Start Offer Intelligence Tech Research Project Purpose

Start Offer Intelligence Tech Research Project
Purpose
The rationale for this Start Offer Intelligence (OSINT) Project is to make exhaust of publicly accessible sources of files to envision an rising application of know-how and then put together a file valid for dissemination to interested occasions in business and executive (subscribers to a risk intelligence reporting service).
Overview
Your task is to make an OSINT file which affords knowledge regarding the traits of an rising application of know-how and the threats / attacks to which it will likely be inclined. The customers of this file non-public an hobby in increasing valid countermeasures to stop attacks by a colossal spectrum of attackers from hobbyists to quasi-consultants and legal entities to effectively organized, nation-say sponsored groups. When capacity, your OSINT must explore the varieties and identities of identified attackers who are inclined to middle of attention on customers and usages of the know-how lined by your file.
The basic ask that have to be answered to your OSINT file is: what are the cybersecurity implications (excellent or flawed) of a particular rising application of know-how?
For this task, your characteristic is that of a risk intelligence research intern working for a risk intelligence provider (non-public company). Your target market for this file will doubtless be subscribers to a cybersecurity risk intelligence reporting service supplied by your employer. These subscribers are essentially senior managers and executives in firms and executive organizations.
The high-stage visibility to your deliverable methodology that, as well to without considerations accessed web sources and social media, your research have to also encompass research-based mostly mostly journal articles, papers published in conference court docket cases, and doctoral dissertations. Threat research and intelligence reports published by mainstream firms, e.g. Verizon, Forrester, Deloitte, and various others., must also be regarded as for exhaust as valuable sources to your OSINT file. Explore step #3 below Habits Your OSINT Research (below) for additonal info about how many sources are required and what kinds of sources are allowed.
The next knowledge desires, previously acknowledged by your company’s risk researchers, have to be met by the deliverable for this task.
(a) Identification and description (traits) of the know-how,
(b) Attainable or identified uses of the know-how to toughen or make stronger business operations of firms and executive companies; this entails vogue of merchandise which incorporate the know-how and capacity or identified uses of the know-how to toughen or make stronger cybersecurity, i.e.
a. uses of the know-how to diminish or arrange risk
b. uses of the know-how to expand resistance to threats/attacks
c. uses of the know-how to diminish vulnerabilities in an existing know-how application
(c) capacity or identified uses or exploitation of the know-how by attackers, criminals, terrorists, and various others. to design their desires.

Instructions are attached.

Template also attached.

  • CSIA459OSINTTechResearchProject2023.docx

  • CSIA_Paper_TemplateTOCTOF20213.pdf

CSIA 459: Evaluating Emerging Technologies

Start Offer Intelligence Tech Research Project

Purpose

The rationale for this Start Offer Intelligence (OSINT) Project is to make exhaust of publicly accessible sources of files to envision an rising application of know-how and then put together a file valid for dissemination to interested occasions in business and executive (subscribers to a risk intelligence reporting service).

Overview

Your task is to make an OSINT file which affords knowledge regarding the traits of an rising application of know-how and the threats / attacks to which it will likely be inclined. The customers of this file non-public an hobby in increasing valid countermeasures to stop attacks by a colossal spectrum of attackers from hobbyists to quasi-consultants and legal entities to effectively organized, nation-say sponsored groups. When capacity, your OSINT must explore the varieties and identities of identified attackers who are inclined to middle of attention on customers and usages of the know-how lined by your file.

The basic ask that have to be answered to your OSINT file is: what are the cybersecurity implications (excellent or flawed) of a particular rising application of know-how?

For this task, your characteristic is that of a risk intelligence research intern working for a risk intelligence provider (non-public company). Your target market for this file will doubtless be subscribers to a cybersecurity risk intelligence reporting service supplied by your employer. These subscribers are essentially senior managers and executives in firms and executive organizations.

The high-stage visibility to your deliverable methodology that, as well to without considerations accessed web sources and social media, your research have to also encompass research-based mostly mostly journal articles, papers published in conference court docket cases, and doctoral dissertations. Threat research and intelligence reports published by mainstream firms, e.g. Verizon, Forrester, Deloitte, and various others., must also be regarded as for exhaust as valuable sources to your OSINT file. Explore step #3 below Habits Your OSINT Research (below) for additonal info about how many sources are required and what kinds of sources are allowed.

The next knowledge desires, previously acknowledged by your company’s risk researchers, have to be met by the deliverable for this task.

