Cyber Topical Questions Assignment
WE WRITE ESSAYS FOR STUDENTS
Tell us about your assignment and we will find the best writer for your project
Write My Essay For MeREMINDER EACH TOPIC Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of Topics.
TOPIC #1
Prepare a short background (briefing) paper in which you discuss the following:
1. Building block technologies (what they are, how they are used, give examples) in these three areas:
(a) Software Building Blocks
(b) Hardware Building Blocks
(c) Networks & Communications Building Blocks
2. How innovations in building block technologies impact risk and risk management for devices and endpoints in the Internet of Things.
3. What are the major or most notable cyber threats (sources of cyber risks) for each of the three types of building block?
Background paper should be 5 to 7 paragraphs long. Please remember to include an introduction to the topic, analysis (answers to #1, #2, #3), and summary (the “so what” or “what this all means”).
Your audience is a group of managers (technical and non-technical) who are participating in a conference on reducing cyber-related risks associated with the adoption of new technologies.
TOPIC #2
Write a blog posting (similar to a newsletter article) in which you present an analysis and summary of news reports about recent attacks against smart devices used by individual consumers (not businesses). Your audience for this blog posting is customers of a local consumer-facing company that provides in-home security check-ups for IoT devices and home networking.
1 Find three or more news articles about cyber attacks (hacking) against smart devices used in homes. Your articles should discuss at least three different applications of “smart” technologies (e.g. smart assistants, smart appliances, utility monitoring devices, thermostats, device status panels, etc.).
2. Analyze the news articles for common themes, e.g. vulnerable devices, types of attacks, who the attackers are, what is at risk for consumers, how to fix / remove vulnerabilities to protect users and their property.
3. Using your research and analysis, write a blog posting which informs consumers about these technologies and the associated cyber risks. Include explanations as to how consumers can protect themselves and their homes from attacks against these types of devices.
Topic #3
You have been asked to make an “operational technologies” presentation as part of a panel discussion at your company’s next senior leadership meeting. The topic for this panel is Cybersecurity for Operational Tech. The panel moderator, your company’s Chief Technology Officer, has asked the speakers to each focus on one of four categories Operational Technology (OT) which the company uses or produces as a product. These categories are:
Distribution Monitoring & Control for Utility Infrastructures (pipelines & transmission grids)
Advanced Manufacturing Systems (factories & manufacturing)
Precision Agriculture
Geographic Location Systems
Pick one of these categories. Research technologies which fit into your category (in the context of the Internet of things). Then present a summary of your research and findings as a background paper to be shared with the moderator and other panelists prior to the meeting. At a minimum, your background paper must address the following questions.
1. What is your selected category? (Name and describe it.)
2. What are the leading products and/or technologies in your selected category? (Name and describe at least three.)
3. How do these products and technologies contribute to society? (What are the benefits / what features or capabilities do they provide?)
4. What emerging risks to privacy and security have been identified for technologies in your selected category?
TOPIC#4
Read https://www.nhmunicipal.org/town-city-article/cybersecurity-best-practices-municipalities
1. Find three or more additional news articles about cyber attacks (hacking) against smart technologies and systems used by cities and municipalities. Your articles should discuss at least three different governmental applications of “smart” technologies which have been attacked in the past three years. (Consider water utility systems, electric utilities and services such as street lights and traffic lights, parking meters, traffic monitoring, camera and audio surveillance systems, building management systems, etc.)
2. Analyze the news articles for common themes, e.g. vulnerable devices, types of attacks, who the attackers are, what is at risk for local governments, how to fix / remove vulnerabilities to protect the IoT connected critical infrastructures and related devices.
3. Using your research and analysis, write a blog posting which informs government officials about these technologies and the associated cyber risks. Include explanations as to how cities and municipalities can protect themselves from attacks against these types of devices.
Topic #5
Before you begin read the following articles:
1. Robots in public spaces: implications for policy design
https://www.tandfonline.com/doi/full/10.1080/25741292.2021.1905342
2. Detection of Cyber-attacks to indoor real time localization systems for autonomous robots
https://www-sciencedirect-com.ezproxy.umgc.edu/science/article/pii/S092188901730283X
You have been asked to provide a short background paper for government leaders who are meeting to discuss regulatory requirements for robotic systems used in public spaces. Your presentation will be part of a series of presentations about the risks associated with insecure robotic systems. You may find it useful to pick one or more examples of robotic systems used in public spaces and frame your discussion around those emerging applications of technology.
For this background paper, you will need to find and analyze information from at least 3 authoritative sources, which provide information about threats, attacks, and vulnerabilities affecting robotic systems. (You may use the two starter resources listed above.) Use that information to identify and discuss risks and potential impacts that could occur if attacks against robotic systems were successful. Provide at least three example risks.
The target length for your background paper is 5 to 7 paragraphs.
TOPIC #6
Prepare a short background (briefing) paper in which you discuss the following:
1. Medical device technologies (what they are, how they are used, give examples) in these three areas:
(a) Wearable sensors and/or monitoring devices
(b) Implants (e.g. insulin pumps, pace makers, nerve stimulaters, etc.)
(c) Medical Robots and other applications of robotic technologies in healthcare settings
2. What are the major or most notable cyber threats (sources of cyber risks) for medical device technologies.
3. How do innovations in medical device technologies reduce risk and medical risk management in healthcare settings and applications? (Focus on the positive or benefits)
Your background paper should be 5 to 7 paragraphs long. Please remember to include an introduction to the topic, analysis (answers to #1, #2, #3), and summary (the “so what” or “what this all means”).
Your audience is a group of managers (technical and non-technical) who are participating in a conference on reducing cyber-related risks associated with the adoption of new technologies in medical and healthcare settings.
TOPIC #7
You have been invited to participate in a panel discussion of artificial intelligence & machine learning technologies. The panel will be debating the following question:
“How can this technology be used to support cybersecurity?” (i.e. how can the technology be used to improve cyber security defenses)
Write a 5-7 paragraph briefing statement to be sent to attendees prior to the panel discussion. Your briefing statement should provide facts about AI/ML and examples of how these technologies are currently used in cyber defense. You should also address how attackers are using AI/ML and, where possible, identify and discuss what countermeasures could be used to defeat these AI/ML enhanced attacks.
TOPIC #8
Thinking back over all of the articles and reports that you have read during this course, identify one emerging or leading technology that you believe has the most potential as a cybersecurity or cyber defense solution.
Write an executive summary (5-7 paragraphs, about 300 words) in which you recommend further investigation or research into this technology. Include in your recommendation three or more cybersecurity or cyber defense related benefits that you believe will be realized by companies who adopt this technology. Make sure that you address the “What’s in it for me (my company)” question in your summary.
Your audience for this recommendation is the CEO of a large company that is interested in exploring the adoption of promising cybersecurity related technologies.
Essay writing help – Cyber Topical Questions Assignment Online Essay Writing Agency – Critical Assignment.
Write my Essay. Premium essay writing services is the ideal place for homework help or essay writing service. if you are looking for affordable, high quality & non-plagiarized papers, click on the button below to place your order. Provide us with the instructions and one of our writers will deliver a unique, no plagiarism, and professional paper.
Get help with your toughest assignments and get them solved by a Reliable Custom Papers Writing Company. Save time, money and get quality papers. Buying an excellent plagiarism-free paper is a piece of cake!
All our papers are written from scratch. We can cover any assignment/essay in your field of study.

