CSIA 459 Evaluating Emerging Technologies Full Course ORDER NOW
Open Source Intelligence Tech Research Project
Objective
The purpose of this Open Source Intelligence (OSINT) Project is to use publicly available sources of
information to investigate an emerging application of technology and then prepare a report suitable for
dissemination to interested parties in business and government (subscribers to a threat intelligence
reporting service).
Overview
Your task is to develop an OSINT report which provides information about the characteristics of an
emerging application of technology and the threats / attacks to which it may be vulnerable. The
consumers of this report have an interest in developing suitable countermeasures to prevent attacks by
a broad spectrum of attackers from hobbyists to quasi-professionals and criminal entities to well
organized, nation-state sponsored groups. When possible, your OSINT should explore the types and
identities of known attackers who are likely to target users and usages of the technology covered by
your report.
The basic question that must be answered in your OSINT report is: what are the cybersecurity
implications (good or bad) of a specific emerging application of technology?
For this assignment, your role is that of a threat intelligence research intern working for a threat
intelligence provider (private company). Your audience for this report will be subscribers to a
cybersecurity threat intelligence reporting service provided by your employer. These subscribers are
primarily senior managers and executives in businesses and government organizations.
The high-level visibility for your deliverable means that, in addition to easily accessed web sources and
social media, your research must also include research-based journal articles, papers published in
conference proceedings, and doctoral dissertations. Threat research and intelligence reports published
by mainstream companies, e.g. Verizon, Forrester, Deloitte, etc., should also be considered for use as
primary sources for your OSINT report. See step #3 under Conduct Your OSINT Research (below) for
additional information about how many sources are required and what types of sources are allowed.
The following information needs, previously identified by your company’s threat researchers, must be
met by the deliverable for this assignment.
(a) Identification and description (characteristics) of the technology,
(b) Potential or known uses of the technology to support or improve business operations of
companies and government agencies; this includes development of products which incorporate
the technology and potential or known uses of the technology to support or improve
cybersecurity, i.e.
CSIA 459: Evaluating Emerging Technologies
Copyright © 2022 by University of Maryland Global Campus. All rights reserved.
a. uses of the technology to reduce or manage risk
b. uses of the technology to increase resistance to threats/attacks
c. uses of the technology to decrease vulnerabilities in an existing technology application
(c) potential or known uses or exploitation of the technology by attackers, criminals, terrorists, etc.
to accomplish their goals.
Instructions
Format your deliverable as a research report. Your report should include the following sections:
1. Title page with author and date
2. Table of Contents (also Table of Figures if graphics are used)
3. Executive Summary
4. Introduction
5. Technology Description and Usage Analysis
6. Threat Analysis
7. Summary and Conclusions
8. Reference List
Choose an Emerging Application of Technology
To begin, choose an emerging application of technology. Applications of technology that are currently in
the emerging stages include:
5G/6G Telecommunications Technologies & Implementations (Networks)
Artificial Intelligence
Autonomous Vehicles (ground, sea, or air)
Blockchain Technology
Data Science
Deep Space Communication Networks
Graphene
Implantable Medical Devices (including brain, prosthetics, medication delivery, cardiac
support, etc.)
Infrastructure for Smart Cities (surveillance, monitoring, traffic control, utilities, etc.)
Internet of Things (especially Operational Technology)
Internet of Things Devices in Smart Homes / Smart Buildings
Machine Learning
Nano machines
Neuromorphic computer chips
Physical Unclonable Functions (PUFs) (devices & electrical circuits)
Precision Agriculture (integrated systems using satellite imagery, GPS, Sensors, Robots)
Robot inspectors for physical infrastructures (buildings, roads, railways, pipelines, etc.)
CSIA 459: Evaluating Emerging Technologies
Copyright © 2022 by University of Maryland Global Campus. All rights reserved.
Wearable Sensors for Hazardous Materials Detection (e.g. CBRNE): Emergency Services
Sector
You are encouraged to look for and investigate additional appropriate technologies before deciding
upon your technology choice for this assignment.
If you decide to research a technology that is not on the suggested technologies list (see above) or
included in the course readings, you must first request and receive your instructor’s permission. Your
instructor may require that you do preliminary library searches for research papers and technical papers
to prove that you can find a sufficient number of resources to complete the assignment.
