples. 22 points Thorough discussion of use of these emerging technologies in an organization including two or more real world examples. 21 points The discussion of use of these emerging technologies in an organization is adequate and includes at least one real world example. 20 points The discussion of use of these emerging technologies in an organization is adequate however no real world examples are used. Complete discussion of the role of the federal government in support of the technologies (25%) 25 points Author takes a compelling position that is thoroughly developed and logically presented. The role of the federal government in developing/nurturing the technology and the benefits and 22 points Author takes a compelling position that is thoroughly developed and logically presented. The role of the federal government in developing/nurturing the technology and the benefits and 21 points Author takes a position that is sufficiently developed and logically presented. The role of the federal government in developing/nurturing the technology and the benefits and drawbacks of government efforts 20 points Author takes a position that is not sufficiently developed or logically presented. Arguments are not adequate but are somewhat focused on the role of the federal government in developing/nurturing the technology and Properties Levels and Criteria Bruce DeGrazia CSEC 670 Model Cyberse... Close 12/1/2017 Edit Rubric - New 670-Model-Individual Assignment-Rubric - CSEC 670 Model Cybersecurity Capstone (2182) - UMUC Learning Management … https://learn(dot)umuc(dot)edu/d2l/lp/rubrics/edit_structure.d2l?rubricId=394477&ou=300973 2/3 drawbacks of government efforts to support the technology are clearly defined and all arguments are persuasive. drawbacks of government efforts to support the technology are adequately defined. to support the technology are satisfactorily defined. the benefits and drawbacks of government efforts to support the technology. Quality of documented support (10%) 10 points The discussion in the paper is original and based on a thorough review of the literature and includes resources available through the UMUC library. More than eight documented sources are used. At least 75% of references are based on official reports, scholarly studies, or journal articles. 9 points The discussion in the paper is original and based on a thorough review of the literature and includes resources available through the UMUC library. Eight documented sources are used. At least 75% of references are based on official reports, scholarly studies, or journal articles. 8 points The discussion in the paper contains mostly original content and is based on an adequate review of the literature. Eight documented sources are used. At least 75% of references are based on official reports, scholarly studies, or journal articles. 7 points The scope of the research presented in the paper is inadequate. The discussion does not include much original content. There is a heavy reliance on non-credible source material such as Wikipedia, exam prep books, and “Dummies” guides. Organization (10%) 10 points The Table of Contents (TOC) and the document subheadings reflect a thorough outline of the questions asked in the assignment. The content is well organized with clear transitions among major subtopics. Introduction and conclusion are encompassing of the major points in the essay. 9 points The Table of Contents (TOC) and the document subheadings reflect a thorough outline of the questions asked in the assignment. The content is well organized with clear transitions among major subtopics, an introduction and a conclusion. 8 points The content is generally well organized with some improvement possible in transitions among subtopics. Adequate introduction and conclusion. 7 points The organization of the content is confusing without clear transitions among subtopics. Overuse of quoted material. Writing Style 5% 5 points Graduate-level writing is reflected throughout the paper, including accurate spelling, punctuation, grammar, and sentence structure. Essay is 12 - 15 pages in length. 4 points The introduction is written to give a preview of each subheading topic. Graduate-level writing is reflected throughout the paper, including accurate spelling, punctuation, grammar, and sentence structure. Only one minor grammatical error. Essay is 12 - 15 3 points Writing is generally acceptable, with a two to three minor errors in spelling, punctuation, grammar, and/or sentence structure. Essay is 12 - 15 pages in length. 2 points Writing is not acceptable. There are four or more errors in spelling, punctuation, grammar, and/or sentence structure. Use of first or second person. Essay is not at least five pages in length, or is less than 11 pages in length. Bruce DeGrazia Close 12/1/2017 Edit Rubric - New 670-Model-Individual Assignment-Rubric - CSEC 670 Model Cybersecurity Capstone (2182) - UMUC Learning Management … https://learn(dot)umuc(dot)edu/d2l/lp/rubrics/edit_structure.d2l?rubricId=394477&ou=300973 3/3 y pages in length. Use of proper APA formatting 5% 5 points In-text citations are in proper APA format. All sources are identified in the reference list and cited in proper APA format. No errors are present. 4 points In-text citations are in proper APA format and all sources are identified in the reference list and cited in proper APA format. Only one minor error is present. 3 points Two minor errors in citation identification and/or APA format. 2 points Three or more errors in citation identification and/or APA format, or uncited sources appear on the reference page. Overall Score Excellent 95 or more Good - 90% 90 or more Satisfactory - 85% 80 or more Needs Improvement 50% 0 or more Inadequate approach to the topic. Bruce DeGrazia Close

