1 CYB 220 Project Three Guidelines and Rubric Overview Sound guidance in selecting technologies that ensure compliance with organizational security requirements is a key contribution that a...

1 answer below »
Assignment


1 CYB 220 Project Three Guidelines and Rubric Overview Sound guidance in selecting technologies that ensure compliance with organizational security requirements is a key contribution that a cybersecurity practitioner provides to their organization. The ability to balance technical effectiveness against business considerations such as cost, implementation time, and the impacts on staffing, end-users, and infrastructure is a key skill. For this project (due in Module Seven), you will be writing an evaluation of network protection technologies to your manager. This evaluation requires you to assess multiple technology options by weighing criteria associated with cost and effectiveness and then recommending a solution that satisfies the given requirements. In addition, your recommendation should be guided by a fundamental security design principle you select as a basis for your recommendation. In this assignment, you will demonstrate your mastery of the following course competency:  CYB-220-02: Describe the fundamental principles and practices of intrusion detection and prevention Scenario Your instructor has provided you with the specific scenario for this project as part of the Project Three Milestone. The scenario provided you with the beginning of a security plan that documents areas of relevance to your evaluation that you need for decision making in your project. Additionally, a fellow analyst has completed an evaluation of network protection technologies, specifically intrusion detection systems (IDSs) and intrusion prevention systems (IPSs), to help you with your decision-making process. Your manager has reviewed the evaluation, based on effectiveness and cost, and has verified its accuracy. Based on your analysis of the technology evaluation and the details provided in the scenario, recommend a network protection system for implementation. Prompt You must address the critical elements listed below. The codes shown in brackets indicate the course competency to which each critical element is aligned. A. Explain how you are employing one of the Fundamental Security Design Principles to inform your recommendation. [CYB-220-02] B. Justify a recommended network protection approach. Describe how you balanced effectiveness, cost, and technical capabilities to select the network protection technology. [CYB-220-02] C. Recommend resources (e.g., organizational assets, workforce allocation, policies/procedures, hardware) that are necessary for implementing or monitoring your chosen network protection approach. These resources should optimize the technology or maximize organizational resources. Explain your recommendation using an adversarial mindset or systems thinking approach. [CYB-220-02] 2 Project Three Rubric Guidelines for Submission: Your evaluation of network protection technologies should be 2 to 3 pages in length (plus a cover page and references) and must be written in APA format. Use double spacing, 12-point Times New Roman font, and one-inch margins. Use a filename that includes the course code, the assignment title, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx. Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value Employing a Fundamental Security Design Principle [CYB-220-02] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Explains how one of the Fundamental Security Design Principles is employed to inform the recommendation Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 31 Recommended Network Protection Approach [CYB-220-02] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Justifies a recommended network protection approach that includes a description of how effectiveness, cost, and technical capabilities were balanced Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 31 Resource Recommendations [CYB-220-02] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Recommends resources that are necessary for implementing or monitoring the chosen network protection approach to optimize the technology or maximize organizational resources, including how using an adversarial mindset or systems thinking approach influenced the recommendation Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 31 Articulation of Response Submission is free of errors related to citations, grammar, spelling, and organization and is presented in a professional and easy-to-read format Submission has no major errors related to citations, grammar, spelling, or organization Submission has some errors related to citations, grammar, spelling, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas 7 Total 100% CYB 220 Project Two Scenario One You work at an information technology consulting firm, Byte Sized Solutions, as a network administrator. Your firm has been hired as a consultant for a land surveying company, GeoResults. Your team has created a plan to suit the company’s needs and has provided you with the project specifications to implement. GeoResults has a contract to survey land and soil samples for eight months. The company will need a kiosk at its work site that connects to the internal GeoResults network. The FTP server is intended to be used for file storage for field-uploaded files. You are tasked with creating a proof of concept to make sure your solutions are appropriate. Project Specifications A. Ensure the admin network is the only network that can communicate with the FTP server. B. The users below should be added to the FTP server and should have the permissions listed. User Password Permissions jsmith PassW0rd User should be able to read and list content. bjones Password1234 User should be able to read and list content. admin01 Pa$$w0rD1234 Admin should be able to read/write, delete, rename, and list. C. All web traffic originating from the kiosk on port 80 needs to be pointed to the web server.
Answered 1 days AfterOct 21, 2021

Answer To: 1 CYB 220 Project Three Guidelines and Rubric Overview Sound guidance in selecting technologies that...

Neha answered on Oct 22 2021
125 Votes
Fundamental Security Design Principle
For the security of the network we can use the technique to assign priv
ileges to the users. With this security principle it states that whenever the user is trying to get access of the system then the access will not be granted on the basis of single condition or the attribute. There needs to be have multiple conditions, attribute all the situations which will be verified to grant access for the system. This is also used as the multi factor user authentication as the principle states that the multiple techniques can be used for authenticating the user. For example, when we are conducting the online transfer, we need user ID, transaction password and the password of the user along with the one-time password. In contrast if we talk about the least set of the privileges which needs to be assigned to every role and it is essential to perform the functions.
Network Protection Approach
It can be a complicated business if we are trying to handle the security for the sizable UN segmented network. It will also have tasks like defining the firewall policies...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here