Technology Review #1: Emerging Application of Technology (Consumer or Business)




Technology Review #1: Emerging Application of Technology (Consumer or Business)
This paper is the first of two Technology Reviews that you will research and write for this course. For this paper, you must choose an emerging application of technology which is suitable for future use in a consumer-oriented product or service (i.e. a new product for personal or home use) or a business oriented product or service.
The technology review papers will be used to prepare your technology selection paper for the Analysis of Alternatives exercise later in the course. Your audience for these papers is a group of senior executives who will be meeting to decide which emerging technologies or emerging applications of technologies should be selected for one or more security-focused, Internal Research & Development projects during the next budget cycle. Each of these executives is responsible for a business area that will (a) develop products which incorporate the emerging technologies or (b) depend upon such products to support their organization’s operations.
For this paper, you will perform the first three stages of the technology scan:
SCOPING
Technology scanning is an evaluation model that is used when you need to develop a list of
candidate technology solutions. A technology scan can also be used when you need to obtain
information about the latest advancements in security products and technologies. 
The technology scan has four stages: scoping, searching, evaluating, and recommending. 
The scoping phase of this technology scan has already been performed. Your scope is stages 3, 4, and early stage 5 as shown in the figure below.
SEARCHING
To begin, select a technology which is in the early-stage technology development, product development or early production/marketing stages of the product lifecycle (Stages 3, 4, or early stage 5 in the figure above). You may use news articles, press releases, and government or company Web sites to help you find an appropriate technology. (Remember to cite these sources in your paper.)
Technologies which are currently in these stages include:
• Big Data Analytics
• Wearable Computing Devices (choose 1 specific device)
• Physical Unclonable Functions (PUFs) (devices & electrical circuits)
• Graphene
• Dielectric thin films
• Magneto-electric magnetic sensors
• Nano imprinting
• Nano machines
• Neuromorphic computer chips
You are encouraged to look for and investigate additional appropriate technologies before deciding upon your technology choice for this assignment.
If you decide to research a technology that is not on the suggested technologies list (see above), you must first request and receive your instructor’s permission.  Your instructor may require that you do preliminary library searches for research papers and technical papers to prove that you can find a sufficient number of resources to complete the assignment.
Survey of the Professional Literature
During your survey of the professional literature, you will identify 10 research papers or technical papers which provide technical information about your selected technology (see selection requirements for each paper). These papers must be dated 2011, 2012, 2013, 2014, or 2015 (five year window).
Allowable sources for research papers / technical papers are: (a) professional journals, (b) conference proceedings, (c) dissertations or theses, and (d) technical magazines (published by either the ACM or IEEE). If an article from one of the above sources does not have a reference list containing at least 3 references you may use it in your review paper but it WILL NOT COUNT towards the “10 research or technical papers” requirement. 
The requirement to “survey the professional literature” must be met by using research
papers/publications and technical papers which are available from the following UMUC online library databases:
• Dissertations & Theses (Pro Quest)
4580 
EVALUATING
In this stage, you will evaluate and report upon the information found during your survey of the
professional literature. Read the abstract, introduction section, and closing sections for each of the sources identified in your survey of the professional literature. From this information, develop a summary of the technology that includes: (a) a description of technology and (b) planned uses of the technology (products, services, etc.). IMPORTANT: your technology review must incorporate information from each of your 10 “papers” from the professional literature.
Note: You may use other sources in addition to the papers which comprise your survey of the
professional literature.  
Next, brainstorm the security implications of this technology (if these are not specifically discussed by your sources). You should consider use of the technology to improve cybersecurity and uses which will negatively impact the security posture of an organization or the security of individual consumers or users of the product. It is very important that you consider BOTH SIDES OF THIS ISSUE.  
Note: Remember that the security posture of a system or product is framed in terms of risk,
threats, vulnerabilities, etc. Improvements to the security posture (positive security
implications) will result in reduced risk, increased resistance to threats or attacks, and decreased
vulnerability.  Negative impacts on the security posture will result in increased risk, decreased
resistance to threats / attacks, and increased vulnerability (weakness). 
Write down your thoughts and ideas about the security implications of this technology using (a) the Five Pillars of Information Assurance and/or (b) the Five Pillars of Information Security. For your paper, you do not need to include all ten “pillars” but you should address a minimum of three. If you are targeting an “A” on your paper, address at least five of the pillars.
• Five Pillars of Information Assurance: confidentiality, integrity, availability, authentication,
and non-repudiation. These are defined in CNSSI-4009 and discussed quite nicely by K. S.
Wilson in Conflicts Among the Pillars of Information Assurance
swsc&AN=000322695100011&site=eds-live&scope=site 
• Five Pillars of Information Security: protection, detection, reaction, documentation,
prevention. If you are not familiar with the origins of the five pillars of Information Security,
read a copy of the original article by Amir Ameri at
You should provide specific examples using characteristics and/or applications of the technology, e.g. an emerging technology which can be used to manufacture cell phone cases which are less breakable may be chosen to replace current materials because the new material will decrease the risk of breakage.
Decreased risk of breakage will decrease the probability of loss of availability caused by a broken case.
Decreasing the probability of a negative event will decrease the risk associated with that event.
WRITING YOUR EVALUATION
Your paper must provide the reader with an overview of the technology followed by information about the potential security risks and/or benefits of its use (the security posture ).You MUST use information paraphrased from the papers found during your Survey of the Professional Literature (with appropriate in-text citations).
Your Technology Review papers should be at least three pages in length but no more than five pages (excluding the title page and references page).  
Your papers must comply with the formatting guidance provided by your instructor.  All papers in this course must also comply with APA Style for references and citations. See the resources posted under Content > Course Documents > APA Resources.
You are expected to write grammatically correct English in every assignment that you submit for
grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. Together, these items constitute the professionalism category in the assignment grading rubrics (worth 20% of the assignment’s grade).

