Technology Research 2 Annotation Bibliography, computer science homework help

User Generated

errffrf214

Computer Science

Description

Please follow rubrics and discription of project all references MUST be from these databases: IEEE Database - http://ieeexplore.ieee.org/Xplore/home.jsp ACM Database - https://dl.acm.org/ Science Direct Database - http://www.sciencedirect.com/ Please include annotaion bibliograpgy for each refernce and follow description of project for all parts of the annotations. Bibliography must be in APA 6th edition Please Follow Accordingly No Less than 10 references. After each reference place whether they were from ACM, IEEE, or Science Direct. Selected technology must be from the list provided one of them must be selected. Please follow all required work that need to be included within assignment.

Unformatted Attachment Preview

Technology Review #2: Emerging Application of Technology in a Critical Infrastructure Objective The purpose of this technology review is to identify, discuss, and evaluate the cybersecurity implications of an emerging application of technology in the context of a critical infrastructure sector. Your selected technology may be hardware, software, or systems that rely upon both hardware and software. Your research will also include an examination of the cybersecurity implications of using this technology in critical infrastructures. This type of research is also referred to as a survey of the literature. Allowable sources for your literature survey are journal articles, papers published in conference proceedings, and research studies published in dissertations. Overview Your audience is a group of senior executives who will be meeting to decide which emerging applications of technologies should be selected for a security-focused, Internal Research & Development projects during the next budget cycle. Each of these executives is responsible for developing products and systems that support next generation systems in the nation’s critical infrastructure sectors. The high-level visibility for your deliverable means that you need to start from a strong foundation of suitable research-based journal articles, papers published in conference proceedings, and doctoral dissertations. The basic question that must be answered about the selected technology is: what are the cybersecurity implications (good or bad) for the selected critical infrastructure sector? In addition, the executives have expressed the following information needs, which must be met by the deliverable for this assignment: (a) (b) (c) (d) (e) (f) (g) characteristics of the critical infrastructure, characteristics of the technology, use of the technology to support or improve cybersecurity, use of the technology to reduce or manage risk, use of the technology to increase resistance to threats/attacks, use of the technology to decrease vulnerabilities in an existing technology application, use or exploitation of the technology by attackers, criminals, terrorists, etc. to accomplish their goals. Instructions Format your deliverable as a “descriptive or informative” annotated bibliography. The UMUC library provides information about how to complete this type of assignment. See http://sites.umuc.edu/library/libhow/bibliography_apa.cfm (sub-heading “To get started”). Copyright © 2017 by University of Maryland University College. All rights reserved. In addition to the list of sources and annotations, you must provide an introductory paragraph. See the rubric for additional requirements for this assignment. Before you begin your research and writing, review the grading rubric attached to the Assignment Folder entry for this assignment. The rubric provides specific information about content and formatting requirements. After you have reviewed the rubric, follow the instructions provided below. Choose a Critical Infrastructure Sector “There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof” (Department of Homeland Security, 2016, p.1). Choose a critical infrastructure sector to focus your technology review. For definitions of critical infrastructures, see https://www.dhs.gov/critical-infrastructure-sectors. You may wish to choose your emerging application of technology first and then select an appropriate critical infrastructure in which your selected technology can be applied or deployed. Choose an Emerging Application of Technology Choose an emerging application of technology that can be used in the computers, digital devices, and other electronic / electrical technologies (including networks and network infrastructures) that are deployed in or used to build, operate, support, or maintain a critical infrastructure sector (e.g. utilities, pipelines, transportation, smart cities, etc.). Suggested technologies include: • • • • • • • • Autonomous Vehicles (ground, sea, or air): Transportation Systems Sector Crypto Currencies: Financial Services Sector (DO NOT CHOOSE Bitcoins) Deep Space Communication Networks: Communications Sector Implantable Medical Devices: Healthcare and Public Health Sector Precision Agriculture (integrated systems using satellite imagery, GPS, Sensors, Robots): Food & Agriculture Sector Robot inspectors for physical infrastructures (buildings, roads, railways, pipelines, etc.): Multiple Sectors Smart Grid (also called Advanced Metering Infrastructure): Energy Sector Wearable Sensors for Hazardous Materials Detection (e.g. CBRNE): Emergency Services Sector Copyright © 2017 by University of Maryland University College. All rights reserved. You are encouraged to look for and investigate additional appropriate technologies before