Technology Review #2 – Annotated Bibliography

DO YOU KNOW WHY YOUR FRIENDS ARE POSTING BETTER GRADES THAN YOU? — THEY ARE PROBABLY USING OUR WRITING SERVICES. Place your order and get a quality paper today. Take advantage of our current 15% discount by using the coupon code WELCOME15.

Order a Similar Paper Order a Different Paper

Technology Review #2: Emerging Application of Technology in a Critical Infrastructure


The purpose of this technology review is to identify, discuss, and evaluate the cybersecurity implications of an emerging application of technology in the context of a critical infrastructure sector. Your selected technology may be hardware, software, or systems that rely upon both hardware and software. Your research will also include an examination of the cybersecurity implications of using this technology in critical infrastructures. This type of research is also referred to as a survey of the literature. Allowable sources for your literature survey are journal articles, papers published in conference proceedings, and research studies published in dissertations.


Your audience is a group of senior executives who will be meeting to decide which emerging applications of technologies should be selected for a security-focused, Internal Research & Development projects during the next budget cycle. Each of these executives is responsible for developing products and systems that support next generation systems in the nation’s critical infrastructure sectors.

The high-level visibility for your deliverable means that you need to start from a strong foundation of suitable research-based journal articles, papers published in conference proceedings, and doctoral dissertations. The basic question that must be answered about the selected technology is: what are the cybersecurity implications (good or bad) for the selected critical infrastructure sector?

In addition, the executives have expressed the following information needs, which must be met by the deliverable for this assignment:

  • characteristics of the critical infrastructure,
  • characteristics of the technology,
  • use of the technology to support or improve cybersecurity,
  • use of the technology to reduce or manage risk,
  • use of the technology to increase resistance to threats/attacks,
  • use of the technology to decrease vulnerabilities in an existing technology application,
  • use or exploitation of the technology by attackers, criminals, terrorists, etc. to accomplish their goals.


Format your deliverable as a “descriptive or informative” annotated bibliography. The UMUC library provides information about how to complete this type of assignment. See (sub-heading “To get started”).

In addition to the list of sources and annotations, you must provide an introductory paragraph.

See the rubric for additional requirements for this assignment.

Before you begin your research and writing, review the grading rubric attached to the Assignment Folder entry for this assignment. The rubric provides specific information about content and formatting requirements. After you have reviewed the rubric, follow the instructions provided below.

Do you require writing assistance from our best tutors to complete this or any other assignment? Please go ahead and place your order with us and enjoy amazing discounts.

Order a Similar Paper Order a Different Paper