Description
For this paper, you will construct a recommendation to study and evaluate a Smart Grid. To support your recommendation you will use information from your Technology Review #2 ( SEE ATTACHED FILE). By the time you are finished with your recommendation, you will have performed all four stages of the technology scan.
GETTING STARTED
Rewrite the paper to serve as a background paper for a decision briefing for senior executives. These executives will be meeting to decide which emerging technologies or emerging applications of technologies will become part of one or more security-focused Internal Research & Development projects during the next budget cycle.
Write down your thoughts and ideas about the security implications of this technology using (a) the Five Pillars of Information Assurance and/or (b) the Five Pillars of Information Security. For your paper, you do not need to include all ten “pillars” but you should address a minimum of three. If you are targeting an “A” on your paper, address at least five of the pillars.
Throughout your recommendation (see below), you must keep your focus upon the security posture of this technology and its applications (e.g. products or services built upon this technology or which incorporate this technology).
Note: If you had deficiencies in your survey of the professional literature for your chosen technology, you should correct that problem now. You may also add sources and, if necessary, remove inappropriate sources from your survey. Refer back to the original Detailed Project Description for your selected paper (SEE ATTACHED FILE).
RECOMMENDATIONS FOR STUDY
This assignment builds upon the technology scan which you performed for your three technology review papers and incorporates the final stage: recommending. Your focus in this paper must be upon identifying and presenting information from authoritative sources which supports a recommendation to select this technology for further study as part of an Internal Research & Development project (IR&D). Your recommendation should be based upon the following (at a minimum):
- characteristics (features and capabilities) of the technology
- interactions among the selected technology, people, environments, and processes (how will it be used; use cases if known)
- risks or vulnerabilities associated with adoption of this technology
- costs and benefits associated with adoption of this technology
Addressing Costs and Benefits: Do not tell the reader how much the technology will cost. Discuss instead how much it might cost to SECURE this technology against cyber-attacks and/or how difficult it will be to deny criminals and terrorists the use of this technology.
WRITING YOUR PAPER
Your paper must provide the reader with an overview of the technology followed by information about the potential security risks and/or benefits of its use (the security posture ).You MUST use information paraphrased from the papers found during your Survey of the Professional Literature (with appropriate in-text citations).
Revise the original paper then add the recommendation section.
Your Technology Selection Paper should be at least three pages in length but no more than five pages (excluding the title page and references page). This means that you may need to shorten your original paper (cut out material) so that you can incorporate the additional information required for this assignment.
GRADING
APA Format
Grading Rubric: Consult the grading rubric for specific content and formatting requirements for this assignment
Provided an excellent overview of an emerging technology or emerging application of technology. The overview appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. (Authoritative sources were cited). | Provided an introduction that contained an outstanding overview of an emerging technology or emerging application of technology. The overview appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. (Authoritative sources were cited.) | Provided an introduction that contained an overview of an emerging technology or emerging application of technology. The overview provided some details about how the technology is used. The overview drew some information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers or from authoritative Web sites. (Authoritative sources were cited.) | Identified an appropriate technology. Provided an overview or introduction that was lacking in detail. Information from the survey of the professional literature was used in the overview (authoritative sources were cited). | Identified an appropriate technology but the overview of that technology lacked detail and/or was not well supported by information drawn from the survey of the professional literature or other authoritative sources. | The introduction and/or overview sections of the paper were off topic or failed to provide an overview of the emerging application of technology. | |
Identified 10 or more papers from the professional literature. All papers used in the survey were from the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used 10 or more papers from the survey of the literature throughout the discussion (as demonstrated by correctly formatted and placed citations). | Survey of the literature was based upon eight papers from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used at least 8 papers from the survey of the literature throughout the discussion of the technology (as demonstrated by correctly formatted and placed citations). | Survey of the literature was based upon six or seven papers from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used at least 6 papers from the survey of the literature throughout the discussion of the technology (as demonstrated by correctly formatted and placed citations). | Survey of the literature was based upon four or five papers from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used at least 4 papers from the survey of the literature throughout the discussion of the technology (as demonstrated by correctly formatted and placed citations). | Survey of the literature was based upon three or more papers from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used at least 3 papers from the survey of the literature throughout the discussion of the technology (as demonstrated by paraphrasing and including correctly formatted and placed citations). | Survey of the literature was based upon two or fewer papers from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). OR, did not appropriately use information from authoritative sources. | |
