Attachment # 00005870 - Tech_Notes.docx
Tech_Notes.docx (58.35 KB)
Raw Preview of Attachment:
(refer to the detailed question and attachment below)
What is a technology?Technology is the practical application of scientific knowledge which results in a tool (including machines and materials), process, or algorithm which solves a problem or can be used to solve a problem. A technology is not a naturally occurring object or phenomenon. Examples of technologies range from the simple pencil, screw, or wheel to advanced materials, machines, and processes such as:GrapheneDielectric thin filmsMagnetoelectric magnetic sensorsNano imprintingNano machinesNeuromorphic computer chips Read: http://www.useoftechnology.com/what-is-technology/How can technologies support or improve cybersecurity?Cybersecurity is improved when risk is reduced. Risk can be reduced in one of two ways. First, risk is reduced when the probability of occurrence for a risk event is reduced. Second, risk is reduced when the expected costs of recovering from or cleaning-up after a risk event are reduced; these costs are referred to as the expected value of the loss. Risk events can be categorized using the Five Pillars of Information Assurance:Loss of confidentialityLoss of integrityLoss of availabilityLoss of non-repudiationLoss of authenticityThe probability of a risk event can be reduced by implementing security controls. The National Institute of Standards (NIST) publishes a catalog of recommended security controls in NIST Special Publication 800-53. The individual controls are grouped into 18 families which are shown in the table below (source: NIST SP-800-53 Rev 3). Technology can be used to implement or support the implementation of controls in each of the three classes (technical, operational, management).IDENTIFIERFAMILYCLASSAC Access Control TechnicalAT Awareness and Training OperationalAU Audit and Accountability TechnicalCA Security Assessment and Authorization ManagementCM Configuration Management OperationalCP Contingency Planning OperationalIA Identification and Authentication TechnicalIR Incident Response OperationalMA Maintenance OperationalMP Media Protection OperationalPE Physical and Environmental Protection OperationalPL Planning ManagementPS Personnel Security OperationalRA Risk Assessment ManagementSA System and Services AcquisitionManagementSC System and Communications Protection TechnicalSI System and Information Integrity OperationalPM Program Management ManagementActions taken to reduce overall risk (by influencing both probability of occurrence and expected costs of clean-up) can be categorized using the Five Pillars of Information Security:ProtectDetectPreventReactDocumentKeeping these principles in mind, we can anticipate or predict applications of new or emerging technologies which would result in reduced risks and improvements to cybersecurity / cyber defense. If we look at the list of emerging technologies in the previous section, we can see that several of the listed technologies are materials used to manufacture devices. These materials could make devices more resistant to damage (preventing loss of availability). The materials could be used to make anti-tamper device enclosures or enclosures that are harder to open (both applications of the technology could prevent a loss of integrity). Nano-imprinting can be used by manufacturers to tag devices and components making it easier for end-user organizations to detect counterfeits. Detecting and removing counterfeits from the supply chain can preserve authenticity. This, in turn, can assist in preserving confidentiality of information and integrity of systems by making it harder for attackers to substitute components containing malware. Bottom Line:Researchers, inventors, investors, and cybersecurity analysts must consider the characteristics of new technologies when considering how these could be used to support or improve cybersecurity / cyber defense. The principles listed in this section can be used to evaluate the extent to which new technologies will provide support for or contribute to improvements to cybersecurity.Read: CSIA 303 Course Module #3: Risk and Risk Management (in the Week 1 conference).How are technologies developed or created?Oftentimes, we refer to new technologies as “inventions.” The process of creating an invention may be a deliberate modification of or improvement to an existing technology. Other times, the invention is an accidental side effect or outcome of an endeavor that started with a completely different objective or goal. Some newly developed technologies are so different from existing technologies that they are referred to as disruptive innovations or break-through technologies.Technologies are invented in a wide variety of settings. These settings range from academia (university research) to business (corporate research and development labs) to government agencies (government sponsored R&D labs). Technologies can