CYB 250 Final Project Guidelines and Rubric Cyber Defense and Emerging Trends Paper Overview Threat modeling is an important skill set that a security analyst should have in his or her toolbox....

1 answer below »
CYB 250 Final Project Guidelines and Rubric Cyber Defense and Emerging Trends Paper Overview Threat modeling is an important skill set that a security analyst should have in his or her toolbox. Evaluating different models and being familiar with each model will come with time. The Howard model is an excellent example of how to evaluate threats and the different components that make up a threat. Integrating the results of threat modeling with different types of network protections can be challenging, as is evaluating and recommending different types of emerging technology integrated with existing technology. A security analyst needs to be able to think outside the box and integrate different models with tasks at hand. A strong understanding of cryptography is a valuable skill in protecting data in motion and at rest. The final project builds off of skills you practiced in the Module Three and Module Four Stepping Stones. The project also incorporates one milestone, which will be submitted in Module Five. The final project will be submitted in Module Seven. In this assignment, you will demonstrate your mastery of the following competencies:  CYB-250-01: Describe fundamental strategies of cyber defense  CYB-250-02: Describe the impact of emerging trends on security strategies  CYB-250-03: Compare and contrast different cryptographic techniques and select the appropriate solution for a given scenario Scenario For this final project, put yourself in the role of a security analyst who is performing an audit of your company. Your organization is a mid-sized manufacturing company that released its own smart headset. The headset has the ability to project important documents on an optical screen for the technicians in the field. The documents could be product schematics, invoices, emails, text messages, or 1 any documents put in the shared drive on the server. The headset has constant communication with the server that resides in the central office; the connection is made through the technicians’ cell phones via the Bluetooth connection. Prompt Apply your experience using threat models to describe a particular attack, and your understanding of cryptography to write a Cyber Defense and Emerging Trends paper. Be sure to integrate feedback from the Final Project Milestone into your submission. You must address the critical elements listed below. The codes shown in brackets indicate the competency to which each critical element is aligned. I. Personnel or Human Factor Trend Select a personnel or human factor trend and discuss the following critical elements: A. Describe how the trend or strategy provides protection to an organization. [CYB-250-01] B. Defend the trend as a credible solution based on your analysis of the threat model for the scenario. [CYB-250-01] C. Describe the security risks and rewards associated with the trend. [CYB-250-02] D. Analyze how an emerging personnel or human factor trend is affecting the cybersecurity landscape. In your response, detail the impact this trend has on existing security strategies, technologies, or policies. [CYB-250-02] II. Data Protection Strategy or Technology Select a data protection strategy or technology and discuss the following critical elements: A. Describe how the strategy or technology provides protection to an organization. [CYB-250-01] B. Defend the strategy or technology as a credible solution based on your analysis of the threat model for the scenario. [CYB-250-01] C. Describe the security risks and rewards associated with the strategy or technology. [CYB-250-02] D. Describe how cryptographic techniques are used with this data protection strategy or technology to achieve security objectives. [CYB-250-03] 2 E. Discuss the advantages and disadvantages of the encryption method used in the data protection strategy or technology. [CYB-250-03] F. Discuss the security concerns related to cryptographic techniques. [CYB-250-03] III. System Protection Select a technology in one of the following areas:  Network protection technologies  Endpoint/server protection technologies  Software code protection strategies and technologies For your selected technology, discuss the following critical elements: A. Describe how the selected technology provides protection to an organization. [CYB-250-01] B. Defend the technology as a credible solution based on your analysis of the threat model for the scenario. [CYB-250-01] C. Describe the security risks and rewards associated with the technology. [CYB-250-02] D. Analyze how an emerging security technology is affecting the cybersecurity landscape. In your response, detail the impact this technology has on existing security strategies, technologies, or policies. [CYB-250-02] Key Deliverables Deliverable Module Due Grading Stepping Stone One Three Stepping Stone One Rubric Stepping Stone Two Four Stepping Stone Two Rubric Final Project Milestone Five Final Project Milestone Rubric Final Project Seven Final Project Rubric
Answered Same DayJun 13, 2022

Answer To: CYB 250 Final Project Guidelines and Rubric Cyber Defense and Emerging Trends Paper Overview Threat...

Aditi answered on Jun 13 2022
96 Votes
Cyber Defense Trends
Personnel or Human factors in cybersecurity are activities taken when human errors cause a data leak. Hackers found a human-made weak link. Human errors account for 24% of cybersecurity issues, behind only Phishing/Malware (31%).
Social engineering education is part of hu
man factor protection methods. It is the use of media to obtain confidential information. Spear phishing teaches staff about social engineering. Which phishing type has fewer victims but greater success? Highly customized mails can be easily delivered to a small group of potential victims to trick them through familiarity.
A hacker uses reverse social engineering to infiltrate network of companies and can easily claim to have unrevealed the hack's source. If his help is accepted, he will gain system access. Friendly Hacker targets internet and email accounts. A hacker will try to access PDFs, movies, and other items.
To justify the human component to a security analyst assessing a mid-size manufacturer entering the smart headset industry reinforces its message. Smart technology headsets can project crucial papers into an optical screen, causing human factor deficiencies.
Human aspects security concerns are challenging. Human error causes 52% of data and security breaches. A victim of spear phishing helped hack the DNC, Snapchat, and the healthcare industry last year. Unknowingly, employees may breach security. Homework raises employees' vulnerability to exploitation. These hazards have lately come to light due to government imposition of quarantine limitations. Nevertheless, they are also part of a bigger transition as organizations embrace digitization and new working practices. Elements of the human security include not repeating mistakes and anticipating attacks.
Here are some examples of rising human factor trends. Increased automotive hacking. In 2021, automobile hacking will rise. Modern vehicles have automated software for cruise control, engine timing, door locks, airbags, and driver support systems. These vehicles connect using Bluetooth and Wi-Fi, exposing them to attacks and weaknesses. Cybersecurity, AI This technology, along with machine learning, has significantly changed cybersecurity. AI has helped in order to build an automated defense system, NLP, facial detection and even help in danger detection. Threat detection systems enabled by AI can depict new assaults and promptly guide the administrators of any data breach. Also, Mobile banking malware attacks are up 50% in 2019, making our handheld devices a target. Cloud computing is risky. As more companies go to the cloud, data leaks must be monitored and updated. Google or Microsoft cloud apps are well-secured, but user errors, malicious software, and phishing assaults are widespread. The data breaches, IoT along with 5G networks, the automation and integration, targeted ransomware, state-sponsored cyberwarfare, and insider threats are the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here