(a) Identification and description (traits) of the know-how,

(b) Attainable or identified uses of the know-how to toughen or make stronger business operations of firms and executive companies; this entails vogue of merchandise which incorporate the know-how and capacity or identified uses of the know-how to toughen or make stronger cybersecurity, i.e.

a. uses of the know-how to diminish or arrange risk

b. uses of the know-how to expand resistance to threats/attacks

c. uses of the know-how to diminish vulnerabilities in an existing know-how application

(c) capacity or identified uses or exploitation of the know-how by attackers, criminals, terrorists, and various others. to design their desires.

Instructions

Structure your deliverable as a research file. Your file must encompass the following sections:

1. Title page with author and date

2. Desk of Contents (also Desk of Figures if graphics are customary)

3. Government Summary

4. Introduction

5. Abilities Description and Utilization Prognosis

6. Threat Prognosis

7. Summary and Conclusions

8. Reference List

Resolve an Emerging Utility of Abilities

To start, resolve an rising application of know-how. Functions of know-how that are at uncover in the rising phases encompass:

· 5G/6G Telecommunications Technologies & Implementations (Networks)

· Synthetic Intelligence

· Self sustaining Automobiles (flooring, sea, or air)

· Blockchain Abilities

· Data Science

· Deep Dwelling Dialog Networks

· Graphene

· Implantable Clinical Devices (including mind, prosthetics, medication offer, cardiac toughen, and various others.)

· Infrastructure for Vivid Cities (surveillance, monitoring, web page online visitors adjust, utilities, and various others.)

· Net of Things (in particular Operational Abilities)

· Net of Things Devices in Vivid Properties / Vivid Buildings

· Machine Finding out

· Nano machines

· Neuromorphic laptop chips

· Bodily Unclonable Functions (PUFs) (devices & electrical circuits)

· Precision Agriculture (integrated methods utilizing satellite imagery, GPS, Sensors, Robots)

· Robot inspectors for physical infrastructures (constructions, roads, railways, pipelines, and various others.)

· Wearable Sensors for Dangerous Materials Detection (e.g. CBRNE): Emergency Products and providers Sector

You is probably going to be inspired to see for and compare extra acceptable technologies earlier than deciding upon your know-how replacement for this task.

While you pick out to envision a know-how that’s no longer on the recommended technologies checklist (look above) or included in the route readings, it is advisable to first request and rep your instructor’s permission. Your instructor could require that you produce preliminary library searches for research papers and technical papers to point out that it’s essential to well procure a ample amount of sources to total the task.

Habits Your OSINT Research & Info Acquisition

Step 1. Review this UMGC library info to permit you remember sources to your OSINT Research: https://libguides.umgc.edu/credibility

Step 2. Brainstorm key phrases that it’s essential to well exhaust to back procure Net sources of info about your chosen know-how. You’ll likely be in a position to also peep for and review articles and postings in effectively identified cybersecurity trade blogs, info articles, and social media accounts. Explore https://agio.com/newsroom/the-high-10-cybersecurity-blogs-for-2021/ and https://libguides.umgc.edu/cybersecurity for lists of sources. You must procure and exhaust no longer much less than five diversified sources on this category (Net sources).

Step 3. Use your preliminary put of sources to make extra key phrase lists to make exhaust of in looking out the UMGC library databases for expert journal articles, papers, and other scholarly publications (“sources’) which debate your chosen rising application of know-how. You must procure and file on five (5) or extra Start Sources which you received from Net web sites, social media, and various others. You must also procure and file on an additional five or extra Start Sources which you received from databases which index expert and academic papers (look https://libguides.umgc.edu/scholarly if you occur to is probably going to be no longer clear what this means). The next UMGC library and/or freely accessible Net databases are identified to non-public valid expert and/or research-based mostly mostly articles which meet the “databases” as offer requirement:

· ACM Digital Library https://dl-acm-org.ezproxy.umgc.edu/

· Dissertations & Theses (Pro Quest) https://www-proquest-com.ezproxy.umgc.edu/pqdtglobal/developed?accountid=14580

· IEEE Computer Society Digital Library https://www-laptop-org.ezproxy.umgc.edu/csdl/house

· Research Gate https://www.researchgate.safe/ (required free story to access papers)

· ARVIX https://arxiv.org/

· Science Command https://www-sciencedirect-com.ezproxy.umgc.edu/search

Since the point of this OSINT search is to procure knowledge about rising features of know-how, your sources must non-public a publication date of 2018 or later (2018, 2019, 2020, 2021, 2022, 2023). For papers listed in Science Command, it’s essential to additionally exhaust papers that are marked “In Press.”

While you occur to could want finished your research for this task , you’ll need to non-public 15 or extra effectively chosen, high quality, authoritative sources which it’s essential to exhaust to meet the screech material necessities of this mission. No longer much less than 5 of these sources have to be from the expert literature, i.e. gaze-reviewed journal articles, executive or corporate paperwork or reports, trade publications, and various others. Explore https://libguides.umgc.edu/credibility and https://libguides.umgc.edu/scholarly for additonal info about evaluating sources.

