CYB 250 Final Project Milestone Guidelines and Rubric Cyber Defense Paper Draft Overview When it comes to cyber defense, having a well-rounded toolbox of strategies is important. For this milestone...

1 answer below »
CYB 250 Final Project Milestone Guidelines and Rubric Cyber Defense Paper Draft Overview When it comes to cyber defense, having a well-rounded toolbox of strategies is important. For this milestone paper draft, you will be analyzing trends in personnel or human factors, data protection, and system protection. You will evaluate these trends as solutions using threat modeling, a skill you practiced in Modules Three and Four. This draft is an opportunity to begin work on your final project and receive feedback from your instructor before completing your project in Module Seven. Scenario For this final project, put yourself in the role of a security analyst who is performing an audit of your company. Your organization is a mid-sized manufacturing company that released its own smart headset. The headset has the ability to project important documents on an optical screen for the technicians in the field. The documents could be product schematics, invoices, emails, text messages, or any documents put in the shared drive on the server. The headset has constant communication with the server that resides in the central office; the connection is made through the technicians’ cell phones via the Bluetooth connection. Prompt Create your cyber defense paper draft by selecting your trends below and completing a threat model for each trend using what you learned in Stepping Stone One. Be sure to integrate your feedback on this assignment into your final, polished project submission in Module Seven. You must address the critical elements listed below. I. Personnel or human factor trend Select a personnel or human factor trend and discuss the following critical elements: A. Describe how the trend or strategy provides protection to an organization. B. Defend the trend as a credible solution based on your analysis of the threat model for the scenario. 1 II. Data protection strategy or technology trend Select a data protection strategy or technology and discuss the following critical elements: A. Describe how the strategy or technology provides protection to an organization. B. Defend the strategy or technology as a credible solution based on your analysis of the threat model for the scenario. III. System protection trend Select a technology in one of the following areas: ● Network protection technologies ● Endpoint/server protection technologies ● Software code protection strategies and technologies For your selected technology, discuss the following critical elements: A. Describe how the selected technology provides protection to an organization. B. Defend the technology as a credible solution based on your analysis of the threat model for the scenario. Final Project Milestone Rubric Guidelines for Submission: Your submission should be 2 to 3 pages in length (plus a cover page and references). Use double spacing, 12-point Times New Roman font, and one-inch margins. Any references should be cited according to APA style. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.
Answered Same DayJun 27, 2022

Answer To: CYB 250 Final Project Milestone Guidelines and Rubric Cyber Defense Paper Draft Overview When it...

Anjali answered on Jun 27 2022
11 Votes
CYB 250 Final Project Milestone Cyber Défense
Introduction
This assessment is all about proposing a solution for cyber defense that helps to protect the sen
sitive information of the mid-scale company that deals in the smart headset. By including the use of these strategies, the risks related to data
each and loss can be managed and, in this draft, the different solutions like network firewalls, and encryption are suggested as defense strategies to protect the inside and outside threats. Following are the details of the threat model that is developed to manage the high risks related to software bugs, external threat actions, and internal threat actors.
Threat modeling
There are different elements or critical assets of an organization that is required to make effective communication. The devices that are used to generate the emails, and invoices and store the data in a centralized location are prone to network attacks like denial-of-service attacks, phishing attacks, and ransomware(Creado & Ramteke, 2020). It is very necessary for an organization to manage and maintain critical assets like credentials, sensitive Emails, P2 data, Admin/developer workstation, datacentre, and credit card details. These critical assets are prone to threats like software vulnerabilities, infrastructure vulnerabilities, external threat actors, internal threat actors, and supplier threat actors. Therefore, it’s necessary for this company to develop a defense strategy that helps to preserve sensitive information(JOE, 2022).
How the trend or strategy provides protection to an...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here