Skip to content
Home » Blockchain Technology or Any emerging technologies the Author(s) choose

Blockchain Technology or Any emerging technologies the Author(s) choose

Open Source Intelligence Tech Research Project
Objective
The purpose of this Open Source Intelligence (OSINT) Project is to use publicly available sources of information to investigate an emerging application of technology and then prepare a report suitable for dissemination to interested parties in business and government (subscribers to a threat intelligence reporting service).
Overview 
Your task is to develop an OSINT report which provides information about the characteristics of an emerging application of technology and the threats / attacks to which it may be vulnerable. The consumers of this report have an interest in developing suitable countermeasures to prevent attacks by a broad spectrum of attackers from hobbyists to quasi-professionals and criminal entities to well organized, nation-state sponsored groups. When possible, your OSINT should explore the types and identities of known attackers who are likely to target users and usages of the technology covered by your report. 
The basic question that must be answered in your OSINT report is: what are the cybersecurity implications (good or bad) of a specific emerging application of technology?
For this assignment, your role is that of a threat intelligence research intern working for a threat intelligence provider (private company). Your audience for this report will be subscribers to a cybersecurity threat intelligence reporting service provided by your employer. These subscribers are primarily senior managers and executives in businesses and government organizations.
The high-level visibility for your deliverable means that, in addition to easily accessed web sources and social media, your research must also include research-based journal articles, papers published in conference proceedings, and doctoral dissertations. Threat research and intelligence reports published by mainstream companies, e.g. Verizon, Forrester, Deloitte, etc., should also be considered for use as primary sources for your OSINT report. See step #3 under Conduct Your OSINT Research (below) for additional information about how many sources are required and what types of sources are allowed.
The following information needs, previously identified by your company’s threat researchers, must be met by the deliverable for this assignment.
(a) Identification and description (characteristics) of the technology,  
(b) Potential or known uses of the technology to support or improve business operations of companies and government agencies; this includes development of products which incorporate the technology and potential or known uses of the technology to support or improve cybersecurity, i.e.
a. uses of the technology to reduce or manage risk
b. uses of the technology to increase resistance to threats/attacks
c. uses of the technology to decrease vulnerabilities in an existing technology application 
(c) potential or known uses or exploitation of the technology by attackers, criminals, terrorists, etc. to accomplish their goals.
Instructions
Format your deliverable as a research report. Your report should include the following sections:
1. Title page with author and date
2. Table of Contents (also Table of Figures if graphics are used)
3. Executive Summary
4. Introduction
5. Technology Description and Usage Analysis
6. Threat Analysis
7. Summary and Conclusions
8. Reference List
Choose an Emerging Application of Technology
To begin, choose an emerging application of technology. Applications of technology that are currently in the emerging stages include:
• 5G/6G Telecommunications Technologies & Implementations (Networks)
• Artificial Intelligence
• Autonomous Vehicles (ground, sea, or air)
• Blockchain Technology
• Data Science 
• Deep Space Communication Networks
• Graphene
• Implantable Medical Devices (including brain, prosthetics, medication delivery, cardiac support, etc.)
• Infrastructure for Smart Cities (surveillance, monitoring, traffic control, utilities, etc.)
• Internet of Things (especially Operational Technology)
• Internet of Things Devices in Smart Homes / Smart Buildings
• Machine Learning 
• Nano machines
• Neuromorphic computer chips
• Physical Unclonable Functions (PUFs) (devices & electrical circuits)
• Precision Agriculture (integrated systems using satellite imagery, GPS, Sensors, Robots)
• Robot inspectors for physical infrastructures (buildings, roads, railways, pipelines, etc.) 
• Wearable Sensors for Hazardous Materials Detection (e.g. CBRNE): Emergency Services Sector
You are encouraged to look for and investigate additional appropriate technologies before deciding upon your technology choice for this assignment.
If you decide to research a technology that is not on the suggested technologies list (see above) or included in the course readings, you must first request and receive your instructor’s permission.  Your instructor may require that you do preliminary library searches for research papers and technical papers to prove that you can find a sufficient number of resources to complete the assignment.
Conduct Your OSINT Research & Information Acquisition
Step 1. Review this UMGC library guide to help you evaluate sources for your OSINT Research:  https://libguides.umgc.edu/credibility 
Step 2. Brainstorm keywords that you can use to help find Internet sources of information about your chosen technology. You can also search for and review articles and postings in well known cybersecurity industry blogs, news articles, and social media accounts. See https://agio.com/newsroom/the-top-10-cybersecurity-blogs-for-2021/ and https://libguides.umgc.edu/cybersecurity for lists of resources.   You must find and use at least five different sources in this category (Internet sources).
Step 3. Use your initial set of sources to develop additional keyword lists to use in searching the UMGC library databases for professional journal articles, papers, and other scholarly publications (“sources’) which discuss your chosen emerging application of technology.  You must find and report on five (5) or more Open Sources which you obtained from Internet web pages, social media, etc. You must also find and report on an additional five or more Open Sources which you obtained from databases which index professional and academic papers (see https://libguides.umgc.edu/scholarly if you are not sure what this means). The following UMGC library and/or freely available Internet databases are known to have suitable professional and/or research-based articles which meet the “databases” as source requirement:
• ACM Digital Library https://dl-acm-org.ezproxy.umgc.edu/ 
• Dissertations & Theses (Pro Quest) https://www-proquest-com.ezproxy.umgc.edu/pqdtglobal/advanced?accountid=14580 
• IEEE Computer Society Digital Library https://www-computer-org.ezproxy.umgc.edu/csdl/home
• Research Gate https://www.researchgate.net/ (required free account to access papers)
• ARVIX https://arxiv.org/ 
• Science Direct https://www-sciencedirect-com.ezproxy.umgc.edu/search 
Since the point of this OSINT search is to find information about emerging applications of technology, your sources must have a publication date of 2018 or later (2018, 2019, 2020, 2021, 2022, 2023). For papers indexed in Science Direct, you may also use papers that are marked “In Press.” 
When you have finished your research for this assignment, you should have 15 or more well chosen, high quality, authoritative resources which you will use to meet the content requirements of this project. At least 5 of those resources must be from the professional literature, i.e. peer-reviewed journal articles, government or corporate documents or reports, trade publications, etc. See  https://libguides.umgc.edu/credibility and https://libguides.umgc.edu/scholarly for additional information about evaluating sources. 
5. Decide if you need to add images or not (including pictures, charts, graphics, etc.). If you do include images, you must make sure that each such item has a caption and that the caption includes the in-text citation for the source of the image (add the source to your list of references). The image must be readable (in focus, not blurry) and of an appropriate size. Any image or picture used MUST significantly add to the content and help the reader to understand your analysis. Do not add gratuitous imagery (no “eye candy” or decorative images). Do not add images just to increase your page count!
Note: if you have captioned items, you must include a Table of Figures after your Table of Contents.
Putting It All Together
1. Consult the grading rubric for specific content and formatting requirements for this assignment.
2. Your 8 to 12 page OSINT report should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper. Title page, table of contents, and reference list do not count against the page count. Remember that your audience will benefit more from a clear, concise, and accurate presentation of information. Adding extra content just to artificially meet a page count (or exceeding the recommended length by adding filler) will not improve your grade.
3. Your paper should use standard terms and definitions for cybersecurity.  
4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources. An APA template file (MS Word format) has also been provided for your use. CSIA_Paper_Template(TOC+TOF,2021).docx.  This file has the style gallery set up so that you can use the built-in features of MS Word to generate a Table of Contents and, if needed, a Table of Figures.
5. Your submitted file must include a separate cover page at the beginning which provides the assignment title, your name, and the due date. Your reference list must begin with a new (separate) page at the end of your file.
6. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.  
7. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.). 
8. See the “Examples” section (below) for information about how to create a Table of Contents and Table of Figures. The built-in help for MS Word will also walk you through creating these content elements for your OSINT report.
 