deciding upon your technology choice for this assignment. If you decide to research a technology that is not on the suggested technologies list (see above), you must first request and receive your instructor’s permission. Your instructor may require that you do preliminary library searches for research papers and technical papers to prove that you can find a sufficient number of resources to complete the assignment. Find Appropriate Sources (“Survey the Literature”) You may find it helpful to begin by reading the tables of contents for recent issues of the Communications of the ACM, IEEE Computer Magazine, IEEE Pervasive Computing, and IEEE Security & Privacy. These professional journals frequently publish highly readable, research-based articles about the cybersecurity implications of new and emerging technologies in the context of critical infrastructure sectors. Here are some examples to get you started: Bellatti, J., Brunner, A., Lewis, J., & Annadata, P. (2017). Driving habits data: Location privacy implications and solutions. IEEE Security & Privacy, 15(1), 12-20. Erdelj, M., Natalizio, E., Chowdhury, K. R., ^ Akyildiz, I.F. (2017). Help from the sky: Leveraging UAVs for disaster management. IEEE Pervasive Computing, 16(1), 24-32. Khatoun, R., & Zeadally, S. (2016). Smart cities: Concepts, architectures, research opportunities. Communications of the ACM, 59(8), 46-57. Wac, K., Rivas, H., & Fiordelli, M. (2017). Quality-of-life technologies. Computer, 50(3), 14-19. Next, brainstorm keywords that you can use to find additional articles, papers, and other scholarly publications (“sources’) which discuss and/or evaluate your selected emerging application of technology in the context of your chosen critical infrastructure. Allowable source types are: (a) professional journals, (b) conference proceedings, (c) dissertations or theses, and (d) technical magazines (published by either the ACM or IEEE). Each of your selected sources must have a reference list containing at least 3 references for authoritative papers. (See http://sites.umuc.edu/library/libhow/scholarlyjournals.cfm) Your selected sources must come from publications indexed in one or more of the following library databases: • • ACM Digital Library http://ezproxy.umuc.edu/login?url=http://www.acm.org/dl Dissertations & Theses (Pro Quest) http://ezproxy.umuc.edu/login?url=http://search.proquest.com/pqdtft/advanced?accountid=1 4580 Copyright © 2017 by University of Maryland University College. All rights reserved. • • IEEE Computer Society Digital Library http://ezproxy.umuc.edu/login?url=http://www.computer.org/portal/web/csdl/home Science Direct http://ezproxy.umuc.edu/login?url=http://www.sciencedirect.com/science/search Since the point of this search is to find information about emerging applications of technology for a critical infrastructure, your sources must have a publication date of 2013 or later (2013, 2014, 2015, 2016, 2017). For papers indexed in Science Direct, you may also use papers that are marked “In Press.” To complete this part of the assignment, you may need to review 15 – 20 sources (search results) in order to find 10 papers or articles that are usable for this assignment. The sources you choose must provide technical information about your selected technology (see selection requirements for each paper). Create Your Bibliography (List of Sources) Choose the 10 best sources from your searches for articles, papers, and dissertations. Focus on the ones that give details about your technology and how it can be used in a critical infrastructure. Next, write the APA format reference list entry for each source. Alphabetize your list of reference list entries. After you have the correctly ordered list, number your entries from 1 to 10. Note: different reference entry formats are used for different types of sources. Review the UMUC Library’s “Get Help > Citing and Writing > APA Examples” for samples and explanations of the formatting rules. (http://sites.umuc.edu/library/libhow/apa_examples.cfm ) Your list should look something like the following. 1. Authors. (date). Article title. Publication name, vol(issue), #-#. 2. Authors. (date). Paper title. Published in the Proceedings of conference-name, pp. #-#. 3. Author … Write Your Annotations In an annotated bibliography, the annotation is a paragraph or two placed under the reference list entry for each source. For this assignment, the annotation should be a combination of factual information from the source and your evaluation (opinion) of that information. To accomplish this, you should read the abstract, introduction section, and closing sections for each article or paper. For dissertations, look over the Introduction and the Literature Review (usually Chapters 1 & 2). From this information, develop a one to three paragraph informative or descriptive summary of the source that includes: (a) a description of technology and its characteristics, (b) planned uses of the technology in the critical infrastructure, and (c) your thoughts and opinions as to how you could use this paper to justify selecting the technology for an Internal Research & Development study. Copyright © 2017 by University of Maryland University College. All rights reserved. In each annotation, you should provide at least one specific example of a characteristic and/or application of the technology, e.g. an emerging technology, which impacts cybersecurity. For example, for an annotation for an article about robots used to inspect dams and bridges, you could focus upon the need to secure the WiFi communications used to operate the device (“command and control” links). Improving