Conduct Your OSINT Research & Information Acquisition
Step 1. Review this UMGC library guide to help you evaluate sources for your OSINT Research:
https://libguides.umgc.edu/credibility
Step 2. Brainstorm keywords that you can use to help find Internet sources of information about your
chosen technology. You can also search for and review articles and postings in well known cybersecurity
industry blogs, news articles, and social media accounts. See https://agio.com/newsroom/the-top-10-
cybersecurity-blogs-for-2021/ and https://libguides.umgc.edu/cybersecurity for lists of resources. You
must find and use at least five different sources in this category (Internet sources).
Step 3. Use your initial set of sources to develop additional keyword lists to use in searching the UMGC
library databases for professional journal articles, papers, and other scholarly publications (“sources’)
which discuss your chosen emerging application of technology. You must find and report on five (5) or
more Open Sources which you obtained from Internet web pages, social media, etc. You must also find
and report on an additional five or more Open Sources which you obtained from databases which index
professional and academic papers (see https://libguides.umgc.edu/scholarly if you are not sure what
this means). The following UMGC library and/or freely available Internet databases are known to have
suitable professional and/or research-based articles which meet the “databases” as source requirement:
ACM Digital Library https://dl-acm-org.ezproxy.umgc.edu/
Dissertations & Theses (Pro Quest) https://www-proquest-
com.ezproxy.umgc.edu/pqdtglobal/advanced?accountid=14580
IEEE Computer Society Digital Library https://www-computer-org.ezproxy.umgc.edu/csdl/home
Research Gate https://www.researchgate.net/ (required free account to access papers)
ARVIX https://arxiv.org/
Science Direct https://www-sciencedirect-com.ezproxy.umgc.edu/search
Since the point of this OSINT search is to find information about emerging applications of technology,
your sources must have a publication date of 2018 or later (2018, 2019, 2020, 2021, 2022, 2023). For
papers indexed in Science Direct, you may also use papers that are marked “In Press.”
CSIA 459: Evaluating Emerging Technologies
Copyright © 2022 by University of Maryland Global Campus. All rights reserved.
When you have finished your research for this assignment, you should have 15 or more well chosen,
high quality, authoritative resources which you will use to meet the content requirements of this
project. At least 5 of those resources must be from the professional literature, i.e. peer-reviewed
journal articles, government or corporate documents or reports, trade publications, etc. See
https://libguides.umgc.edu/credibility and https://libguides.umgc.edu/scholarly for additional
information about evaluating sources.
5. Decide if you need to add images or not (including pictures, charts, graphics, etc.). If you do include
images, you must make sure that each such item has a caption and that the caption includes the in-text
citation for the source of the image (add the source to your list of references). The image must be
readable (in focus, not blurry) and of an appropriate size. Any image or picture used MUST significantly
add to the content and help the reader to understand your analysis. Do not add gratuitous imagery (no
“eye candy” or decorative images). Do not add images just to increase your page count!
Note: if you have captioned items, you must include a Table of Figures after your Table of Contents.
Putting It All Together
1. Consult the grading rubric for specific content and formatting requirements for this assignment.
2. Your 8 to 12 page OSINT report should be professional in appearance with consistent use of
fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper.
Title page, table of contents, and reference list do not count against the page count. Remember
that your audience will benefit more from a clear, concise, and accurate presentation of
information. Adding extra content just to artificially meet a page count (or exceeding the
recommended length by adding filler) will not improve your grade.
3. Your paper should use standard terms and definitions for cybersecurity.
4. The CSIA program recommends that you follow standard APA formatting since this will give you
a document that meets the “professional appearance” requirements. APA formatting guidelines
and examples are found under Course Resources. An APA template file (MS Word format) has
also been provided for your use. CSIA_Paper_Template(TOC+TOF,2021).docx. This file has the
style gallery set up so that you can use the built-in features of MS Word to generate a Table of
Contents and, if needed, a Table of Figures.
5. Your submitted file must include a separate cover page at the beginning which provides the
assignment title, your name, and the due date. Your reference list must begin with a new
(separate) page at the end of your file.
6. You are expected to write grammatically correct English in every assignment that you submit for
grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c)
CSIA 459: Evaluating Emerging Technologies
Copyright © 2022 by University of Maryland Global Campus. All rights reserved.
verifying that your punctuation is correct and (d) reviewing your work for correct word usage
and correctly structured sentences and paragraphs.
7. You are expected to credit your sources using in-text citations and reference list entries. Both
your citations and your reference list entries must follow a consistent citation style (APA, MLA,
etc.).
8. See the “Examples” section (below) for information about how to create a Table of Contents and
Table of Figures. The built-in help for MS Word will also walk you through creating these content
elements for your OSINT report.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.