5. Resolve if you occur to could want to add photos or no longer (including images, charts, graphics, and various others.). While you produce encompass photos, it is advisable to provide clear that every such merchandise has a caption and that the caption entails the in-text quotation for the offer of the image (add the offer to your checklist of references). The image have to be readable (in middle of attention, no longer blurry) and of an appropriate measurement. Any screech or screech customary MUST enormously add to the screech material and back the reader to love your diagnosis. Make no longer add gratuitous imagery (no “see candy” or ornamental photos). Make no longer add photos valid to expand your page depend!

Present: if you occur to could want captioned items, it is advisable to encompass a Desk of Figures after your Desk of Contents.

Striking It All Collectively

1. Search the suggestion of the grading rubric for specific screech material and formatting necessities for this task.

2. Your 8 to 12 page OSINT file must be expert in appearance with fixed exhaust of fonts, font sizes, margins, and various others. You must exhaust headings and page breaks to organize your paper. Title page, table of contents, and reference checklist produce no longer depend towards the page depend. Be aware that your target market will income extra from a transparent, concise, and apt presentation of files. Including extra screech material valid to artificially meet a page depend (or exceeding the recommended length by including filler) is no longer going to boost your grade.

3. Your paper must exhaust fashioned terms and definitions for cybersecurity.

4. The CSIA program recommends that you apply fashioned APA formatting since this affords you with a doc that meets the “expert appearance” necessities. APA formatting strategies and examples are chanced on below Direction Resources. An APA template file (MS Note layout) has also been supplied to your exhaust. CSIA_Paper_Template(TOC+TOF,2021).docx.  This file has the vogue gallery put up so as that it’s essential to well exhaust the built-in parts of MS Note to generate a Desk of Contents and, if crucial, a Desk of Figures.

5. Your submitted file have to encompass a separate duvet page on the starting which affords the task title, your title, and the due date. Your reference checklist have first of all a fresh (separate) page on the high of your file.

6. You is probably going to be anticipated to jot down grammatically valid English in every task that you post for grading. Make no longer turn in any work without (a) utilizing spell take a look at, (b) utilizing grammar take a look at, (c) verifying that your punctuation is correct and (d) reviewing your work for valid observe utilization and properly structured sentences and paragraphs.

7. You is probably going to be anticipated to credit ranking your sources utilizing in-text citations and reference checklist entries. Both your citations and your reference checklist entries have to apply a fixed quotation vogue (APA, MLA, and various others.).

8. Explore the “Examples” portion (below) for knowledge about straightforward create a Desk of Contents and Desk of Figures. The built-in back for MS Note can even toddle you via establishing these screech material substances to your OSINT file.

Examples

Desk of Contents Purpose 1 Overview 1 Instructions 2 Resolve an Emerging Utility of Abilities 2 Habits Your OSINT Research & Info Acquisition 3 Striking It All Collectively 4 Examples 5 References 7

The Desk of Contents (TOC) above used to be generated utilizing MS Note’s References > Desk of Contents characteristic (look Resolve 1). You must make exhaust of the headings kinds from the Vogue Gallery in focus on in confidence to non-public the TOC generated for you.

The Desk of Figures (References > Insert Desk of Figures) requires that you exhaust the Vogue Gallery’s “caption” vogue. An example of the Vogue Gallery window is shown in Resolve 2.

When utilizing Heading or Caption Kinds in the Vogue Gallery, it’s essential to well (must) trade them to Dim Font, 11 or 12 point, and add condo earlier than and after. Use the back characteristic in MS Note if you occur to provide no longer already know straightforward produce these adjustments.

Resolve 1. Reference Tab in MS Note (Microsoft, 2021)

Resolve 2. Vogue Gallery in MS Note (Microsoft, 2021).

References

Microsoft. (2021). Microsoft Note (Net page of job 365). Redmond, WA: Creator.