the security of the WiFi transmissions would reduce the risk that attackers could take control of the robot or otherwise interfere with its operations. This in turn will decrease the probability of loss of availability caused by a successful attack. Decreasing the probability of a negative event will decrease the risk associated with that event Note: Remember that the security posture of a system or product is framed in terms of risk, threats, vulnerabilities, etc. Improvements to the security posture (positive security implications) will result in reduced risk, increased resistance to threats or attacks, and decreased vulnerability. Negative impacts on the security posture will result in increased risk, decreased resistance to threats / attacks, and increased vulnerability (weakness). As you write the annotations for each article / paper / dissertation, make sure that you include YOUR thoughts and ideas about the security implications of this technology. Use standard terminology from the Five Pillars of Information Assurance and/or the Five Pillars of Information Security. You do not need to include all ten “pillars” but you should address a minimum of three. If you are targeting an “A” on your paper, address at least five of the pillars. (Sources for definitions of the Five Pillars of IA and Five Pillars of IS are listed under Content > Course Resources.) • Five Pillars of Information Assurance (IA): confidentiality, integrity, availability, authentication, and non-repudiation. • Five Pillars of Information Security (IS): protection, detection, reaction, documentation, prevention. As you brainstorm the security implications of this technology (if these are not specifically discussed by your source), you should consider use of the technology to improve cybersecurity. Then consider applications or uses which will negatively impact the security posture of the identified critical infrastructure. It is very important that you consider BOTH SIDES OF THIS ISSUE. Putting It All Together Your annotated bibliography for your selected technology should be at least three pages in length and no more than ten pages (excluding the title page and references page). Your annotated bibliography must comply with the formatting guidance provided under Content > Course Resources > APA Resources (see the sample papers and the template file). Your annotated bibliography must comply with APA 6th Edition Style for references and citations. Copyright © 2017 by University of Maryland University College. All rights reserved. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. References Department of Homeland Security. (2016). Critical infrastructure sectors. Retrieved from https://www.dhs.gov/critical-infrastructure-sectors Copyright © 2017 by University of Maryland University College. All rights reserved. Rubric Name: Technology Review #2 Annotated Bibliography Bibliography Introduction Excellent Outstanding Acceptable 10 points 8.5 points 7 points Provided an outstanding introductory Provided an excellent paragraph that introductory paragraph that included a brief included a brief description description of of the selected critical the selected infrastructure sector and the critical emerging application of infrastructure technology. Explained how sector and the the survey of the emerging professional literature was application of conducted (keywords, technology. databases searched). Briefly explained Summarized the results of how the survey the survey of the literature of the (what was found in each professional database, the quality of the literature was articles, etc.). conducted (keywords, databases searched). 10 points 8.5 points Provided an acceptable introductory paragraph that named the critical infrastructure sector and included a brief description of the selected emerging application of technology. Named the databases which were searched. 7 points Survey of the Literature Identified an appropriate technology and then surveyed the professional literature. Bibliography includes 10 or more appropriate sources obtained from at least three of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). 10 points APA Format Reference Entries Identified an appropriate technology and then surveyed the professional literature. Bibliography includes 8 or more appropriate sources obtained from at least three of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Identified an appropriate technology and then surveyed the professional literature. Bibliography includes 7 or more appropriate sources obtained from at least two of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). 8.5 points 7 points APA Format Reference Entries Annotations Annotation for Source #1 Bibliography contains a reference list entry for each identified source. Reference list entries and in-text citations are correctly formatted using the appropriate APA style for each type of resource. Bibliography contains a reference list entry for each identified source. One or two minor errors in APA formatting. Bibliography contains a reference list entry for each identified source. Three to five minor errors in APA formatting. Excellent Outstanding Acceptable 5 points 4 points 3 points Annotation for Source #1 Annotation for Source #2 Provided an excellent summary of an appropriate source. The summary clearly and concisely explained how this source could be used to meet five (5) or more of the information needs of executives as listed in the detailed assignment description. Provided an outstanding summary of an appropriate source. The summary clearly explained how this source could be used to meet four (4) or more of the information needs of executives as listed in the detailed assignment description. Provided an acceptable summary of an appropriate source. The summary explained how this source could be used to meet at least three (3) of the information needs of executives as listed in the detailed assignment description. 