Economic growth rates vary greatly from country to country. Look at the experiences of the United




Economic growth rates vary greatly from country to country. Look at the experiences of the United States, Japan, Ethiopia, and China over the last twenty years. 

Find the average growth rate for each country over that period.

What are some of the differences between those countries that have led to their different growth rates?

Identify at least two important and distinct government policies for each country that has helped lead to their unique experience.

A+ Paper




Objective:  Assess the issues, procedures, and techniques involved in IT resource contingency planning. 



Competencies: Critical thinking



Instructions: In approximately 10-12 double-spaced pages discuss the planning steps, possible recovery options, and recommended testing requirements needed to support a successful business contingency/continuity of operations environment.   Finally, the paper should include your recommendation for a proposed 24-month cycle business contingency testing plan — what should be tested and how the test should be conducted.  Perhaps ranking possible critical corporate assets with the type of testing (i.e., plan reviews, table-top exercises, or perhaps up to and including full blown backup and recovery tests) You should take into consideration costs associated with the recommended testing process — not only personnel and equipment but also production costs.  



Prepare your paper in Word. Include a minimum of 5 sources. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines. Note: Also include a cover page, a one-paragraph abstract, a table of contents and any appendix (if necessary), which do not count toward the regular length of the paper. 

A+ Answers




Question 1:
Select one option from A & B below and complete the discussion question.
    Option A) Discuss/describe the attacks associated with WEP, WPA, WPA2 or Bluetooth not covered in Module 9. How can these attacks be detected and prevented?
    Option B) Enhance and elaborate on the wireless LAN and Bluetooth related security topics covered in Module 9. Share any additional thoughts you may have on them.
Question 2:
Select one topic for discussion that you consider important regarding modern network security architecture. If the topic you want to discuss has previously been covered in one of the Modules, please enhance and elaborate on it. The following is a list of possible topics:
    VLAN architecture
    Firewall architecture
    802.1x /AAA
    SSL VPN architecture
    Secure wireless LAN architecture
    Many more (you may choose your own topic)

Application: Implementing Threading in a Client-Server Protocol




Application: Implementing Threading in a Client-Server Protocol

Server programs are rarely implemented as non-threaded applications, even though that is how you implemented your previous server application. Servers would not be able to provide the necessary throughput unless they used threading to allow for I/O to occur concurrently with servicing client requests.

For this Assignment, you will modify your finger server program from Week 6 to use threads. The server should activate a new thread to process each incoming client request, thus allowing client requests to be processed concurrently.

To prepare:

Start up NetBeans.
Open your implementation of the finger protocol from Week 6.

By Day 7, modify your finger server program to use threads. The server should activate a new thread to process each incoming client request, thus allowing client requests to be processed concurrently.

In addition, write a 5- to 7-page paper documenting the changes that you made and analyzing the impact the changes will have on the overall throughput and latency of the server.

Include in your paper responses to these questions:
What other solutions might you consider in order to increase throughput and reduce latency?
Which solution do you consider to have the better trade-off between performance and complexity?

Which solution do you consider to have the better application of modularity, abstraction, hierarchy, and layering?
Remember to properly cite your sources according to APA guidelines.

Save your implementation of the threaded finger server in a “.zip” file. You will also submit your paper documenting the implementation and analysis of your server separately