Provided an excellent discussion of the cybersecurity issues that need investigating using the characteristics of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. | Provided an outstanding discussion of the cybersecurity issues that need investigating using the characteristics of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. | Provided a discussion of the cybersecurity issues that need investigating using three or more characteristics of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. | Discussion provided few details as to the cybersecurity issues that need investigating. Discussion included two or more characteristics of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. | Discussed cybersecurity issues and technology characteristics which need investigating in the context of the emerging technology but the discussion lacked detail and/or was not well supported by information drawn from the survey of the professional literature. | The discussion of cybersecurity issues and/or technology characteristics was based upon personal opinion (no citations for sources from survey of the professional literature) OR this content element was missing. | |
Provided an excellent discussion of the cybersecurity issues that need investigating using the interactions between the technology and people / environments / processes associated with the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. | Provided an outstanding discussion of the cybersecurity issues that need investigating using the interactions between the technology and people / environments / processes associated with the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. | Provided a discussion of the cybersecurity issues that need investigating using the interactions between the technology and people / environments / processes associated with the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. | Discussion provided few details as to the cybersecurity issues that need investigating. Discussion included two or more interactions between the emerging technology or emerging application of technology and people / environment / processes. The discussion appropriately used information from authoritative sources. | Discussed cybersecurity issues and technology interactions which need investigating in the context of the emerging technology but the discussion lacked detail or was not well supported by information drawn from authoritative sources. | The discussion of cybersecurity issues related to technology interactions was based upon personal opinion (no citations for sources from survey of the professional literature) OR this content element was missing. | |
Provided an excellent discussion of the cybersecurity related costs and benefits associated with the adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. | Provided an outstanding discussion of the cybersecurity related costs and benefits associated with the adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. | Provided a discussion of the cybersecurity related costs and benefits associated with the adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. | Discussion provided few details as to the cybersecurity related costs and benefits associated with adoption of the technology and/or did not mention cybersecurity issues that drive costs or benefits. Discussion included two or more interactions between the emerging technology or emerging application of technology and people / environment / processes. The discussion appropriately used information from authoritative sources. | Discussed cost and benefits associated with adoption of the emerging technology or emerging application of technology but the discussion lacked detail, did not address cybersecurity issues, or was not well supported by information drawn from authoritative sources. | The discussion of costs and benefits related to technology adoption was based upon personal opinion (no citations for sources from survey of the professional literature) OR this content element was missing. | |
Provided an excellent discussion of the cybersecurity related risks and/or vulnerabilities associated with the adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. | Provided an outstanding discussion of the cybersecurity related risks and/or vulnerabilities associated with the adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. | Provided a discussion of the cybersecurity related costs and risks or vulnerabilities (only one required) associated with the adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. | Discussion addressed the cybersecurity related risks or vulnerabilities but provided few details. Discussion included two or more risks or vulnerabilities related to adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from authoritative sources. | Discussed risks or vulnerabilities associated with adoption of the emerging technology or emerging application of technology but the discussion lacked detail, did not adequately address cybersecurity issues, or was not well supported by information drawn from authoritative sources. | The discussion of risks or vulnerabilities related to technology adoption was based upon personal opinion (no citations for sources from survey of the professional literature) OR this content element was missing. | |
