Chat with us, powered by LiveChat In this paper, you will write a briefing paper that provides information about a specific problem in an industry or field of study( Cybersecurity vulnerabilities in certain segment | Wridemy

In this paper, you will write a briefing paper that provides information about a specific problem in an industry or field of study( Cybersecurity vulnerabilities in certain segment

Topic is  Cybersecurity vulnerabilities in certain segments of the financial services industry

everything is attached, even a sample is attached also

Writing Assignment #5 Briefing Paper

Summary of the Assignment:

• Task: In this paper, you will write a briefing paper that provides information about a specific problem in an industry or field of study( Cybersecurity vulnerabilities in certain segments of the financial services industry). The paper will also include a possible solution to the problem.

The problem can be a technical problem, a logistical problem, a human resource problem, a performance problem, or any other issue that the industry or field is dealing with.

You will respond to a discussion topic in week 3 about potential topics for the briefing paper, and you will post a memo to your instructor in a discussion topic in week 5 about your topic for the briefing paper. Your instructor should approve of the topic before you submit your first draft of the briefing paper.

• Length: 1200-1500 words, single-spaced

• Graphics: at least two graphics. The graphics can be original, or they can be borrowed from other sources, with the sources cited in APA format

• Format in Citing and Listing Sources: APA 7th edition

• Number of Sources: five or more sources, at least three of which have to be obtained through OneSearch

Brief Description of the Briefing Paper:

In the workplace, often employees are asked to write a briefing paper to higher-level

administrators on a problem in their particular industry. The paper will also present some

potential solutions to the problem.

Some examples are as follows:

• An employee working in the cybersecurity field might be asked to write a briefing paper

on the security problems in using Internet of Things (IoT) devices for smart cities. The

paper might make the point for blockchain technology as a solution to this problem.

• An employee working in the human resource management field might be asked to write a

briefing paper on the problem of keeping employees engaged while they work remotely.

The paper might argue that monthly town hall meetings on Zoom and some small face-to-

face gatherings among employees who live in close proximity are a potential solution to

this problem.

dirty
Highlight

• An employee working at a community college or university might be asked to write a

briefing paper on the problems of helping working students succeed in college as they

navigate their demanding schedules. The paper might argue that flexible due dates on

assignments is a potential solution to this problem.

• An employee in the information technology field might be asked to write a briefing paper

on better ways to train employees on how to detect phishing scams in email messages at

work. The paper might argue that infrequent online cybersecurity training is ineffective

and that quarterly, face-to-face training sessions are needed as a solution to this problem.

Strategies to Consider for the Briefing Paper:

Please follow these guidelines:

Write to an audience in a particular industry or field with a clear problem to solve. The

briefing paper can have a fairly broad audience, but the paper should focus on a particular

problem that individuals are experiencing.

For example, you could write a briefing paper on better ways of training employees to detect

phishing scams. The audience would be a broad range of managers and IT professionals.

However, the problem they all share would be clear: Employees have fallen for phishing email

scams, and this trend has allowed hackers to access confidential data.

You could write a briefing paper on why blockchain technology should be used to improve

security for smart cities. The audience would be a broad range of municipal leaders, both in IT

and in administrative areas of city government. However, the problem they all share would be

clear: With smart cities on the rise, the technology used in smart cities leaves residents

vulnerable to cybersecurity attacks.

You could write a briefing paper on better ways of helping working students succeed in

community college. The audience would be a broad range of community college administrators.

However, the problem they all share would be clear: Current approaches to teaching working

adults in community college are not helping a significant number of students succeed as they

pursue their degrees.

Integrate research, both to demonstrate the existence of the problem and to illustrate the

efficacy of the solution.

How to Organize the Briefing Paper: Please include the following sections in your briefing paper:

• Executive Summary

• The Problem

• A Potential Solution

• Summary

• References

In the Executive Summary, summarize your research and your purpose in no more than 250 words. The

executive summary should be a stand-alone document. It should be written in such a way that a busy

executive could read the executive summary and have an overall understanding of what the paper is about

without reading the rest of the paper.

