Identify information management and cyber threats facing embedded and digital tools used by PA.
Identification should include
- data theft
- illegal capture of resources
- reputation loss
- destruction of equipment
- improper financial advantage over competitors.
Process/Skill Questions:
- What are the best practices for information management?
- How can information management be affected by cyber threats?
- What is an embedded system?
- How can loss of reputation negatively affect a business?
- Who should own the infield, yield, and other data generated by PA technology?
- What threats can be embedded in digital tools, and what are the ways to keep them more secure?