Provided an excellent summary recommendation which was well supported by the body of the paper and included: (a) an explicit statement regarding recommendation that this technology be selected by the panel for formal evaluation, (b) justification expressed in terms of return on investment for monies spent during the evaluation, (c) identification of a specific recommended type of formal evaluation study. | Provided an outstanding summary recommendation which was well supported by the body of the paper and included: (a) an explicit statement regarding recommendation that this technology be selected by the panel for formal evaluation, (b) justification expressed in terms of return on investment for monies spent during the evaluation, (c) identification of a specific recommended type of formal evaluation study. | Provided a summary recommendation which was supported by the body of the paper and included the following: (a) recommendation that this technology be selected by the panel for formal evaluation, (b) justification for spending money on an evaluation, (c) identification of a recommended type of formal evaluation study. | Provided a summary recommendation which was supported by the body of the paper and included mention of the following: (a) recommendation that this technology be selected by the panel for formal evaluation, (b) justification for spending money on an evaluation, (c) recommendation for a formal evaluation study. | Provided a summary recommendation which was not supported by the body of the paper or which failed to include mention as to selection of the technology for an evaluation study. OR, the summary was not well supported by information drawn from authoritative sources. | The summary recommendation was missing or was not supported by the body of the paper. | |
Demonstrated excellence in the use of standard cybersecurity terminology to support discussion of the technology. Appropriately used terminology from five or more pillars of IA/IS. | Discussion showed an outstanding understanding and integration of standard cybersecurity terminology to support discussion of the technology. Appropriately used terminology from five or more pillars of IA/IS. | Correctly used standard cybersecurity terminology to support discussion of the technology. Appropriately used terminology from five or more pillars of IA/IS. | Correctly used standard cybersecurity terminology to support discussion of the technology. Appropriately used terminology from three or more pillars of IA/IS. | Used some standard cybersecurity terminology to support discussion of the technology. OR, use of terminology was not well supported by authoritative sources. | Did not integrate standard cybersecurity terminology into the discussion OR misused or incorrectly defined standard terms from the pillars of IA/IS. | |
Work contains a reference list containing entries for all cited resources. Reference list entries and in-text citations are correctly formatted using the appropriate APA style for each type of resource. | Work contains a reference list containing entries for all cited resources. One or two minor errors in APA format for in-text citations and/or reference list entries. | Work contains a reference list containing entries for all cited resources. No more than 3 minor errors in APA format for in-text citations and/or reference list entries | Work has no more than three paragraphs with omissions of citations crediting sources for facts and information. Work contains a reference list containing entries for cited resources. Work contains no more than 5 minor errors in APA format for in-text citations and/or reference list entries. | Work attempts to credit sources but demonstrates a fundamental failure to understand and apply the APA formatting standard as defined in the Publication Manual of the American Psychological Association (6thed.). | Reference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper. | |
Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type. | Submitted work has minor style or formatting flaws but still presents a professional appearance. Submitted work is well organized and appropriately uses color, fonts, and section headings (per the assignment’s directions). | Organization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved. | Submitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement. | Submitted work meets minimum requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance. | No work submitted. | |
No formatting, grammar, spelling, or punctuation errors. | Work contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance. | Errors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work. | Submitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance. | Submitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage. | No work submitted. | |
Overall Score |
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Attached.
Running head: RECOMMENDATIONS TO STUDY AND EVALUATE A SMART GRID 1
Recommendations to Study and Evaluate a Smart Grid
Names:
Institution:
RECOMMENDATIONS TO STUDY AND EVALUATE A SMART GRID
2
Recommendations to study and evaluate a Smart Grid
Overview
The smart grid technology offers an automated platform to not only provide but also
monitor the delivery of power to the various sectors. This is a technology that has seen
widespread usage in developed countries and more so in the US and European regions, and
that could provide a solution to other regions globally. However, since the smart grid works
within the existing electric lines and utilizes the various technological equipment, it may
present a challenge in the manner regarding security. The smart grid presents both benefits
and challenges to the respective individuals. The primary advantage of the smart grid
technology focuses on the manner in which the monitoring and delivery of the product
happen. In the past, the energy sector relied on manual systems to deliver and monitor
electricity which brought about numerous drawbacks. In the attempt to develop a
recommendation on studying and evaluating the smart grid technology, this paper focuses on
the exploration of characteristics of the technology, interaction among smart grid technology,
people and environment, risks and vulnerabilities of the technology, and the costs and benefits
associated with the same
Cybersecurity issues based on characteristics of smart grid technology
The incorporation of the latest information technologies in the power distribution and
monitoring today offers a good platform for the delivery of the respective services to the
esteemed customers. In their research, Wang and Lu (2013) claim that the technology used in
the smart grid may offer numerous advantages of the respective areas of application which
include both reliability as well as efficiency. However, since technology ...