also be invented by individuals or small groups in garages, basements, and backyards.One common requirement for technological innovation is a source of resources (including funding). This source can be the personal bank account (for the small inventor) to government or corporate funding (for R&D labs) to venture capital (for both small and large R&D operations).Read: http://www.atp.nist.gov/eao/gcr02-841/chapt2.htmTechnology TransferAnother requirement for the success of technological innovation is a plan or process for transferring (transitioning) technology from the R&D lab into commercial products. A robust technology transfer plan with adequate funding can ensure that technologies actually emerge from the R&D lab and transition to organizations whose focus is upon product development and/or technology commercialization. Without technology transfer plans and processes, technologies developed under completed R&D projects may be placed “on the shelf” due to lack of interest or lack of funds as researchers and funding sources move on to new problems and even newer technologies. Read: Maughan, D., Balenson, D., Lindqvist, U., & Tudor, Z. (2013, March/April). Crossing the "Valley of Death": Transitioning cybersecurity research into practice. IEEE Security and Privacy, 11(2), 14-23. [click here for link]What does the technology development lifecycle look like?The technology development lifecycle begins with an idea which either derives from or results in basic research. From there, the lifecycle proceeds through a number of phases. For this course, we use the five phase technology development lifecycle defined in NIST GCR 02-241, Between Invention and Innovation An Analysis of Funding for Early-Stage Technology Development. The five phases are:Basic ResearchProof of Concept / InventionEarly Stage Technology DevelopmentProduct DevelopmentProduction / MarketingSource: http://www.atp.nist.gov/eao/gcr02-841/chapt2.htm What is an “emerging technology?”“Emerging” refers to a stage in the technology lifecycle. In the diagram above, “emerging” technologies are moving from stage 1 “Basic Research” to stage 2 “Proof of concept / Invention.”An emerging technology is sufficiently well understood that engineers and scientists can begin to incorporate the technology into their design concepts for other technologies.What comes before the “emerging” stage? Basic research is the beginning of the technology lifecycle. This is the stage which takes ideas from the drawing board to the lab bench or work bench.What is an “emerging application of technology?” An emerging application of a technology is a product or service that depends upon one or more technologies that have not been made available to the general public (yet).Example:In 1996, Brin and Page developed the “page rank” algorithm. Their work was based upon mathematical concepts for determining link values (which, in turn, come from graph theory). These concepts were originally developed by theoretical mathematicians in the mid 1970’s.Brin and Page used their page rank algorithm to build a search engine prototype (Google) and began to talk about their research project and its potential (see http://web.archive.org/web/20020506051802/www-diglib.stanford.edu/cgi-bin/WP/get/SIDL-WP-1997-0072?1 )At this point, somewhere between 1996 and 1997, the page rank algorithm was in the “emerging” technology stage of the technology lifecycle. In 1998, Brin and Page wrote and published a research paper in which they described their newly developed search engine prototype. (See http://infolab.stanford.edu/pub/papers/google.pdf ). That search engine, Google, was an emerging application of a number of search related technologies; it just happened to include a version of the page rank algorithm which had matured to the point that it was ready for use outside the Research and Development Lab (it had “emerged”).From 1998 to the present day, engineers and computer scientists at Google have continued to refine and tweak the page rank algorithm. From time to time, a change is made to the “production” version of the page rank algorithm. But, these changes are incremental. The foundation technology of the page rank algorithm has not changed.

Tech Research

Question # 00071652 Posted By: maniac504 Updated on: 05/19/2015 04:23 AM Due on: 05/24/2015
Subject Computer Science Topic General Computer Science Tutorials:
Question
Dot Image
I am requesting assistance with this computer science assignment
Dot Image
Tutorials for this Question
  1. Tutorial # 00066385 Posted By: neil2103 Posted on: 05/19/2015 05:21 AM
    Puchased By: 3
    Tutorial Preview
    The solution of Tech Research...
    Attachments
    technology_transfer_reserch.docx (21.02 KB)
  2. Tutorial # 00067258 Posted By: neil2103 Posted on: 05/24/2015 08:24 PM
    Puchased By: 3
    Tutorial Preview
    The solution of Tech Research...
    Attachments
    technology_transfer_reserch.revised__.docx (21.31 KB)
Whatsapp Lisa