In the The Problem section, you will describe the problem in the industry and why current approaches

are not working to solve it. For example, if you are writing a briefing paper about a new way to train

employees on how to detect and ward off phishing scams, you would review what training procedures are

being conducted now by most companies to help them detect and ward off phishing scams. You could

show the challenges or problems that the current training program has. You might show that employees

are still falling prey to phishing scams despite this training, or that employees find the training

uninspiring, boring, and routine.

In this section of the briefing paper, your use of sources will be important. You should integrate research

to show that the problems you have identified exist. For example, in the situation described above, you

would need sources to give evidence that employees find training ineffective.

In the A Potential Solution section, you will describe a new approach to addressing the problem you

have identified.

For example, if you are writing a briefing paper about a new way to train employees on how to detect and

ward off phishing scams, you would show why a new approach to training employees on phishing scams

would be more effective than the current approaches. Perhaps the current approaches are boring online

tutorials, and you are proposing exciting onsite training sessions complete with scenarios, role-playing,

and group work.

You would want to integrate research to show that your new approaches might be superior. For example,

you might cite a study that indicates that online tutorials are boring and that employees want more

interaction. Overall, the more research, the more persuasive your argument will be.

In the Summary section, you briefly review what the problem is, how the research shows that is is a

problem, and what the potential new approach is. This section should not be more than 200 words.

In the References, you will list your sources that you cited in the paper. You will list them in APA 7th

edition format.

You are required to have at least five sources for your paper. In addition, at least three of them are to be

from scholarly journals or from credible trade journals. This means that you will want to make use of the

UMGC Library OneSearch function, which is demonstrated in the class.

Length of the Paper:

Your briefing paper should be 1200-1500 words in length. The paper should be single-spaced.

You are required to use at least five sources, with at least three of them coming from scholarly or

credible trade journals.

Graphics:

Your briefing paper should incorporate at least two graphics. Graphics can include tables, charts,

or graphs showing some research findings. They can also be pull quotes that draw readers’

attention to an argument.

For example, using the situation described previously, you could integrate the following:

• a table that illustrates what percentage of companies use online tutorials to train their

employees on phishing attacks

• a graph that shows how training on phishing has increased while successful phishing

attacks have also increased, thus demonstrating the ineffectiveness of the training.

• a pull quote that highlights a point made by one of your sources on the ineffectiveness of

current training methods

Due Date:

Your instructor will notify you of the due date. You will write a first draft, your instructor will

comment on the first draft, and you will submit a second draft using the comments as your guide.

,

Blockchain for Smart Cities: A Potential Solution to a Security Problem

Student

Briefing Paper

WRTG 393

1

Executive Summary

The emergence of Internet of Things (IoT) technologies has given rise to the concept of the

smart city. Cities have varied services and functions that demand a precise set of controls. Smart

cities control the usage of these services through IoT technology. Connecting such services and

functions through the use of IoT technology allows city services to be more efficient. For

example, cities can have smart electrical grids that render improved efficiency as they control the

loads at different times of the day through IoT technology. Cities can have smart parking meters,

allowing residents to pay for parking with IoT technology through their smartphones rather than

with coins.

However, using IoT technology in this way means more security vulnerabiliites. Hackers can

gain access to personal data through IoT devices. The reason that hackers can access the system

is that different IoT devices are developed by various manufacturers, different firmware is

involved in their construction, and various sensors, scanners, and surveillance instruments are

used by IoT devices. This plethora of standards causes vulnerabilities when IoT devices are

connected to cities’ infrastructure. As a result, opportunities for cyber criminals abound.

Blockchain technology offers a promising security solution for smart cities in connecting IoT

devices. Blockchain technology is decentralized, as opposed to traditional third-party networks

that require a central authority for oversight. The decentralized nature of blockchain technology

renders it more secure than traditional third-party platforms. Blockchain technology is a

promising solution to the security vulnerabilities that smart cities introduce.