5 points 4 points 3 points Provided an excellent summary of an appropriate source. The summary clearly and concisely explained how this source could be used to meet five (5) or more of the information needs of executives as listed in the detailed assignment description. Provided an outstanding summary of an appropriate source. The summary clearly explained how this source could be used to meet four (4) or more of the information needs of executives as listed in the detailed assignment description. Provided an acceptable summary of an appropriate source. The summary explained how this source could be used to meet at least three (3) of the information needs of executives as listed in the detailed assignment description. 5 points 4 points 3 points Annotation for Source #3 Annotation for Source #4 Provided an excellent summary of an appropriate source. The summary clearly and concisely explained how this source could be used to meet five (5) or more of the information needs of executives as listed in the detailed assignment description. Provided an outstanding summary of an appropriate source. The summary clearly explained how this source could be used to meet four (4) or more of the information needs of executives as listed in the detailed assignment description. Provided an acceptable summary of an appropriate source. The summary explained how this source could be used to meet at least three (3) of the information needs of executives as listed in the detailed assignment description. 5 points 4 points 3 points Provided an excellent summary of an appropriate source. The summary clearly and concisely explained how this source could be used to meet five (5) or more of the information needs of executives as listed in the detailed assignment description. Provided an outstanding summary of an appropriate source. The summary clearly explained how this source could be used to meet four (4) or more of the information needs of executives as listed in the detailed assignment description. Provided an acceptable summary of an appropriate source. The summary explained how this source could be used to meet at least three (3) of the information needs of executives as listed in the detailed assignment description. 5 points 4 points 3 points Annotation for Source #5 Annotation for Source #6 Provided an excellent summary of an appropriate source. The summary clearly and concisely explained how this source could be used to meet five (5) or more of the information needs of executives as listed in the detailed assignment description. Provided an outstanding summary of an appropriate source. The summary clearly explained how this source could be used to meet four (4) or more of the information needs of executives as listed in the detailed assignment description. Provided an acceptable summary of an appropriate source. The summary explained how this source could be used to meet at least three (3) of the information needs of executives as listed in the detailed assignment description. 5 points 4 points 3 points Provided an excellent summary of an appropriate source. The summary clearly and concisely explained how this source could be used to meet five (5) or more of the information needs of executives as listed in the detailed assignment description. Provided an outstanding summary of an appropriate source. The summary clearly explained how this source could be used to meet four (4) or more of the information needs of executives as listed in the detailed assignment description. Provided an acceptable summary of an appropriate source. The summary explained how this source could be used to meet at least three (3) of the information needs of executives as listed in the detailed assignment description. 5 points 4 points 3 points Annotation for Source #7 Annotation for Source #8 Provided an excellent summary of an appropriate source. The summary clearly and concisely explained how this source could be used to meet five (5) or more of the information needs of executives as listed in the detailed assignment description. Provided an outstanding summary of an appropriate source. The summary clearly explained how this source could be used to meet four (4) or more of the information needs of executives as listed in the detailed assignment description. Provided an acceptable summary of an appropriate source. The summary explained how this source could be used to meet at least three (3) of the information needs of executives as listed in the detailed assignment description. 5 points 4 points 3 points Provided an excellent summary of an appropriate source. The summary clearly and concisely explained how this source could be used to meet five (5) or more of the information needs of executives as listed in the detailed assignment description. Provided an outstanding summary of an appropriate source. The summary clearly explained how this source could be used to meet four (4) or more of the information needs of executives as listed in the detailed assignment description. Provided an acceptable summary of an appropriate source. The summary explained how this source could be used to meet at least three (3) of the information needs of executives as listed in the detailed assignment description. 