C850 Steps to Success for Emerging Technology PDF

Title C850 Steps to Success for Emerging Technology
Author Jordan Hart
Course Emerging Technologies
Institution Western Governors University
Pages 5
File Size 158.3 KB
File Type PDF
Total Downloads 66
Total Views 143

Summary

A pdf that my course instructor sent me that has a better explanation of how to write out your case study than the rubric does....


Description

Emerging Technologies (C850) Steps to Success

Table of Contents Overview of Course........................................................................................................................................1 Getting started...............................................................................................................................................1 C850 Task Scenario (This is the ACTUAL scenario you MUST write your paper from)......................................2 Task Solution:.................................................................................................................................................3 Additional Tips:..............................................................................................................................................5 Common Reasons Task is Returned For Revisions or is Locked........................................................................6

Overview of Course The Emerging Technology course examines theories of technology diffusion and adoption, identifies the importance of conducting needs analyses prior to investigating technology solutions, evaluates the benefits of technology adoption, investigates the potential outcomes of implementing technological solutions, provides students the means to evaluate technologies, stresses the importance of fitting technology to the organization, analyzes barriers to technology adoption, and examines strategies for overcoming said barriers. This course supports the assessment for C850. The course covers two competencies and represents two competency units.

Getting started 1. Read and complete the entire learning resource found in your Course of Study. 2. Click the “View Task” link at the bottom of the course of study to review the task and rubric.

3. Contact your course instructors ([email protected] ) if you have any questions regarding the course or tasks. 4. Your paper should be at least 4-6 pages to meet the requirements of the rubric. Page count does not include title page and reference page. 5. Use the template as you write your paper so graders can more easily grade your task

6. You only have to solve for ONE problem! Note: Attempt to submit your first attempt of each task on your own. If your task is returned by the grader just let us know and we will meet to review and update your task.

C850 Task Scenario (This is the ACTUAL scenario you MUST write your paper from) Scenario: TechFite makes medical devices for the space program. They are in Houston, Texas, near the Johnson Space Center. Security is a top priority for TechFite, partly because the company works with NASA, but also because the proprietary technology that TechFite is creating allows humans to work longer in space. TechFite has an IT department that currently consists of 4 employees: two entry-level specialists, a senior security specialist, and an IT security manager. TechFite has a two-firewall system in which the outside firewall protects TechFite and its partners and the inner firewall protects the TechFite intranet. The two-firewall system creates a three-ring network where the innermost ring is the most secure and the outermost ring connects directly to the Internet. Each one of these firewalls creates a log of all the network traffic that passes through each of the firewalls. The TechFite CIO has notably raised concerns about current infrastructure security implications, but she wants her staff to propose inexpensive solutions to meet future demands. There is a lot of traffic that passes through these firewalls due to companies that want to securely collaborate with TechFite and the need government agencies have to access TechFite’s information. TechFite administrators have been researching solutions currently available to meet the growing demands of secure collaboration, and all suggested resources fall outside of TechFite’s IT budget. Additionally, it is difficult to scan these logs manually, and TechFite has been exploring open source solutions to automate log correlation for both hostbased and network appliances. However, the amount of storage space to keep these logs for at least a year is more than TechFite has onsite. One of the system administrators suggested using technology to not only review the logs but also store the log files. TechFite is being pressured to comply with FISMA, using NIST as a security framework, when the company works on government contracts. Other restrictions have been observed by TechFite’s competitors concerning the handling of data across international boundaries, namely in the European Union. The company is also being asked to ensure FISMA compliance, even as budgets are shrinking, which is happening in part because there are fewer space missions planned. TechFite is also looking to work with the space programs of other countries, such as the European Space Agency, the Canadian Space Agency, and JAXA, the Japanese space agency. The company is interested in collaborating with other institutions and companies to expand its business, which may result in opening subsidiaries in other locations domestically and overseas. This may force the company to

store its information for longer periods of time, and more locations means more log data will need to be stored. Besides scanning the log data for potential attackers after systems have been compromised, the system administrators would like to be alerted by a new system that meets FISMA regulations when potential attacks are occurring on host and network systems. This means that real-time log scanning and behavior analysis of incoming network traffic will be needed to determine when a denial of service attack or advanced persistent threat is happening so the system administrators can catch the hackers. The system administrators also want to install honeypots to attract hackers, and the logs for those will also need to be stored even though these honeypots will not actually have real data on them. The system administrators will be busy keeping up with the technology they have, and they will not have time to research new technologies that might help them do their jobs better.

