CYB 250 Final Project Guidelines and Rubric Cyber Defense and Emerging Trends Paper CYB 250 Final Project Guidelines and Rubric Cyber Defense and Emerging Trends Paper Overview Threat modeling is an...

1 answer below »
Hi please see attached. I would like the same expert who did assignment 100408 as this is related to that assignment. Thanks. Deadline is 2/23/22


CYB 250 Final Project Guidelines and Rubric Cyber Defense and Emerging Trends Paper CYB 250 Final Project Guidelines and Rubric Cyber Defense and Emerging Trends Paper Overview Threat modeling is an important skill set that a security analyst should have in his or her toolbox. Evaluating different models and being familiar with each model will come with time. The Howard model is an excellent example of how to evaluate threats and the different components that make up a threat. Integrating the results of threat modeling with different types of network protections can be challenging, as is evaluating and recommending different types of emerging technology integrated with existing technology. A security analyst needs to be able to think outside the box and integrate different models with tasks at hand. A strong understanding of cryptography is a valuable skill in protecting data in motion and at rest. The final project builds off of skills you practiced in the Module Three and Module Four Stepping Stones. The project also incorporates one milestone, which will be submitted in Module Five. The final project will be submitted in Module Seven. In this assignment, you will demonstrate your mastery of the following competencies:  CYB-250-01: Describe fundamental strategies of cyber defense  CYB-250-02: Describe the impact of emerging trends on security strategies  CYB-250-03: Compare and contrast different cryptographic techniques and select the appropriate solution for a given scenario Scenario For this final project, put yourself in the role of a security analyst who is performing an audit of your company. Your organization is a mid-sized manufacturing company that released its own smart headset. The headset has the ability to project important documents on an optical screen for the technicians in the field. The documents could be product schematics, invoices, emails, text messages, or 1 any documents put in the shared drive on the server. The headset has constant communication with the server that resides in the central office; the connection is made through the technicians’ cell phones via the Bluetooth connection. Prompt Apply your experience using threat models to describe a particular attack, and your understanding of cryptography to write a Cyber Defense and Emerging Trends paper. Be sure to integrate feedback from the Final Project Milestone into your submission. You must address the critical elements listed below. The codes shown in brackets indicate the competency to which each critical element is aligned. I. Personnel or Human Factor Trend Select a personnel or human factor trend and discuss the following critical elements: A. Describe how the trend or strategy provides protection to an organization. [CYB-250-01] B. Defend the trend as a credible solution based on your analysis of the threat model for the scenario. [CYB-250-01] C. Describe the security risks and rewards associated with the trend. [CYB-250-02] D. Analyze how an emerging personnel or human factor trend is affecting the cybersecurity landscape. In your response, detail the impact this trend has on existing security strategies, technologies, or policies. [CYB-250-02] II. Data Protection Strategy or Technology Select a data protection strategy or technology and discuss the following critical elements: A. Describe how the strategy or technology provides protection to an organization. [CYB-250-01] B. Defend the strategy or technology as a credible solution based on your analysis of the threat model for the scenario. [CYB-250-01] C. Describe the security risks and rewards associated with the strategy or technology. [CYB-250-02] D. Describe how cryptographic techniques are used with this data protection strategy or technology to achieve security objectives. [CYB-250-03] 2 E. Discuss the advantages and disadvantages of the encryption method used in the data protection strategy or technology. [CYB-250-03] F. Discuss the security concerns related to cryptographic techniques. [CYB-250-03] III. System Protection Select a technology in one of the following areas:  Network protection technologies  Endpoint/server protection technologies  Software code protection strategies and technologies For your selected technology, discuss the following critical elements: A. Describe how the selected technology provides protection to an organization. [CYB-250-01] B. Defend the technology as a credible solution based on your analysis of the threat model for the scenario. [CYB-250-01] C. Describe the security risks and rewards associated with the technology. [CYB-250-02] D. Analyze how an emerging security technology is affecting the cybersecurity landscape. In your response, detail the impact this technology has on existing security strategies, technologies, or policies. [CYB-250-02] Key Deliverables Deliverable Module Due Grading Stepping Stone One Three Stepping Stone One Rubric Stepping Stone Two Four Stepping Stone Two Rubric Final Project Milestone Five Final Project Milestone Rubric Final Project Seven Final Project Rubric 3 Final Project Rubric Guidelines for Submission: Your submission should be 5–7 pages in length (plus a cover page and references). Use double spacing, 12-point Times New Roman font, and one-inch margins. Any references should be cited according to APA style. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx. Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value Personnel or Human Factor Trend: Protection [CYB-250-01] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Describes how the trend or strategy provides protection to an organization Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 5 Personnel or Human Factor Trend: Credible Solution [CYB-250-01] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Defends the trend as a credible solution based on analysis of the threat model for the scenario Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 5 Personnel or Human Factor Trend: Risks and Rewards [CYB-250-02] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Describes the security risks and rewards associated with the trend Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 6 4 Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value Personnel or Human Factor Trend: Emerging Trend [CYB-250-02] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Analyzes how an emerging personnel or human factor trend is affecting the cybersecurity landscape. Details the impact this trend has on existing security strategies, technologies, or policies. Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 6 Data Protection Strategy or Technology: Protection [CYB-250-01] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Describes how the strategy or technology provides protection to an organization Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 5 Data Protection Strategy or Technology: Credible Solution [CYB-250-01] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Defends the strategy or technology as a credible solution based on analysis of the threat model for the scenario Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 5 Data Protection Strategy or Technology: Risks and Rewards [CYB-250-02] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Describes the security risks and rewards associated with the strategy or technology Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 6 5 Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value Data Protection Strategy or Technology: Cryptographic Techniques [CYB-250-03] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Describes how cryptographic techniques are used with this data protection strategy or technology to achieve security objectives Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 10 Data Protection Strategy or Technology: Advantages and Disadvantages [CYB-250-03] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Discusses the advantages and disadvantages
Answered 8 days AfterFeb 18, 2022