5 points 4 points 3 points Annotation for Source #9 Annotation for Source #10 Provided an excellent summary of an appropriate source. The summary clearly and concisely explained how this source could be used to meet five (5) or more of the information needs of executives as listed in the detailed assignment description. Provided an outstanding summary of an appropriate source. The summary clearly explained how this source could be used to meet four (4) or more of the information needs of executives as listed in the detailed assignment description. Provided an acceptable summary of an appropriate source. The summary explained how this source could be used to meet at least three (3) of the information needs of executives as listed in the detailed assignment description. 5 points 4 points 3 points Provided an excellent summary of an appropriate source. The summary clearly and concisely explained how this source could be used to meet five (5) or more of the information needs of executives as listed in the detailed assignment description. Provided an outstanding summary of an appropriate source. The summary clearly explained how this source could be used to meet four (4) or more of the information needs of executives as listed in the detailed assignment description. Provided an acceptable summary of an appropriate source. The summary explained how this source could be used to meet at least three (3) of the information needs of executives as listed in the detailed assignment description. Professionalism Use of Standard Cybersecurity Terminology Excellent Outstanding Acceptable 5 points 4 points 3 points Deliverable showed an outstanding Demonstrated excellence in understanding the use of standard and integration cybersecurity terminology to of standard support the deliverable. cybersecurity Appropriately used terminology. terminology from five or Appropriately more pillars of IA/IS. used terminology from four or more pillars of IA/IS. 5 points Organization & Appearance 4 points Submitted work has minor style or formatting flaws but still presents a Submitted work shows professional excellence in organization appearance. and the use of color, fonts, Submitted work titles, headings and subis well organized headings, etc. is appropriate and to the assignment type. appropriately uses color, fonts, and section headings (per the assignment’s directions). 10 points 8.5 points Correctly used standard cybersecurity terminology in the deliverable. Appropriately used terminology from three or more pillars of IA/IS. 3 points Organization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved. 7 points Execution Overall Score No formatting, grammar, spelling, or punctuation errors. Work contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance. Errors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work. Excellent Outstanding Acceptable 100 or more 85 or more 75 or more Needs Improvement 6 points Provided an introductory paragraph for the bibliography that identified the critical infrastructure sector and the technology being researched. 6 points Needs Significant Improvement 5 points Provided an introductory paragraph but the paragraph was off-topic or otherwise did not meet the requirements of the assignment. OR the work submitted was not well supported by the use of authoritative sources. 5 points Missing or Unacceptable 0 points Introductory paragraph was missing OR no work submitted for grading. 0 points Identified an appropriate technology and then surveyed the professional literature. Bibliography includes 5 or more appropriate sources obtained from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). The bibliography included entries for 3 or more sources which met some of the requirements for the assignment. OR the work submitted was not well supported by the use of authoritative sources. The bibliography was missing or did not meet the requirements of the assignment. 6 points 5 points 0 points Bibliography contains a reference list entry for each identified source. Attempted to use APA style but has multiple formatting errors. Sufficient information was provided to allow the reader to find and retrieve each of the sources. Needs Improvement 2 points Provided some reference information about sources for the bibliography, but demonstrates a fundamental failure to understand and apply the APA formatting standard as defined in the Publication Manual of the American Psychological Association (6th ed.). Needs Significant Improvement 1 point No bibliographic entries were provided OR the assignment was not submitted for grading. Missing or Unacceptable 0 points Provided an annotation of Provided a the source summary of an which addresse appropriate d at least one of source. The the information summary needs of explained how this executives (as source could be listed in the used to meet at detailed least two (2) of the assignment information needs description). OR, of executives as the annotation listed in the was not well detailed supported by assignment the use of description. authoritative sources. 2 points 1 point Provided an annotation of Provided a the source summary of an which addresse appropriate d at least one of source. The the information summary needs of explained how this executives (as source could be listed in the used to meet at detailed least two (2) of the assignment information needs description). OR, of executives as the annotation listed in the was not well detailed supported by assignment the use of description. authoritative sources. 2 points 1 point Annotation was missing or did not meet the requirements of the assignment. 0 points Annotation was missing or did not meet the requirements of the assignment. 