Question 1. A recommendation of an emerging technology to fu

Question 1. A recommendation of an emerging technology to further research and invest in is Big Data Analytics (BDA). BDA can provide Cybersecurity capabilities such as the identification, prevention, and mitigation of Cyber-threats, while processing large quantities of data through connections with the Internet of Things (IoT) technologies , such as “mobile devices, radio -frequency identification (RFID), the Web and a growing list of automated sensory technologies” (Kuketz, 2012). With the ability to process data on a variety of systems as it streams, that can spot any security aberrations that it perceives and actively respond to eradicate the threat through its decision-making processes. BDA is a blend of “data mining, Hadoop software framework, in-memory and predictive analytics, and text mining” technologies that can coordinate with myriad devices online to produce its efficient data streaming, judgement, and analysis abilities (SAS Institute Inc., n.d.). BDA has tremendous Cybersecurity future possibilities because of its many data processing, judgement capabilities, and Cybersecurity features that can enable organizations to manage data more efficiently and rely upon its data processing results for enhanced decision-making. Many industries currently use BDA, such as the health care, retail, and travel industries, state and federal governments, but the technology is still in the early growth stages (SAS Institute Inc., n.d.). BDA has been predicted to gain further acceptance as the benefits of BDA versus the cost of investment are observed by companies and organizations. Three Cyber-defense associated benefits that can result from BDA are “user behavior analytics, the ability to observe “IT environments in real-time”, and the ability to report and respond instantaneously to threats discovered (Ashford, 2016). Being able to follow the activities of users online can give companies insight into positive and negative trends that may affect their business, including suspicious activity linked to Cyber-threats such as hackers or malware. Viewing IT activities as they occur can give a company time to prepare or respond to trends or incidents that may harm the business or reduce profit. The ability of BDA to spot anomalies and apply Cybersecurity resources instantly to the prevention and mitigation of security breaches is a benefit that can ensure business continuity and keep the company competitive. Companies who adopt BDA technology in the future can expect to experience all these Cybersecurity benefits, in addition to the fast processing and storage of data. With so many uses for BDA, many of which may not have even been discovered yet, this emerging technology is strongly suggested as a profitable, beneficial investment worthy of continued researching and funding.References:Ashford, W. (2016, March 22). Cyber security budgets not rising in line with threats, say securitypros. Retrieved from http://www.computerweekly.com/news/4500279662/Cyber-security- budgets-not-rising-in-line-with-threats-say-security-prosKuketz, D. (2012, October 23). The 7 biggest business benefits from big data. Retrieved from http://www.utopiainc.com/insights/blog/381-7-biggest-business-benefits-from-big-dataSAS Institute Inc. (n.d.). Big data analytics: What it is and why it matters | SAS. Retrieved fromQuestion 2. With the development of social media and the internet, over 90% of the worlds data has been only generated since 2013. This number will only increase with the continued growth of Internet of Things and smart devices. This data revolution translates into ever increasing amounts of network traffic and data that cybersecurity measures must analyze for potential threats and defend against. One emerging technology that may provide cybersecurity the ability to handle the volume of data is big data analytics (BDA) which is capable of examining large amounts of data in order to identify patterns and do predictive analysis (Henry & Venkatraman, 2015). Given the current and growing cybersecurity need, it is recommended that the company invest in further research into BDA.The largest potential of BDA is combining BDA with existing cybersecurity technologies that will enable them to perform better and handle higher volumes of data. For example, BDA can increase the ability to analyze and correlate between various types of viruses and malware to determine possible signatures that can be used to increase detection and protection. Additionally, BDA can be used forensically to quickly determine the source of the virus or malware and subsequently help prevent possible infection (Ponemon Institute, 2013). Another application is with the continued cyber threats from Distributed Denial of Service (DDoS) style attacks. Because BDA analyze large amounts of data it can detect the formation of DDoS attacks before other conventional cybersecurity measures can, allowing time to prevent the attack or to minimize damage (Baesens et al., 2016). Finally, another advantage that BDA provides is a non-technical advantage. As mentioned BDA can identify patterns and trends which can provide decision makers better information and a more complete view of current cyber threats subsequently allowing better decision making (Martens et al., 2016).Big data analytics has the potential to increase the effectiveness of current cybersecurity measures, but full implementation requires additional investment in research and development. But given the potential that BDA offers in cybersecurity, it is recommended that the company pursue BDA as a viable cybersecurity technology. ResourcesHenry, R., & Venkatraman, S. (2015). BIG DATA ANALYTICS THE NEXT BIG LEARNING OPPORTUNITY. Academy Of Information & Management Sciences Journal, 18(2), 17-29.Martens, D., Provost, F., Clark, J., & de Fortuny, E. J. (2016). MINING MASSIVE FINE-GRAINED BEHAVIOR DATA TO IMPROVE PREDICTIVE ANALYTICS. MIS Quarterly, 40(4), 869-888.Baesens, B., Bapna, R., Marsden, J. R., Vanthienen, J., & Zhao, J. L. (2016). TRANSFORMATIONAL ISSUES OF BIG DATA AND ANALYTICS IN NETWORKED BUSINESS. MIS Quarterly, 40(4), 807-818Ponemon Institute. (2013, February). Big data analytics in cyber defense. Retrieved from http://www.ponemon.org/local/upload/file/Big_Data_Analytics_in_Cyber_Defense_V12.pdf