Answer To: CYB 250 Final Project Guidelines and Rubric Cyber Defense and Emerging Trends Paper CYB 250 Final...

Neha answered on Feb 24 2022
103 Votes
A. Introducing a new technology is always a great experience, however the new technology can bring problems into an organization. With the creation of the smart headset employees can project important documents on an optical screen for the technicians in the field. This new technology gives mobility to the user by freeing their hands so they can multitask. Documents such as schematics, emails, text messages, or any document that can accessed through the server.
B. Human factors are always the weakest link in securing a network. Human errors are mostly contributed to lack of training. There must be mandatory training provided to all employees. The training should provide a clear understanding of the risk of using the new technology. Employees will need to know how to protect the assets of the company and prevent the unauthorized access by hackers. It is imperative that all employees know how to secure the device from hackers.
C. It can result in creating risk for the employees if they do not have proper understanding of the new technology. It is important for the employees to understand and know how they will be able to protect their asset with the help of this technology otherwise it will work negatively for them.
D. These applications are providing the critical data which can be used to fight against any issues in the organization. They can be used by the employees to project the important documents over the optical screen. But it has major issues with the security, privacy, equity and interoperability of the organization.
Data Protection Strategy or Technology Trend
A. This new technology is able to provide the security for the organization and all the related customers. The organization does not need to rely over the hand written information about all the customers as it will be projected over the interactive board through which the users can view and edit it. All the information regarding customers will be sent to the phone and it will be stored at the secure location. The smart headset will be linked with the Servers using virtual private network and these servers will be located at the main office. It is important to train each and every employee regularly to and have proper understanding of using the virtual private network. It will help the employees to protect the data which is transferred between the offices and multiple users in the organization.
B. The technology is great for the security of the company. Training will need to be provided to all employees on the procedures of...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here