Copyright © 2022 by College of Maryland Global Campus. All rights reserved.

image1.png

image2.png

image3.png

,

Running head: PAPER TEMPLATE 1

Title of Paper

Your Title

Month Day, three hundred and sixty five days

2

Running head: PAPER TEMPLATE

Desk of Contents

Desk of Figures ……………………………………………………………………………………………………………… 2

Introduction ……………………………………………………………………………………………………………………. 3

Prognosis…………………………………………………………………………………………………………………………. 3

First Sub-portion …………………………………………………………………………………………………………. 4

2nd Sub-portion ……………………………………………………………………………………………………… 4

Summary and Conclusions ………………………………………………………………………………………………. 4

References ……………………………………………………………………………………………………………………… 5

Desk of Figures

Resolve 1. References Tab in MS Note (Microsoft, 2021). ……………………………………………………. 4

3

Running head: PAPER TEMPLATE

Introduction

This template used to be built from APA 6 th

model necessities. You could proceed to make exhaust of it in

CSIA classes to your projects and papers even supposing the university has officially adopted APA

model 7. The requirement for CSIA assignments is that your work be expert in

appearance and that sources are cited and referenced utilizing a system or vogue that’s fixed

and affords ample knowledge so as that readers can fact-take a look at your work.

Paragraph. Use the Fashioned Indent vogue to indent your paragraphs as First Line Indent by

½ lope. This vogue can even double condo between lines. Make no longer hit the ENTER key till you

non-public finished your paragraph. Let MS Note wrap lines within the paragraph itself.

To your reference portion, exhaust the Reference vogue from the vogue gallery to indent your

entries as Striking Indent by ½ lope. This vogue can even double condo your references for you.

Make NOT hit the ENTER key till you advance to the END of a reference entry. While it’s essential to well want to

power MS Note to wrap long URLs, exhaust the Insert->Symbol characteristic to insert a no width optional

destroy character. Or, switch on paragraph marks (so as that it’s essential to well look the image for the character)

and reproduction/paste this character (in an instant to the left of the outlet parenthesis for this clause

it is advisable to appear two gray squares, one within the replacement). While you produce no longer look the character, then you

produce no longer non-public paragraph marks was on (click on on the ¶ image in the paragraph formatting neighborhood

on the Dwelling Ribbon).

Prognosis

Paragraphs. Use sub-headings as fundamental and easiest if you occur to could want no longer much less than two sub-sections

under a foremost portion heading. While you is probably going to be including figures, produce clear that you encompass a

caption below each one (look Resolve 1).

4

Running head: PAPER TEMPLATE

First Sub-portion

Paragraph

Resolve 1. References Tab in MS Note (Microsoft, 2021).

2nd Sub-portion

Paragraph

Summary and Conclusions

Paragraph

5

Running head: PAPER TEMPLATE

References

Microsoft. (2021). Microsoft Note (Net page of job 365). Redmond, WA: Creator.

Reynolds, G. W. (2010). Ethics in the toddle in the park age (Third ed.). Boston, MA: Direction

Abilities.

QUALITY: 100% ORIGINAL PAPER NO ChatGPT.NO PLAGIARISMCUSTOM PAPER

Best Custom Essay Writing Services

Looking for unparalleled custom paper writing services? Our team of experienced professionals at AcademicWritersBay.com is here to provide you with top-notch assistance that caters to your unique needs.

We understand the importance of producing original, high-quality papers that reflect your personal voice and meet the rigorous standards of academia. That’s why we assure you that our work is completely plagiarism-free—we craft bespoke solutions tailored exclusively for you.

Why Choose AcademicWritersBay.com?

  • Our papers are 100% original, custom-written from scratch.
  • We’re here to support you around the clock, any day of the year.
  • You’ll find our prices competitive and reasonable.
  • We handle papers across all subjects, regardless of urgency or difficulty.
  • Need a paper urgently? We can deliver within 6 hours!
  • Relax with our on-time delivery commitment.
  • We offer money-back and privacy guarantees to ensure your satisfaction and confidentiality.
  • Benefit from unlimited amendments upon request to get the paper you envisioned.
  • We pledge our dedication to meeting your expectations and achieving the grade you deserve.

Our Process: Getting started with us is as simple as can be. Here’s how to do it:

  • Click on the “Place Your Order” tab at the top or the “Order Now” button at the bottom. You’ll be directed to our order form.
  • Provide the specifics of your paper in the “PAPER DETAILS” section.
  • Select your academic level, the deadline, and the required number of pages.
  • Click on “CREATE ACCOUNT & SIGN IN” to provide your registration details, then “PROCEED TO CHECKOUT.”
  • Follow the simple payment instructions and soon, our writers will be hard at work on your paper.

AcademicWritersBay.com is dedicated to expediting the writing process without compromising on quality. Our roster of writers boasts individuals with advanced degrees—Masters and PhDs—in a myriad of disciplines, ensuring that no matter the complexity or field of your assignment, we have the expertise to tackle it with finesse. Our quick turnover doesn’t mean rushed work; it means efficiency and priority handling, ensuring your deadlines are met with the excellence your academics demand.

ORDER NOW and experience the difference with AcademicWritersBay.com, where excellence meets timely delivery.

NO PLAGIARISM