CYB 220 Project Three Milestone Guidelines and Rubric Overview A critical skill for you to have as a cybersecurity practitioner is to prioritize criteria, requirements, and data to determine the best...

1 answer below »
CYB 220 Project Three Milestone Guidelines and Rubric Overview A critical skill for you to have as a cybersecurity practitioner is to prioritize criteria, requirements, and data to determine the best course of action. The factors that influence your decisions can vary from cost to complexity, effectiveness to available resources, or best-practice to executive viewpoint. How can you evaluate the issues to determine what elements of your environment are most important? In this assignment, you will begin analyzing information related to selecting and recommending a network protection technology solution to your manager. The final evaluation and recommendation will be submitted as Project Three in Module Seven; however, in this milestone, you will examine organizational information, consider how various factors influence the decision-making criteria, and fill in a technology evaluation of your own based on your manager’s questions. Scenario Your instructor will provide you with the scenario for this project in an announcement. The scenario will provide you with the beginning of a security plan that documents areas of relevance to your decision making for the project. Additionally, a fellow analyst is completing an evaluation of network protection technologies, specifically intrusion detection systems (IDSs) and intrusion prevention systems (IPSs), to help you with your decision-making process. You will be provided with the completed evaluation matrix in Module Seven for use in completing Project Three. Your manager has also provided a list of questions that they would use to evaluate the organizational needs in an IDS or IPS. The technology evaluation criteria and your manager’s questions can be found in the Technology Evaluation Criteria document. For your submission, you will download and fill out the Technology Evaluation Criteria Worksheet. Both of these documents can be found in the Project Three Milestone task in Module Five of your course. Based on your analysis of the technology evaluation criteria, the details provided in the scenario, and your manager’s guiding questions, you will identify the highest priority criteria and select Fundamental Security Design Principles related to your prioritization. Prompt Submit a completed Technology Evaluation Criteria Worksheet, which includes a filled-out table, your prioritized list, and two Fundamental Security Design Principles that best encompass your list. You will also need to justify and explain your selections. 2 Specifically, you must address the critical elements listed below. A. Using the manager’s questions and the evaluation criteria, identify relevant information from the organizational security plan material in the scenario to complete the blank column in the technology evaluation criteria table in the provided worksheet. B. Based on your assessment of the relevant information from the organizational security plan, provide a prioritized list of the three most essential evaluation criteria. Justify your rationale for determining the priority of your selected elements. C. Select two Fundamental Security Design Principles that best encompass the priority list. Explain the correlation between your priority list and the principles you identified. Rubric Guidelines for Submission: Download, fill out, and submit the Technology Evaluation Criteria Worksheet, which includes the technology evaluation criteria table, your prioritized list, and your chosen Fundamental Security Design Principles. Use a filename that includes the course code, the assignment title, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx.
Answered Same DayFeb 06, 2023

Answer To: CYB 220 Project Three Milestone Guidelines and Rubric Overview A critical skill for you to have as a...

Shubham answered on Feb 06 2023
40 Votes
CYB 220 Technology Evaluation Criteria Worksheet
For each section of this worksheet, fill in the empty cells with the required information.
Technology Evaluation Criteria Table
    Evaluation Factor
    Evaluation Cr
iteria
    Manager’s Questions—Aligned to Criteria
    Relevant Organizational Security Plan Information (From Scenario)
    Effectiveness
    Ability to identify network-connected systems
    1.a.
2.a.i.
    Organizational attributes include size, technology, resources, reputation, brand, and workforce diversity.
Accessing the networks, including security risks, privacy concerns and compliance
    
    Ability to discern operating systems of network-connected systems
    1.b.
2.a.ii.
    Some of the constraints are Budget constraints, Time constraints, Regulatory constraints, Technological constraints and Resource constraints
Highly concerned about the detailed information relating to assets that are critical to their operations, such as financial, intellectual property and customers.
    
    Ability to discern specific software applications based on their unique data flows
    1.a.
1.b.
2.a.iii.
2.a.v.
    Technology Infrastructure, Data Management and Cybersecurity Expertise
Resource Constraints, Legacy Systems, Technical Limitations, Lack of Awareness and Resistance to Change
The level of concern about the ability to defeat secure communications is generally high.
The level of concern about potential for harm is generally high.
    
    Ability to handle encrypted data flows
    1.b.
2.a.iii.
2.a.v.
    Technical Limitations, Inadequate Cybersecurity Expertise, Policies and Procedures, Resistance to Change and Resource Constraints
The level of concern about the ability to defeat secure communications is medium.
The level of concern about potential for harm is low.
    
    Reliability under stress
    1.b.
2.a.iv.
    Resource Constraints, Lack of Planning, Resistance to Change, Organizational Structure and Political or Economic Factors
The level of concern about potential about resilience is high
    
    Potential to cause individual network-connected system outage
    1.b.
2.a.iv.
2.a.v.
    Resource Constraints, Lack of...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here