 

Individual Assignment:

 

Write a 12-15 page paper in which you identify and assess three (3) emerging cyber security technologies. Also discuss federal government efforts to nurture the development of each of these emerging technologies.  

An emerging cybersecurity technology is a technology that is in the genesis stage, is still being researched and developed, and has not been proven, standardized, or widely adopted. By that criteria, fingerprint and eye biometrics, and voice print ID are all unacceptable topics. There may be new research in one of these areas, but the basic ideas and first deployments occurred decades ago. Remote agent, moving target, trusted platform, cloud computing, big data, IoT, and forensic analysis are also not emerging cybersecurity technologies in and of themselves. These are areas where research is being done to improve cybersecurity, and you may write about those new technologies and how they are improving the older technology, but if you write a paper about these things without focusing on the new cybersecurity technologies being developed and/or applied, you will not like your grade. Remember, there are two points of focus here – the 3 chosen technologies must be emerging and cybersecurity related. The following points must be addressed in your paper for each of the 3 technologies that you choose.

 

  • Clearly define and describe each of the chosen emerging cyber security technologies, including discussions about the following topics.

o   main features and identity of the developer

o   how it improves cyber security

o   how an organization would use it

o   real-world examples of use, if already in use somewhere

o   role of the federal government in developing/nurturing the technology

o   benefits and drawbacks of government efforts to support the technology

 

Prepare your paper in Word and submit it through your Assignments Folder. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines. Proper formatting also means double spaced, 12-pt Times New Roman font, with 1-inch margins all around. Your paper must include: title page, table of contents, introduction, sections for each of the 3 technologies, conclusion, headings and subheadings, page numbers, and APA compliant in-text citations and list of references. The page count begins with the introduction and ends with the conclusion and does not include any figures or tables. No abstracts or running heads are needed. Include a minimum of 8 credible, external sources. At least 75% of references should be based on official reports, scholarly studies, or journal articles. The assignment is due at the end of Week 3, by Sunday 11:59 pm U.S. Eastern Time. Use your last name as the title of the file.

Students no longer have access to Turnitin to check the originality report – but I will submit your papers to Turnitin. More than a 15% similarity index will hurt your grade. Be careful – I take plagiarism very seriously.

 

 

Criteria

Excellent A (90+)

Satisfactory B (80-89)

Needs Improvement (below 80)

Clarity of discussion of 3 emerging technologies and their main features (25%)

Thorough discussion of emerging technologies and the main features including real world examples.

Adequate discussion of emerging technologies and main features.

Emerging technologies and main features are neither adequately discussed nor clearly stated.

Clarity of discussion on how an organization would use these technologies (25%)

Thorough discussion of use of these emerging technologies in an organization including real world examples.

The discussion of use of these emerging technologies in an organization is adequate.

The discussion of use of these emerging technologies in an organization is incomplete.

Complete discussion of the role of the federal government in support of these technologies (25%)

Author takes a compelling position that is thoroughly developed and logically presented.

Author takes a position that is sufficiently developed and logically presented.

Author takes no position, or a position that is not sufficiently developed and/or not logically presented.

Quality of documented support (10%)

The discussion in the paper is based on a thorough review of the literature, including official reports, research findings, and/or the UMUC library. Support comes from private organization research, plus federal and some state-level documents.

The discussion in the paper is based on an adequate review of the literature. Research documents help support arguments.

The scope of the research presented in the paper is inadequate. Heavy reliance on reference material (e.g. Wikipedia, exam prep books, “Dummies” guides).