The Problem

A smart city, according to Shea (2020), is "a municipality that uses information and

communication technologies (ICT) to increase operational efficiency, share information with the

public and improve both the quality of government services and citizen welfare" (par. 1). The

concept of the smart city has emerged for various reasons. Population growth in cities is one

factor. It is estimated that more than 68% of the world’s population will live in cities by the year

2050 (Vuppuluri, December 3, 2020), leading to the need for more efficient services, more

seamless forms of payment, and more sustainable development in cities. Furthermore, according

to Bhushan, Khamparia, Sagayam, Sharma, Ahad, and Debnath, (2020), the need for

sustainability is an important factor in the rise of smart cities as energy distribution, and natural

resource usage need to be applied in efficient ways.

IoT technology is crucial for the development of efficient, smart cities. IoT technology and

wireless communication have allowed cities to interconnect devices and transmit data efficiently.

With this technology, a resident can rent a bicycle, pay a parking meter, and obtain traffic

information all by using an app on a smartphone. Electric grids can be contolled wirelessly to

improve efficiency. Sewer-line routing can feature sensors that communicate with each other and

redirect water flow to prevent flooding. These are but a few of the services that IoT technology

can improve for city residents.

However, as noted in the Waltonchain white paper (2018), the current arrangement for IoT

technology involves various stakeholders whose relationship with one another is uncertain at

best. With various stakeholders collaborating with their IoT devices, one IoT service provider is

2

needed to make sure that trust is established. The Whaltonchain white paper notes that this

“significantly reduces the true commercial value of the Internet of Things applications” (p. 2).

Moreover, Gilder (2018) outlines the security problems with a central service provider:

Centralization tells thieves where digital assets are most valuable and where they are. It

solves their most difficult problems. Unless power and information are distributed

throughout the system peer to peer, they are vulnerable to manipulation and theft from

the blenders at the top (p. 49).

Figure 1 demonstrates the traditional management of IoT services. The third party overseeing the

IoT hub represents a centralized management of the IoT services. As noted above, this model is

ripe for hackers to attempt to break in and access personal information.

Adapted from Pauw, C. (2018) How significant is blockchain in Internet of Things? Cointelegraph.

https://cointelegraph.com/news/how-significant-is-blockchain-in-internet-of-things

Overall, smart cities are more efficient for residents, but also more vulnerable to hackers. The

traditional model of connecting IoT devices leaves municipalies at risk for data breaches.

A Possible Solution

Blockchain technology decentralizes the control of IoT infrastructure and creates a more secure

connection through which IoT devices can communicate.

In blockchain technlology, the terms hash, block, and blockchain are pivotal.

3

• A hash is like a fingerprint is to a human being. It is a 256-bit number that must start with

zeroes. The hask identifies the block and its contents, just as a fingerprint identifies a

human being.

• A block is a record. It can be compared to a page of a ledger. It contains a collection of

data, a 32-bit number called a nonce, and a hash.

• A blockchain is a chain of blocks, a distributed ledger. Each block points backwards to

the block before it. This linking of the blocks keeps the blockchain secure in that it is

next to impossible to alter the data inside existing blocks in a blockchain.

Hassan (2020) points out the connection between the hash and the block, noting that hashing is

fundamental to blockchain technology because the header of the block features the hash of the

current and the previous block. Thus, stored hashes are used to create the blockchain.

Therefore, in a blockchain, the further one goes back in time, the harder it is to make a change.

If a system is operated on a blockchain technology, the system will resist change. This enhances

the integrity of the system. Kotow (2019) explains this concept:

… the hash of a previous block in a sequence is a tamper-proof sequence because as a

function of the design, a hash is very sensitive. So, to change any variable of any one of

the hashes in a given block would cause a domino effect, altering all of the previous

transactions in the block.

A comparison can be made to a Google Doc. When a Google Doc is shared among several

people, everyone can make modifications to the Google doc, and all modifications are recorded.

This process is similar to what occurs in a blockchain. In a blockchain, encrypted blocks of data

are chained together. The ledger of changes in the blockchain are transparent so that all viewers

can verify the integrity of the document.

Lage (2019) notes the security inherent in this system, pointing out that a hacker, in order to

modify one transaction in the blockchain, would have to modify each subsequent block in the

chain as well, resolve inconsistencies in every block, and then appeal to all participants in the

blockchain that this new blockchain is authentic and maintains integrity. Lage maintains that the

sheer amount of computational work and skill and the electrical power required to conduct this

operation renders it next to impossible. The decentralized, participatory nature of blockchain

technology is why advocates of blockchain technology argue that it is inherently secure.