Examples
Table of Contents
Objective 1
Overview 1
Instructions 2
Choose an Emerging Application of Technology 2
Conduct Your OSINT Research & Information Acquisition 3
Putting It All Together 4
Examples 5
References 7
 
The Table of Contents (TOC) above was generated using MS Word’s References > Table of Contents feature (see Figure 1). You must use the headings styles from the Style Gallery in order to have the TOC generated for you.
The Table of Figures (References > Insert Table of Figures) requires that you use the Style Gallery’s “caption” style. An example of the Style Gallery window is shown in Figure 2.
When using Heading or Caption Styles in the Style Gallery, you can (should) change them to Black Font, 11 or 12 point, and add space before and after. Use the help feature in MS Word if you do not already know how to make these changes.
 
Figure 1. Reference Tab in MS Word (Microsoft, 2021)
 
Figure 2. Style Gallery in MS Word (Microsoft, 2021).

References
Microsoft. (2021). Microsoft Word (Office 365). Redmond, WA: Author.
 

Interested in getting help with this assignment?
Get a professional writing team to work on your assignment!
Order Now
Recent postsFor this final assignment, you will prepare a brief paper detailing the steps undertaken to complete a presentation that disseminates information you assemble
Please choose to answer only one of the 2 following questions. Option 1: In your opinion and based on scientific, peer-reviewed published evidence, does child
At the beginning of the previous academic year, the institution announced it would drop football at the conclusion of the season. The announcement created pub
you will review current research in Personality and provide a critical evaluation of that personality research through an annotated bibliography. An annotated
In Module 5, we considered the third in our three-part series on research design. Specifically, the focus was on the longitudinal studies, in which the resear

Need help with a similar or different Task?

We have the best writers to help you. Hire Writer Now

ORDER NOW