Skip to main content
Workforce LibreTexts

11.1: Description and Objectives

  • Page ID
    4384
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)

    Description

    This module discusses the future of cybersecurity: the Internet of Things (IoT) and how it creates an entirely new set of risks, and emerging technologies like drones, robots, and “wearables.” Increasingly, companies and organizations are exploring a more “active defense” approach to cybersecurity. Traditional incident response—the rapid deployment of a team to remediate breaches to a network, identify additional threats, and restore functionality—is still necessary but is no longer sufficient. The module gives an overview of how the connectedness of our cyber networks demands intelligence-driven tools and processes that equip leaders with an anticipatory edge.

     

    Objectives

    • Identify emerging trends and demonstrate an understanding of emerging technologies.
    • Understand the Internet of Things (IoT) and how it expands the cyber “attack surface.”
    • Be able to make educated predictions of what the future might look like for the cybersecurity critical infrastructure framework.
    • Discuss ethical issues that can arise in relation to new technology and new defense strategies.

     


    11.1: Description and Objectives is shared under a CC BY license and was authored, remixed, and/or curated by LibreTexts.

    • Was this article helpful?