Task Solution: Propose an emerging technology solution that will benefit the organization in the case study. You will need to discuss the impacts of this technology within the context of the organization. Write a response (e.g., proposal, letter) to the TechFite adoption plan proposal by doing the following (each section below should be a section in your paper in the template): A. Summarize an organizational need in the case study, including the scope of the need. (What is the organization asking for and why are the asking for it? Summarize the case study) B. Propose an emerging technology solution to address the organizational need from the case study. Provide justification that classifies this technology as emerging. (Will this new technology solve the problem TechFite is currently experiencing?). Remember you have to research and find an emerging technology as well as find a vendor that provides it. a. You cannot just name the technology, you have to find a supporting vendor/provider for it. The solution can be more than one technology to solve the scenario as long as they are functioning together to solve the task. You should also show examples of organizations that have used the proposed technology successfully to justify that the technology is emerging. Relate your technology to where it falls on Gartner’s Magic Quadrant for technology. Also relate what aspect of the technology makes it emerging? C. Explain the steps of the adoption process that you recommend the organization use to integrate the new emerging technology, including a description of why each step is necessary and how each step relates to people or current processes in the organization. a. Use the Gartner STREET process listing each step explaining how it is used in the adoption process(https://sites.google.com/site/aniketsaoblog/home/evaluatingemerging-technologies/street-process). b. Make SURE you are relating each Gartner STREET step to Techfite, don’t just list out the steps.

D. Describe a positive and a negative impact that your emerging technology solution could have on the people or current processes in the organization, providing examples for how to address the negative impact so it is minimized. (also what are the risks of using this new technology, if any?) E. Compare your emerging technology solution to an alternative technology solution, providing at least two advantages and two disadvantages that each technology may have for the organization. (there may be other technology options out there for this scenario, but what makes yours different and better? To be on the safe side select TWO alternative technologies) F. Recommend a method that can be used to determine whether adoption of the proposed emerging technology solution will be successful or unsuccessful, based on the needs of the organization. (how are you going to determine if the technology is successful or a failure? What period of time are you going to test your technology?) What steps are you going to take if it is a failure? What’s the fallback plan? a. The measure of the success of the implementation has to be QUANTIFIABLE…you can’t just say it’s a success because it works there has to be some measurable way of knowing it works through benchmark testing/metrics that can be read and compared to set metrics that the system must meet to be considered a success. The metrics have to be compared to the current method TechFite is using in the scenario. b. The measure of the success of the implementation has to be by quantifiable means… Techfite is manually checking logs right now so one suggestion would be to measure the success of manually checking logs versus automated checking of logs and comparing the percentage of success of one vs the other to determine success after a determined period of time (30 days is usually good). Come up with some successful percentage over a period of time that catches intrusions and quantify that as being a successful benchmark. c. Since there are no actual no hard numbers to compare the old methodology of storing/scanning the log files and detecting intrusions manually versus the new technology implementation, assume the following: Techfite currently scans 10,000 log files manually per week with a 30% success rate in identifying intrusion signature patterns and has only 4 terabytes of storage allocated locally for log storage. G. Make sure sources are cited in paper and a reference page is at the end of the paper. Have at least 2-3 sources. Make sure your paper is professionally written…this is a proposal to a CEO/CIO, so you aren’t writing the paper from the perspective of a friend/colleague

Additional Tips: A. If you use sources, include all in-text citations and references in APA format. a. Double spaced, Times New Roman, 12 point font. b. Use https://www.citationmachine.net/apa/cite-a-book to properly cite your sources c. Use https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_style_introduction. html for proper guidance for APA formatting

d. Example of an APA formatted paper: https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_st yle_guide/documents/APA%207%20Student%20Sample%20Paper.pdf B. Remember a few things when you are writing this paper: a. Your technology solution has to have a vendor that provides it…you can name what emerging tech you will use but you’ll have to also name some entity that provides that technology for the solution. b. Write this paper from the perspective you are presenting it to the CEO of the company who may not be technically literate. Always write to the audience so it is understandable and clear to them what you are trying to convey.. c. Your paper should have headings that show the subtopics for the solution so the graders and course instructors know where to look when reading in the event it is returned for edits. Suggested headings are below. d. You must have sources in paper and at the end of the paper in the reference section. e. There is no budget C. Suggested headings (these are in the template) a. Case Study Summary/Organizational Need b. Emerging Technology Solution c. Adoption Process d. Technology Impact e. Technology Comparison f. Adoption Success g. Conclusion

Common Reasons Task is Returned for Revisions or is Locked A. B. C. D.

Student ignores CI guidance/this document/template Student writes the paper without reading the scenario Student chooses a technology that is not emerging Student lists the emerging technology solution, but does not properly identify how it is an emerging technology (does not list industry examples, where it falls on Gartner’s emerging technology matrix) E. Student does not list the Gartner STREET process and relate it to TechFite for the adoption process section of the paper F. Student does not properly use a quantifiable method to prove adoption success...


Similar Free PDFs