Computer Science homework help.
IoT is the phenomenon of connecting devices used in everyday life. It provides an interactive environment of human users and a myriad of devices in a global information highway, always on and always able to provide information. IoT connections happen among many types of devices — sensors, embedded technologies, machines, appliances, smart phones — all connected through wired and wireless networks.
Cloud architectures such as software as a service have allowed for big data analytics and improved areas such as automated manufacturing. Data and real-time analytics are now available to workers through wearables and mobile devices.
Such pervasive proliferation of IoT devices gives hackers avenues to gain access to personal data and financial information and increases the complexity of data protection. Given the increased risks of data breaches, newer techniques in data loss prevention should be examined.
Increased bandwidth and increased levels of interconnectivity have allowed data to become dispersed, creating issues for big data integrity. In such a world, even the financial transactions of the future are likely to be different — Bitcoin and digital currency may replace a large portion of future financial transactions.
To survive and thrive, organizational technology strategists must develop appropriate technology road maps. These strategists must consider appropriate function, protection, and tamper-proofing of these new communications and transactions.
It will be impossible to protect data by merely concentrating on protecting repositories such as networks or endpoints. Cybersecurity strategists have to concentrate on protecting the data themselves. They will need to ensure that the data are protected no matter where they reside.:
Select Devices and Technologies
By now, you have an idea of your team members and your role on the team project. Now, it’s time to get the details about the devices and technologies needed to be included in the Strategic Technology Plan for Data Loss Prevention.
You should limit the scope of this project by selecting a set of devices and technologies which are most appropriate for data loss prevention for your business mission and future success. Based on your prior knowledge of your company and based on the project roles you agreed upon in the previous step, perform some independent research on the following topics and identify a set of devices and technologies that you propose for your company, and your business rationale for selecting them:
- Internet of things (IoT)
- block chain
- data masking
- data obfuscation
- operational context
- big data analytics
Your team plan should include significant detail about these technologies, including what kinds of IoT devices will be appropriate for the company’s use. During your research, you should also see if there might be any issues for integration and implementation, which you will consider in greater detail in a later step in the project.
When you’ve finished detailing the proposed devices and technologies, move to the next step, where the team will outline its goals on how the devices and technologies will ensure the company is prepared for future vulnerabilities.
Step 3: Develop Goals and ObjectivesStp3You and your team members have outlined the proposed devices and technologies for the data loss prevention plan. Next, focus on the organizational mission and develop a set of goals and objectives to show how your set of chosen devices and technologies will help your company prepare for the future. Include a discussion for deploying, maintaining, and securing these devices and technologies.
This section of the team plan should also include a discussion on the devices and technologies’ impact to the existing company infrastructure and security.
When you’ve completed this section, move on to the next step, where you and your team members will conduct a detailed analysis of each device and technology.