Identify information management and cyber threats facing embedded and digital tools used by PA.

Identification should include

  • data theft
  • illegal capture of resources
  • reputation loss
  • destruction of equipment
  • improper financial advantage over competitors.

Process/Skill Questions:

  • What are the best practices for information management?
  • How can information management be affected by cyber threats?
  • What is an embedded system?
  • How can loss of reputation negatively affect a business?
  • Who should own the infield, yield, and other data generated by PA technology?
  • What threats can be embedded in digital tools, and what are the ways to keep them more secure?