For this paper, you will construct a recommendation to study and evaluate a Smart Grid. To support your recommendation you will use information from your Technology Review #2 ( SEE ATTACHED FILE). By the time you are finished with your recommendation, you will have performed all four stages of the technology scan. GETTING STARTED Rewrite the paper to serve as a background paper for a decision briefing for senior executives. These executives will be meeting to decide which emerging technologies or emerging applications of technologies will become part of one or more security-focused Internal Research & Development projects during the next budget cycle. Write down your thoughts and ideas about the security implications of this technology using (a) the Five Pillars of Information Assurance and/or (b) the Five Pillars of Information Security. For your paper, you do not need to include all ten “pillars” but you should address a minimum of three. If you are targeting an “A” on your paper, address at least five of the pillars. Throughout your recommendation (see below), you must keep your focus upon the security posture of this technology and its applications (e.g. products or services built upon this technology or which incorporate this technology). Note: If you had deficiencies in your survey of the professional literature for your chosen technology, you should correct that problem now. You may also add sources and, if necessary, remove inappropriate sources from your survey. Refer back to the original Detailed Project Description for your selected paper (SEE ATTACHED FILE). RECOMMENDATIONS FOR STUDY This assignment builds upon the technology scan which you performed for your three technology review papers and incorporates the final stage: recommending. Your focus in this paper must be upon identifying and presenting information from authoritative sources which supports a recommendation to select this technology for further study as part of an Internal Research & Development project (IR&D). Your recommendation should be based upon the following (at a minimum): characteristics (features and capabilities) of the technology interactions among the selected technology, people, environments, and processes (how will it be used; use cases if known) risks or vulnerabilities associated with adoption of this technology costs and benefits associated with adoption of this technology Addressing Costs and Benefits: Do not tell the reader how much the technology will cost. Discuss instead how much it might cost to SECURE this technology against cyber-attacks and/or how difficult it will be to deny criminals and terrorists the use of this technology. WRITING YOUR PAPER Your paper must provide the reader with an overview of the technology followed by information about the potential security risks and/or benefits of its use (the security posture ).You MUST use information paraphrased from the papers found during your Survey of the Professional Literature (with appropriate in-text citations). Revise the original paper then add the recommendation section. Your Technology Selection Paper should be at least three pages in length but no more than five pages (excluding the title page and references page). This means that you may need to shorten your original paper (cut out material) so that you can incorporate the additional information required for this assignment. GRADING APA FormatGrading Rubric: Consult the grading rubric for specific content and formatting requirements for this assignment Identified an appropriate technology and provided an overview of the technology10 pointsProvided an excellent overview of an emerging technology or emerging application of technology. The overview appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. (Authoritative sources were cited).8 pointsProvided an introduction that contained an outstanding overview of an emerging technology or emerging application of technology. The overview appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. (Authoritative sources were cited.)7 pointsProvided an introduction that contained an overview of an emerging technology or emerging application of technology. The overview provided some details about how the technology is used. The overview drew some information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers or from authoritative Web sites. (Authoritative sources were cited.)6 pointsIdentified an appropriate technology. Provided an overview or introduction that was lacking in detail. Information from the survey of the professional literature was used in the overview (authoritative sources were cited).4 pointsIdentified an appropriate technology but the overview of that technology lacked detail and/or was not well supported by information drawn from the survey of the professional literature or other authoritative sources. 0 pointsThe introduction and/or overview sections of the paper were off topic or failed to provide an overview of the emerging application of technology.Surveyed Professional Literature (10 or more papers identified and cited)10 pointsIdentified 10 or more papers from the professional literature. All papers used in the survey were from the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used 10 or more papers from the survey of the literature throughout the discussion (as demonstrated by correctly formatted and placed citations).8 pointsSurvey of the literature was based upon eight papers from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used at least 8 papers from the survey of the literature throughout the discussion of the technology (as demonstrated by correctly formatted and placed citations).7 pointsSurvey of the literature was based upon six or seven papers from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used at least 6 papers from the survey of the literature throughout the discussion of the technology (as demonstrated by correctly formatted and placed citations).6 pointsSurvey of the literature was based upon four or five papers from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used at least 4 papers from the