Figure 2 demonstrates the decentralized nature of IoT networks in a blockchain framework. With

blockchain technology, no centralized monitoring is necessary. Data is decentralized, and the

system is difficult for hackers to break into.

4

Figure 2

Internet of Things through Blockchain

Taken from Van Dem Dam, R. (2015). Rebooting the IOT – ACC Conference.

Blockchain is often associated with cryptocurrencies such as Bitcoin. The reason for this

association is that blockchain technology was introduced by Nakamato in 2008 as a form of

decentralized data sharing in the adoption of cryptography technology (Ferrag et al., 2018).

However, in recent years blockhain technology has been applied to and considered for other

applications, including Internet of Things devices, intelligent transportation, and precision

agriculture, to name a few (Ferrag et al., 2018).

Advocates of blockchain technology maintain that the ability of all parties to verify data, instead

of a centralized party making sure that the data maintains its integrity, is a key component to the

appeal of blockchain technology. Referring back to Lage’s (2019) point, it is nearly impossible

to hack a blockchain because of the hashing properties inherent in the system, the computational

skill and time involved, and the electrical power demanded.

Summary

Blockchain technology represents an extremely promising network architecture for smart cities.

As urban centers seek to enhance services for their residents, increase their sustainability, and

adopt innovative IoT-based solutions, the decentralized features of blockchain demonstrates

advantages over the traditional centralized networking systems. As cities increasingly rely on

interconnected IoT devices, the need for trust among these devices, and the manufacturers that

produce them, increases.

Blockchain technology, according to many observers, is inherently more secure than centralized

systems and has the advantages of being more efficient because of its seamless communication.

5

References

Bhushan, B., Khamparia, A., Sagayam, K. M., Sharma, S. K., Ahad, M. A., & Debnath, N. C.

(2020). Blockchain for smart cities: A review of architectures, integration trends and

future research directions. Sustainable Cities and Society, 61.

https://doi.org/10.1016/j.scs.2020.102360

Ferrag, M. A., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, L., & Janicke, H. (2018).

Blockchain technologies for the Internet of Things: Research issues and challenges. IEEE

Internet of Things Journal, 6(2). https://doi.org/10.1109/JIOT.2018.2882794

Gilder, G. (2018). Life after google. The fall of big data and the rise of the blockchain economy.

Regnery Gateway.

Hassan, M. U., Rehmani, M. H., & Chen, J. (2019). Differential privacy in blockchain

technology: A futuristic approach. Journal of Parallel & Distributed Computing. 145:50-

74. doi:10.1016/j.jpdc.2020.06.003

Kotow, E. (February 26, 2019). What is blockchain hashing? https://hedgetrade.com/what-is-

blockchain-hashing/

Lage, O., de Diego, S., Urkizu, B., Gómez, E., & Gutiérrez Agüero, I. (2019). Blockchain

applications in cybersecurity. In C. Thomas, P. Fraga-Lamas, & T.M. Fernandez-

Carames (Eds.) Computer Security Threats. https://doi.org/10.5772/intechopen.90061

Pauw, C. (2018) How significant is blockchain in Internet of Things? [Online image].

Cointelegraph. https://cointelegraph.com/news/how-significant-is-blockchain-in-internet-

of-things

Shea, S. (July, 2020). Smart city. https://internetofthingsagenda.techtarget.com/definition/smart-

city

Van Dem Dam, R. (2015). [Online image]. Rebooting the IOT – ACC Conference.

Vuppuluri, P. (December 3, 2020). Investing in innovation: The rise of the smart city. Forbes.

https://www.forbes.com/sites/forbesfinancecouncil/2020/12/03/investing-in-innovation-

the-rise-of-the-smart-city/?sh=58b4c5e75ba6

Waltonchain, (2018). Waltonchain white paper V 1.0.4. The Waltonchain Team.

https://whitepaper.io/document/30/waltonchain-whitepaper

6

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Wridemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order

Related Tags

Academic APA Writing College Course Discussion Management English Finance General Graduate History Information Justify Literature MLA