Discussion

Anonymous
timer Asked: Jan 26th, 2017
account_balance_wallet $20

Question Description

1. Actions for Lightning Round Presentation: Big Data Analytics & Cyber Defense

You have been invited to participate in a "lightning round" (short, fast paced) presentations at an internal meeting of CISO staff members. These types of presentation are time limited and are used to focus on the most important information about a topic.

For your presentation you must prepare a 3 to 5 paragraph talking paper which addresses three or more findings from the Ponemon (2013) report.

Make sure that you address the "what's in it for me" factor, i.e. why should BDA be integrated into your company's cyber defense activities.

Your presentation should be 3 to 5 paragraphs in length and include citations and references for the Ponemon report and at least two additional authoritative sources.

Reference

Ponemon Institute. (2013, February). Big data analytics in cyber defense. Retrieved from http://www.ponemon.org/local/upload/file/Big_Data_Analytics_in_Cyber_Defense_V12.pdf


2. Cyber-Physical Systems for Smart Communities

Actions for 'Cyber-Physical Systems for Smart Communities'

The governor of your home state has decided to launch a "Smart Communities" initiative. These communities will depend upon cyber-physical systems to provide new or enhanced services. You have been asked to prepare a presentation for a state-wide public meeting to discuss the potential impact of "smart technologies" and the underlying "cyber-physical systems" on critical infrastructures for utilities and transportation in your home state.

Research the use of "smart" (cyber-physical) systems and technologies to build the communities of the future (streets / transportation, community services & facilities).

Here are two URLs to help you get started with your research:

Answer the following questions:

  1. What types of cyber-physical systems will be required to provide pervasive "awareness" and "reporting" capabilities in the community infrastructure?
  2. What types of cyber-physical systems will provide the greatest future benefits to the residents of such communities?
  3. What are the anticipated economic, social, and cultural impacts of technology enhanced smart cities?
  4. What are the anticipated vulnerabilities? For example, how could terrorists or criminal attack or compromise cyber-physical systems?

Format your presentation as a list of talking points using MS Word (not Power Point). Your document should be 2 - 3 pages in length. Include APA format citations and references as appropriate to the information used and the sources from which you obtained that information.

Tutor Answer

chemtai
School: University of Virginia

please find the attached file. i look forward to working with you again. good bye

Running head: PENEMON REPORT

1

Penemon Report
Name
Tutor
Institution
Course
Date

PENEMON REPORT

2
Ponemon report

The purpose of the study was to analyze the cyber security defenses which organizations
have put in place and how companies utilize the big data analytics in order to efficiently
recognize the patterns which present them with network threats. Big data analytics is the ability
for an organization to gather enough digital information which is useful in visualizing, analyzing
and drawing insights which usually make them vulnerable to cyber attacks. The study looked at
security awareness among IT and Information systems practitioners.
Most of the participants believed that the reason why organizations lack the power to
fight cyber threats is because they have not embraced security technologies and security
professional expertise. They also believed that service disruptions, information assets theft and
wrongful disclosure of confidential information were the most serious kinds of cyber attacks and
are more likely to cause serious consequences compared to other possible threats. A high
percentage of respondents believed that the most important technology security features which
organizations should embrace are controlling endpoints mobile and other device connections,
preventing unsecured devices from accessing the organization’s secured sy...

flag Report DMCA
Review

Anonymous
Excellent job

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors