Introduce yourself briefly. Then select an emerging technology trend such as cloud computing, industrial control systems (SCADA), internet of things, artif
Introduce yourself briefly. Then select an emerging technology trend such as cloud computing, industrial control systems (SCADA), internet of things, artificial intelligence, big data, growth of remote workforce, and so on. Discuss how the technology is trending in the workforce and a potential security implication of the technology.
In response to your peers, comment on how a human-related error could cause a security implication within their stated emerging technologies.
To complete this assignment, review the Discussion Rubric.
RESPONSE ONE
Hello Everyone,
My name is Clinton, and I am pursuing a degree in cybersecurity. I am 38 years old and have been in the manufacturing my entire professional career. I have chosen to transition into the cybersecurity field for a few reasons. One reason is my age and ability to keep working in a physically demanding career. Two would be my love for technology and computers. There is a lack of talent in the cybersecurity world and an ever-growing need to fill those positions. With high salaries and job security, This career perfectly fits my wants and needs.
My chosen up-and-coming technology is quantum computing. The advancement of computers and technology is amazing, and we keep advancing by leaps and bounds. Unfortunately, those leaps and bounds come at a cost. Quantum computer tech is still in its infancy, but the research is making big waves. The most significant draw for Quantum computers is their ability to process large amounts of data faster than a normal computer. We know that computers calculate their information in bits, representing each bit by either a 1 or a 0. This is the binary system that all computers use to compute. Since each bit can only represent one of two numbers, the computing capabilities are limited by how fast the processor can interpret the bits. Quantum computing works on the same premise but uses qubits. These qubits are capable of storing more than a single binary number. With the ability to hold both a 1 and a 0 simultaneously, the process grows exponentially the more qubits are transferred. This gives the computer a massive upgrade in computing power.
This technology is great for speeding up computational projects, but please remember the presented cost. This double-edged sword will present itself as the tech becomes cheaper to maintain and operate. Take encryption, for instance. We skimmed the surface of encryption in our reading this week. Normal computers would take years to crack a good 256-bit encryption, making attempting to crack encrypted messages and files costly and no longer worth the time. What happens when the computer's processing speeds can crack those encryptions in minutes? The battle between the red and blue teams often involved fighting each other with the same technology. As one side advances, so does the other. This brings the need to increase our efforts in all aspects of cybersecurity. If we hope to catch up to the threat actors, we must learn and utilize every tool in our tool belt.
RESPONSE TWO
Hello everyone,
My name is Aharown Jackson, I am a Cybersecurity major, looking forward to interacting with you all.
My emerging technology that I will be discussing is Cloud Computing, or sometimes referred to as Software as a Service (SaaS).
Cloud computing has truly changed the game when it comes to how businesses today store and access software and, at times, their own data (Sabu, 2023). There are many reasons why this is true but for the sake of time I will be discussing two. The first reason is because of the flexibility in scalability. As a business grows it becomes extremely easy to scale up or scale down their computing needs via the cloud (Sabu, 2023). The second being the amount of data storage available and the availability of back ups. Their is a seemingly endless supply of data storage on the cloud computing sector and should an organization lose data for what ever reason, it gives a level of reassurance to that organization to have a third party be responsible for back ups (Sabu, 2023).
Another reason why I see the trend of cloud computing being an emerging technology are the players in the game. We are talking about huge organizations competing here. Amazon, Google, Microsoft, IBM, Oracle (Sabu, 2023); I'm talking the big boys duking it out for market share. When such high profile companies like the ones mentioned are investing the incredible amounts of resources into these technologies, one has to pay attention.
The biggest security implication that comes to mind is the reliance on a third party to maintain the cybersecurity triad. Although these huge companies must have a sound and stout security apparatus. Their cloud computing departments, specifically data storage, now becomes a huge target. A treasure trove to the most sophisticated threat actors. We've seen many attacks by high level threat actors involve the years and years of passive attacks through surveillance before they strike. I wonder if someone isn't already watching…
Undergraduate Discussion Rubric
Overview
Your ac�ve par�cipa�on in the discussions is essen�al to your overall success this term. Discussion ques�ons will help you make meaningful connec�ons between the course content and
the larger concepts of the course. These discussions give you a chance to express your own thoughts, ask ques�ons, and gain insight from your peers and instructor.
Directions
For each discussion, you must create one ini�al post and follow up with at least two response posts.
For your ini�al post, do the following:
Write a post of 1 to 2 paragraphs.
In Module One, complete your ini�al post by Thursday at 11:59 p.m. Eastern.
In Modules Two through Eight, complete your ini�al post by Thursday at 11:59 p.m. of your local �me zone.
Consider content from other parts of the course where appropriate. Use proper cita�on methods for your discipline when referencing scholarly or popular sources.
For your response posts, do the following:
Reply to at least two classmates outside of your own ini�al post thread.
In Module One, complete your two response posts by Sunday at 11:59 p.m. Eastern.
In Modules Two through Eight, complete your two response posts by Sunday at 11:59 p.m. of your local �me zone.
Demonstrate more depth and thought than saying things like “I agree” or “You are wrong.” Guidance is provided for you in the discussion prompt.
Discussion Rubric
Criteria Exemplary Proficient Needs Improvement Not Evident Value
Comprehension Develops an ini�al post with an
organized, clear point of view
or idea using rich and
significant detail (100%)
Develops an ini�al post with a
point of view or idea using
adequate organiza�on and
detail (85%)
Develops an ini�al post with a
point of view or idea but with
some gaps in organiza�on and
detail (55%)
Does not develop an ini�al
post with an organized point of
view or idea (0%)
40
Timeliness N/A Submits ini�al post on �me
(100%)
Submits ini�al post one day
late (55%)
Submits ini�al post two or
more days late (0%)
10
10/30/24, 10:53 AM Undergraduate Discussion Rubric – CYB-250-15105-M01 Cyber Defense 2024 C-6 (Oct – Dec)
https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623160/View 1/2
Criteria Exemplary Proficient Needs Improvement Not Evident Value
Engagement Provides relevant and
meaningful response posts
with clarifying explana�on and
detail (100%)
Provides relevant response
posts with some explana�on
and detail (85%)
Provides somewhat relevant
response posts with some
explana�on and detail (55%)
Provides response posts that
are generic with li�le
explana�on or detail (0%)
30
Wri�ng (Mechanics) Writes posts that are easily
understood, clear, and concise
using proper cita�on methods
where applicable with no errors
in cita�ons (100%)
Writes posts that are easily
understood using proper
cita�on methods where
applicable with few errors in
cita�ons (85%)
Writes posts that are
understandable using proper
cita�on methods where
applicable with a number of
errors in cita�ons (55%)
Writes posts that others are
not able to understand and
does not use proper cita�on
methods where applicable (0%)
20
Total: 100%
10/30/24, 10:53 AM Undergraduate Discussion Rubric – CYB-250-15105-M01 Cyber Defense 2024 C-6 (Oct – Dec)
https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623160/View 2/2
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.