survey of the literature throughout the discussion of the technology (as demonstrated by correctly formatted and placed citations).4 pointsSurvey of the literature was based upon three or more papers from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used at least 3 papers from the survey of the literature throughout the discussion of the technology (as demonstrated by paraphrasing and including correctly formatted and placed citations).0 pointsSurvey of the literature was based upon two or fewer papers from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). OR, did not appropriately use information from authoritative sources.Summarized cybersecurity issues that need investigation using the characteristics (features and capabilities) of the technology10 pointsProvided an excellent discussion of the cybersecurity issues that need investigating using the characteristics of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.8 pointsProvided an outstanding discussion of the cybersecurity issues that need investigating using the characteristics of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.7 pointsProvided a discussion of the cybersecurity issues that need investigating using three or more characteristics of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.6 pointsDiscussion provided few details as to the cybersecurity issues that need investigating. Discussion included two or more characteristics of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.4 pointsDiscussed cybersecurity issues and technology characteristics which need investigating in the context of the emerging technology but the discussion lacked detail and/or was not well supported by information drawn from the survey of the professional literature.0 pointsThe discussion of cybersecurity issues and/or technology characteristics was based upon personal opinion (no citations for sources from survey of the professional literature) OR this content element was missing.Summarized cybersecurity issues that need investigation using the technology interactions with people / environments / processes associated with the emerging technology or emerging application of technology10 pointsProvided an excellent discussion of the cybersecurity issues that need investigating using the interactions between the technology and people / environments / processes associated with the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. 8 pointsProvided an outstanding discussion of the cybersecurity issues that need investigating using the interactions between the technology and people / environments / processes associated with the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.7 pointsProvided a discussion of the cybersecurity issues that need investigating using the interactions between the technology and people / environments / processes associated with the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.6 pointsDiscussion provided few details as to the cybersecurity issues that need investigating. Discussion included two or more interactions between the emerging technology or emerging application of technology and people / environment / processes. The discussion appropriately used information from authoritative sources.4 pointsDiscussed cybersecurity issues and technology interactions which need investigating in the context of the emerging technology but the discussion lacked detail or was not well supported by information drawn from authoritative sources.0 pointsThe discussion of cybersecurity issues related to technology interactions was based upon personal opinion (no citations for sources from survey of the professional literature) OR this content element was missing.Summarized cybersecurity related costs and benefits associated with the adoption of the emerging technology or emerging application of technology10 pointsProvided an excellent discussion of the cybersecurity related costs and benefits associated with the adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. 8 pointsProvided an outstanding discussion of the cybersecurity related costs and benefits associated with the adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.7 pointsProvided a discussion of the cybersecurity related costs and benefits associated with the adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.6 pointsDiscussion provided few details as to the cybersecurity related costs and benefits associated with adoption of the technology and/or did not mention cybersecurity issues that drive costs or benefits. Discussion included two or more interactions between the emerging technology or emerging application of technology and people / environment / processes. The discussion appropriately used information from authoritative sources.4 pointsDiscussed cost and benefits associated with adoption of the emerging technology or emerging application of technology but the discussion lacked detail, did not address cybersecurity issues, or was not well supported by information drawn from authoritative sources.0 pointsThe discussion of costs and benefits related to technology adoption was based upon personal opinion (no citations for sources from survey of the professional literature) OR this content element was missing.Summarized cybersecurity related risks and/or vulnerabilities associated with the adoption of the emerging technology or emerging application of technology10 pointsProvided an excellent discussion of the cybersecurity related risks and/or vulnerabilities associated with the adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. 