Organization (5%)

The content is well organized with clear transitions among major subtopics.

The content is generally well organized with some improvement possible in transitions among subtopics.

The organization of the content is confusing without clear transitions among subtopics.

Writing style (5%)

Graduate-level writing is reflected throughout the paper, including accurate spelling, punctuation, grammar, and sentence structure.

Writing is acceptable, with a few errors in spelling, punctuation, grammar, and/or sentence structure.

Writing does not meet graduate standards. Unacceptable number of errors in spelling, punctuation, grammar and/or sentence structure.

Use of proper APA formatting (5%)

In-text citations are in proper APA format and all sources are identified in the reference list and cited in proper APA format.

Minor errors in citation identification and/or APA format.

Unacceptable number of errors in citation identification and/or APA format.

 

Grade:   

Individual Assignment

 

Essay Sample Content Preview:

Emerging Cybersecurity Technologies
Name
Institution
Table of Contents TOC \o "1-3" \h \z \u Introduction PAGEREF _Toc10405665 \h 3Blockchain Technology PAGEREF _Toc10405666 \h 3Features PAGEREF _Toc10405667 \h 4How Blockchain Technology improves Cybersecurity PAGEREF _Toc10405668 \h 5Application in Organizations PAGEREF _Toc10405669 \h 6Role of the Federal Government in Nurturing Blockchain Technology PAGEREF _Toc10405670 \h 6Benefits and Drawbacks of Government Efforts PAGEREF _Toc10405671 \h 7User-behavior Analytics PAGEREF _Toc10405672 \h 8Features PAGEREF _Toc10405673 \h 8How User-behavior Analytics Technology improves Cybersecurity PAGEREF _Toc10405674 \h 9Application in Organizations PAGEREF _Toc10405675 \h 10Role of the Federal Government in Nurturing the User-Behavior Analytics Technology PAGEREF _Toc10405676 \h 10Benefits and Drawbacks of Government Efforts in Supporting UBA Technology PAGEREF _Toc10405677 \h 11Machine Learning PAGEREF _Toc10405678 \h 11Features PAGEREF _Toc10405679 \h 12How Machine Learning improves Cybersecurity PAGEREF _Toc10405680 \h 12Application in Organizations PAGEREF _Toc10405681 \h 13Role of the federal government in nurturing Machine Learning PAGEREF _Toc10405682 \h 14Benefits of Government Efforts in Supporting Machine Learning PAGEREF _Toc10405683 \h 14Conclusion PAGEREF _Toc10405684 \h 15References PAGEREF _Toc10405685 \h 16
Emerging Cybersecurity Technologies
Introduction
As the world continues to be connected to the internet, new cyber-attacks threats keep emerging. As revealed by Chio and Freeman (2018), approximately all technological inventions have loopholes or vulnerabilities that can be exploited by persons with malicious intentions. In addition, even as more security measures and practices are developed, cyber-threats keep evolving. This is especially the case given that hacking has become a hot commodity, specifically in the dark web, resulting in a rise in cyber-attacks (Chio & Freeman, 2018). This has necessitated the development of new cybersecurity technologies to ensure that proper security and protection systems are in place. Some of these technologies are still in their initial stages and have not been applied on a large scale in cybersecurity, while others have been used previously in other industries, but have now gained momentum in the cybersecurity industry. This paper will identify and examine three emerging technologies while addressing the role that the federal government plays in nurturing and developing those technologies. The technologies examined are blockchain technology, user behavior analytics, and machine learning.
Blockchain Technology
Blockchain is an emerging technology whose applicability and effectiveness in cybersecurity is being tested and researched not only by government agencies but also by corporates, thanks to the ever-evolving cybersecurity threats. Basically, this technology can be termed as a distributive peer-to-peer network in which all data is secured (Shetty, Kamhoua, & Njilla, 2019), thus preventing cyber-attacks and other malicious activities such as identity thefts. It is classified into public, private and consortium blockchain, a classification that is based on users’ participation in the chain (Yun, et...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!