0 points Provided an annotation of Provided a the source summary of an which addresse appropriate d at least one of source. The the information summary needs of explained how this executives (as source could be listed in the used to meet at detailed least two (2) of the assignment information needs description). OR, of executives as the annotation listed in the was not well detailed supported by assignment the use of description. authoritative sources. 2 points 1 point Provided an annotation of Provided a the source summary of an which addresse appropriate d at least one of source. The the information summary needs of explained how this executives (as source could be listed in the used to meet at detailed least two (2) of the assignment information needs description). OR, of executives as the annotation listed in the was not well detailed supported by assignment the use of description. authoritative sources. 2 points 1 point Annotation was missing or did not meet the requirements of the assignment. 0 points Annotation was missing or did not meet the requirements of the assignment. 0 points Provided an annotation of Provided a the source summary of an which addresse appropriate d at least one of source. The the information summary needs of explained how this executives (as source could be listed in the used to meet at detailed least two (2) of the assignment information needs description). OR, of executives as the annotation listed in the was not well detailed supported by assignment the use of description. authoritative sources. 2 points 1 point Provided an annotation of Provided a the source summary of an which addresse appropriate d at least one of source. The the information summary needs of explained how this executives (as source could be listed in the used to meet at detailed least two (2) of the assignment information needs description). OR, of executives as the annotation listed in the was not well detailed supported by assignment the use of description. authoritative sources. 2 points 1 point Annotation was missing or did not meet the requirements of the assignment. 0 points Annotation was missing or did not meet the requirements of the assignment. 0 points Provided an annotation of Provided a the source summary of an which addresse appropriate d at least one of source. The the information summary needs of explained how this executives (as source could be listed in the used to meet at detailed least two (2) of the assignment information needs description). OR, of executives as the annotation listed in the was not well detailed supported by assignment the use of description. authoritative sources. 2 points 1 point Provided an annotation of Provided a the source summary of an which addresse appropriate d at least one of source. The the information summary needs of explained how this executives (as source could be listed in the used to meet at detailed least two (2) of the assignment information needs description). OR, of executives as the annotation listed in the was not well detailed supported by assignment the use of description. authoritative sources. 2 points 1 point Annotation was missing or did not meet the requirements of the assignment. 0 points Annotation was missing or did not meet the requirements of the assignment. 0 points Provided an annotation of Provided a the source summary of an which addresse appropriate d at least one of source. The the information summary needs of explained how this executives (as source could be listed in the used to meet at detailed least two (2) of the assignment information needs description). OR, of executives as the annotation listed in the was not well detailed supported by assignment the use of description. authoritative sources. 2 points 1 point Provided an annotation of Provided a the source summary of an which addresse appropriate d at least one of source. The the information summary needs of explained how this executives (as source could be listed in the used to meet at detailed least two (2) of the assignment information needs description). OR, of executives as the annotation listed in the was not well detailed supported by assignment the use of description. authoritative sources. Annotation was missing or did not meet the requirements of the assignment. 0 points Annotation was missing or did not meet the requirements of the assignment. Needs Improvement 2 points Used standard cybersecurity terminology but this usage was not well integrated into the deliverable. 2 points Submitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement. 6 points Needs Significant Improvement 1 point Misused or incorrectly defined cybersecurity terminology. Missing or Unacceptable 0 points Did not integrate standard cybersecurity terminology into the deliverable. 1 point 0 points Submitted work meets minimum requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance. Submitted work is poorly organized and formatted. Writing and presentation are lacking in professional style and appearance. Work does not reflect college level writing skills. Or, no submission. 5 points 0 points Submitted work Submitted work is difficult to has numerous read / errors in understand and formatting, has significant spelling, grammar, errors in or punctuation. formatting, Work is spelling, unprofessional in grammar, appearance. punctuation, or word usage. Needs Improvement 65 or more Needs Significant Improvement 50 or more No work submitted. OR, Submitted work is poorly executed / does not reflect college level work. Missing or Unacceptable 0 or more
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: TECHNOLOGY RESEARCH ANNOTATION BIBLIOGRAPHY