8 pointsProvided an outstanding discussion of the cybersecurity related risks and/or vulnerabilities associated with the adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.7 pointsProvided a discussion of the cybersecurity related costs and risks or vulnerabilities (only one required) associated with the adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.6 pointsDiscussion addressed the cybersecurity related risks or vulnerabilities but provided few details. Discussion included two or more risks or vulnerabilities related to adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from authoritative sources.4 pointsDiscussed risks or vulnerabilities associated with adoption of the emerging technology or emerging application of technology but the discussion lacked detail, did not adequately address cybersecurity issues, or was not well supported by information drawn from authoritative sources.0 pointsThe discussion of risks or vulnerabilities related to technology adoption was based upon personal opinion (no citations for sources from survey of the professional literature) OR this content element was missing.Provided a summary recommendation which provides a justification for spending money on EVALUTING the selected emerging technology or emerging application of technology using a pilot implementation or other formal evaluation study10 pointsProvided an excellent summary recommendation which was well supported by the body of the paper and included: (a) an explicit statement regarding recommendation that this technology be selected by the panel for formal evaluation, (b) justification expressed in terms of return on investment for monies spent during the evaluation, (c) identification of a specific recommended type of formal evaluation study.8 pointsProvided an outstanding summary recommendation which was well supported by the body of the paper and included: (a) an explicit statement regarding recommendation that this technology be selected by the panel for formal evaluation, (b) justification expressed in terms of return on investment for monies spent during the evaluation, (c) identification of a specific recommended type of formal evaluation study.7 pointsProvided a summary recommendation which was supported by the body of the paper and included the following: (a) recommendation that this technology be selected by the panel for formal evaluation, (b) justification for spending money on an evaluation, (c) identification of a recommended type of formal evaluation study.6 pointsProvided a summary recommendation which was supported by the body of the paper and included mention of the following: (a) recommendation that this technology be selected by the panel for formal evaluation, (b) justification for spending money on an evaluation, (c) recommendation for a formal evaluation study.4 pointsProvided a summary recommendation which was not supported by the body of the paper or which failed to include mention as to selection of the technology for an evaluation study. OR, the summary was not well supported by information drawn from authoritative sources.0 pointsThe summary recommendation was missing or was not supported by the body of the paper.Addressed security issues using standard terms (e.g.5 Pillars IA, 5 Pillars Information Security)10 pointsDemonstrated excellence in the use of standard cybersecurity terminology to support discussion of the technology. Appropriately used terminology from five or more pillars of IA/IS.8 pointsDiscussion showed an outstanding understanding and integration of standard cybersecurity terminology to support discussion of the technology. Appropriately used terminology from five or more pillars of IA/IS.7 pointsCorrectly used standard cybersecurity terminology to support discussion of the technology. Appropriately used terminology from five or more pillars of IA/IS.6 pointsCorrectly used standard cybersecurity terminology to support discussion of the technology. Appropriately used terminology from three or more pillars of IA/IS.4 pointsUsed some standard cybersecurity terminology to support discussion of the technology. OR, use of terminology was not well supported by authoritative sources.0 pointsDid not integrate standard cybersecurity terminology into the discussion OR misused or incorrectly defined standard terms from the pillars of IA/IS.Professionalism Part I: APA Formatting for Citations and Reference List5 pointsWork contains a reference list containing entries for all cited resources. Reference list entries and in-text citations are correctly formatted using the appropriate APA style for each type of resource. 4 pointsWork contains a reference list containing entries for all cited resources. One or two minor errors in APA format for in-text citations and/or reference list entries. 3 pointsWork contains a reference list containing entries for all cited resources. No more than 3 minor errors in APA format for in-text citations and/or reference list entries2 pointsWork has no more than three paragraphs with omissions of citations crediting sources for facts and information. Work contains a reference list containing entries for cited resources. Work contains no more than 5 minor errors in APA format for in-text citations and/or reference list entries. 1 pointWork attempts to credit sources but demonstrates a fundamental failure to understand and apply the APA formatting standard as defined in the Publication Manual of the American Psychological Association (6thed.). 0 pointsReference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper.Professionalism Part II: Organization & Appearance5 pointsSubmitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.4 pointsSubmitted work has minor style or formatting flaws but still presents a professional appearance. Submitted work is well organized and appropriately uses color, fonts, and section headings (per the assignment’s directions).3 pointsOrganization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved.2 pointsSubmitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement.1 pointSubmitted work meets minimum requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance.0 pointsNo work submitted.Professionalism Part III: Execution10 pointsNo formatting, grammar, spelling, or punctuation errors. 8 pointsWork contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance.7 pointsErrors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work.6 pointsSubmitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance.4 pointsSubmitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage. 0 pointsNo work submitted.Overall ScoreExcellent90 or moreOutstanding80 or more