Chat with us, powered by LiveChat Introduce yourself briefly. Then select an emerging technology trend such as cloud computing, industrial control systems (SCADA), internet of things, artif - Writeden.com

Introduce yourself briefly. Then select an emerging technology trend such as cloud computing, industrial control systems (SCADA), internet of things, artif

Introduce yourself briefly. Then select an emerging technology trend such as cloud computing, industrial control systems (SCADA), internet of things, artificial intelligence, big data, growth of remote workforce, and so on. Discuss how the technology is trending in the workforce and a potential security implication of the technology.

In response to your peers, comment on how a human-related error could cause a security implication within their stated emerging technologies.

To complete this assignment, review the Discussion Rubric.

RESPONSE ONE

Hello Everyone,

     My name is Clinton, and I am pursuing a degree in cybersecurity. I am 38 years old and have been in the manufacturing my entire professional career. I have chosen to transition into the cybersecurity field for a few reasons. One reason is my age and ability to keep working in a physically demanding career. Two would be my love for technology and computers. There is a lack of talent in the cybersecurity world and an ever-growing need to fill those positions. With high salaries and job security, This career perfectly fits my wants and needs. 

     My chosen up-and-coming technology is quantum computing. The advancement of computers and technology is amazing, and we keep advancing by leaps and bounds. Unfortunately, those leaps and bounds come at a cost. Quantum computer tech is still in its infancy, but the research is making big waves. The most significant draw for Quantum computers is their ability to process large amounts of data faster than a normal computer. We know that computers calculate their information in bits, representing each bit by either a 1 or a 0. This is the binary system that all computers use to compute. Since each bit can only represent one of two numbers, the computing capabilities are limited by how fast the processor can interpret the bits. Quantum computing works on the same premise but uses qubits. These qubits are capable of storing more than a single binary number. With the ability to hold both a 1 and a 0 simultaneously, the process grows exponentially the more qubits are transferred. This gives the computer a massive upgrade in computing power. 

     This technology is great for speeding up computational projects, but please remember the presented cost. This double-edged sword will present itself as the tech becomes cheaper to maintain and operate. Take encryption, for instance. We skimmed the surface of encryption in our reading this week. Normal computers would take years to crack a good 256-bit encryption, making attempting to crack encrypted messages and files costly and no longer worth the time. What happens when the computer's processing speeds can crack those encryptions in minutes? The battle between the red and blue teams often involved fighting each other with the same technology. As one side advances, so does the other. This brings the need to increase our efforts in all aspects of cybersecurity. If we hope to catch up to the threat actors, we must learn and utilize every tool in our tool belt. 

RESPONSE TWO

Hello everyone,

My name is Aharown Jackson, I am a Cybersecurity major, looking forward to interacting with you all.

My emerging technology that I will be discussing is Cloud Computing, or sometimes referred to as Software as a Service (SaaS).

Cloud computing has truly changed the game when it comes to how businesses today store and access software and, at times, their own data (Sabu, 2023). There are many reasons why this is true but for the sake of time I will be discussing two. The first reason is because of the flexibility in scalability. As a business grows it becomes extremely easy to scale up or scale down their computing needs via the cloud (Sabu, 2023). The second being the amount of data storage available and the availability of back ups. Their is a seemingly endless supply of data storage on the cloud computing sector and should an organization lose data for what ever reason, it gives a level of reassurance to that organization to have a third party be responsible for back ups (Sabu, 2023). 

Another reason why I see the trend of cloud computing being an emerging technology are the players in the game. We are talking about huge organizations competing here. Amazon, Google, Microsoft, IBM, Oracle (Sabu, 2023); I'm talking the big boys duking it out for market share. When such high profile companies like the ones mentioned are investing the incredible amounts of resources into these technologies, one has to pay attention.

The biggest security implication that comes to mind is the reliance on a third party to maintain the cybersecurity triad. Although these huge companies must have a sound and stout security apparatus. Their cloud computing departments, specifically data storage, now becomes a huge target. A treasure trove to the most sophisticated threat actors. We've seen many attacks by high level threat actors involve the years and years of passive attacks through surveillance before they strike. I wonder if someone isn't already watching…

Undergraduate Discussion Rubric

Overview

Your ac�ve par�cipa�on in the discussions is essen�al to your overall success this term. Discussion ques�ons will help you make meaningful connec�ons between the course content and

the larger concepts of the course. These discussions give you a chance to express your own thoughts, ask ques�ons, and gain insight from your peers and instructor.

Directions

For each discussion, you must create one ini�al post and follow up with at least two response posts.

For your ini�al post, do the following:

Write a post of 1 to 2 paragraphs.

In Module One, complete your ini�al post by Thursday at 11:59 p.m. Eastern.

In Modules Two through Eight, complete your ini�al post by Thursday at 11:59 p.m. of your local �me zone.

Consider content from other parts of the course where appropriate. Use proper cita�on methods for your discipline when referencing scholarly or popular sources.

For your response posts, do the following:

Reply to at least two classmates outside of your own ini�al post thread.

In Module One, complete your two response posts by Sunday at 11:59 p.m. Eastern.

In Modules Two through Eight, complete your two response posts by Sunday at 11:59 p.m. of your local �me zone.

Demonstrate more depth and thought than saying things like “I agree” or “You are wrong.” Guidance is provided for you in the discussion prompt.

Discussion Rubric

Criteria Exemplary Proficient Needs Improvement Not Evident Value

Comprehension Develops an ini�al post with an

organized, clear point of view

or idea using rich and

significant detail (100%)

Develops an ini�al post with a

point of view or idea using

adequate organiza�on and

detail (85%)

Develops an ini�al post with a

point of view or idea but with

some gaps in organiza�on and

detail (55%)

Does not develop an ini�al

post with an organized point of

view or idea (0%)

40

Timeliness N/A Submits ini�al post on �me

(100%)

Submits ini�al post one day

late (55%)

Submits ini�al post two or

more days late (0%)

10



10/30/24, 10:53 AM Undergraduate Discussion Rubric – CYB-250-15105-M01 Cyber Defense 2024 C-6 (Oct – Dec)

https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623160/View 1/2

Criteria Exemplary Proficient Needs Improvement Not Evident Value

Engagement Provides relevant and

meaningful response posts

with clarifying explana�on and

detail (100%)

Provides relevant response

posts with some explana�on

and detail (85%)

Provides somewhat relevant

response posts with some

explana�on and detail (55%)

Provides response posts that

are generic with li�le

explana�on or detail (0%)

30

Wri�ng (Mechanics) Writes posts that are easily

understood, clear, and concise

using proper cita�on methods

where applicable with no errors

in cita�ons (100%)

Writes posts that are easily

understood using proper

cita�on methods where

applicable with few errors in

cita�ons (85%)

Writes posts that are

understandable using proper

cita�on methods where

applicable with a number of

errors in cita�ons (55%)

Writes posts that others are

not able to understand and

does not use proper cita�on

methods where applicable (0%)

20

Total: 100%

10/30/24, 10:53 AM Undergraduate Discussion Rubric – CYB-250-15105-M01 Cyber Defense 2024 C-6 (Oct – Dec)

https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623160/View 2/2

Are you struggling with this assignment?

Our team of qualified writers will write an original paper for you. Good grades guaranteed! Complete paper delivered straight to your email.

Place Order Now