Technology Research Annotation Bibliography
Name
Institution

1

TECHNOLOGY RESEARCH ANNOTATION BIBLIOGRAPHY

2

Technology Research Annotation Bibliography
Introduction
The cyber security threats of connected systems on computer networks have exposed
these devices to vulnerabilities that were non-existent in the past. Medical wearable devices have
unarguably contributed to the efficient provisions of interventions and protocols that are used to
address many of the health challenges faced by patients across the world. Therefore, the
increased rate of connectivity between these devices and other clinical systems that hold
important personally identifiable information presents a new paradigm in cyber security that
could have a tremendous impact on the healthcare and public health infrastructure of the United
States. The area of greatest importance regarding this issue is the need care and safety
implications of the exploitations of these devices by individuals and organizations with malicious
intents. Furthermore, the dependency of these wearable medical devices on other critical
infrastructures for communications, energy, and food and agriculture among others, as well as
the complexity of the integration with various software, hardware and applications make the
development of security initiative imperative for all stakeholders. Also, there is a need to identify
and understand how the emerging technology could leverage the connectivity platforms required
for its operation to expose and exploit the flaws in the computer systems and networks used by
the healthcare and public health infrastructures to provide these services. Finally, the acquisition
of such knowledge would contribute to determining the characteristics, design, and security
features of the technologies that would use to maintain patient safety and optimum level of care
for all stakeholders involved in the delivery of health services.

TECHNOLOGY RESEARCH ANNOTATION BIBLIOGRAPHY

3

Altawy, R., & Youssef, A. M. (2016). Security tradeoffs in cyber-physical systems: A case
study survey on implantable medical devices. IEEE Access, 4, 959-979. DOI:
10.1109/ACCESS.2016.2521727
Wearable medical devices belong to the group of physical systems and networks that
provide accessible services whenever they are required by patients. They are characterized by
limitless connectivity to medical information of their users so that they can provide these
services that are necessary for enhancing the quality of care received by patients. In their article,
Altawy & Youssef (2016) examined the security tradeoffs that could present challenges to the
users and the systems that support them. Also, they noted that significance of these security
compromises during emergency situations are one of the major reasons for classifying them as
threats to the sectors that comprise the healthcare infrastructure of the country or locations where
these devices are popular. The information contained in this article provides insights into the
risks associated with the exigencies of allowing unauthorized access to wearable medical devices
during incidents and the protocols that can be used to prevent a compromise of the entire
healthcare infrastructure. Also, they would be valuable in recommending appropriate measures
that can be ...


Anonymous
Really helped me to better understand my coursework. Super recommended.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags