CYB 250 Final Project Milestone Guidelines and Rubric Cyber Defense Paper Draft Overview When it comes to cyber defense, having a well-rounded toolbox of strategies is important. For this milestone...

1 answer below »
CYB 250 Final Project Milestone Guidelines and Rubric Cyber Defense Paper Draft Overview When it comes to cyber defense, having a well-rounded toolbox of strategies is important. For this milestone paper draft, you will be analyzing trends in personnel or human factors, data protection, and system protection. You will evaluate these trends as solutions using threat modeling, a skill you practiced in Modules Three and Four. This draft is an opportunity to begin work on your final project and receive feedback from your instructor before completing your project in Module Seven. Scenario For this final project, put yourself in the role of a security analyst who is performing an audit of your company. Your organization is a mid-sized manufacturing company that released its own smart headset. The headset has the ability to project important documents on an optical screen for the technicians in the field. The documents could be product schematics, invoices, emails, text messages, or any documents put in the shared drive on the server. The headset has constant communication with the server that resides in the central office; the connection is made through the technicians’ cell phones via the Bluetooth connection. Prompt Create your cyber defense paper draft by selecting your trends below and completing a threat model for each trend using what you learned in Stepping Stone One. Be sure to integrate your feedback on this assignment into your final, polished project submission in Module Seven. You must address the critical elements listed below. I. Personnel or human factor trend Select a personnel or human factor trend and discuss the following critical elements: A. Describe how the trend or strategy provides protection to an organization. B. Defend the trend as a credible solution based on your analysis of the threat model for the scenario. 1 II. Data protection strategy or technology trend Select a data protection strategy or technology and discuss the following critical elements: A. Describe how the strategy or technology provides protection to an organization. B. Defend the strategy or technology as a credible solution based on your analysis of the threat model for the scenario. III. System protection trend Select a technology in one of the following areas: ● Network protection technologies ● Endpoint/server protection technologies ● Software code protection strategies and technologies For your selected technology, discuss the following critical elements: A. Describe how the selected technology provides protection to an organization. B. Defend the technology as a credible solution based on your analysis of the threat model for the scenario.
Answered Same DayJun 07, 2022

Answer To: CYB 250 Final Project Milestone Guidelines and Rubric Cyber Defense Paper Draft Overview When it...

Naveen Kumar answered on Jun 07 2022
80 Votes
Network and End Point Protection                                6
Security Hardening Guide
Data protection & system protection
A. Describe how the trend or strategy provides protection to an organization.
A company’s IT network is the backbone of its business as it connects all its computers and related devices toge
ther, allowing staff to work more efficiently across the organization. With something so mission-critical it’s crucial it is designed and set up properly.
There are a number of details in network infrastructure design should show:
· A clear map of the network.
· The structure and layout of the cabling required.
· The quantity, type and location of all devices on the network.
· Your IP addressing structure.
· Details of your network security architecture and processes.
Elements of a Security Architecture:
· Authentication.
· Authorization.
· Data Integrity.
· Data Origin.
· Data Confidentiality.
· Network Availability.
· Audit.
B. Defend the trend as a credible solution based on your analysis of the threat model for the scenario.
Solution is Secure hardening the organization devices.
III. System protection trend Select a technology in one of the following areas:
Network protection technologies:
1. Event and Logs:
· Centralize Log Collection and Monitoring.
· Gain Traffic Visibility with Network Management System(NMS).
· Use memory threshold notifications.
· Use CPU thresholding notification.
· Enable different logging levels.
· Disable Logging to Monitor Sessions and the Console.
· Use Buffered Logging.
· Configure Logging Time Stamps.
· Configure Simple Network Management Protocol(SNMP).
· Use strong non-default community strings.
· Use SNMP Version 3.
· Logging best practices.
· Restrict hosts that are allowed to poll or receive traps.
2. Secure Control Management:
· Securing the Management Plane using different protocols.
· General Management Plane Hardening.
· Securing Management Sessions with different protocols.
· Use password management and complex password policy.
· Enable login password retry lockout.
· Enable ICMP Packet Filtering.
· Lock down serial console access with a complex password. (This will need to be done from the console port command line interface.)
· Do not use "admin", "administrator" or other popular administrator login names or passwords. Chose an administrator username that is non-standard and a complex password.
3. AAA:
Using Authentication, Authorization, and Accounting.
Protocols:
· TACACS+ Authentication
· RADIUS
· LDAP
4. Filtering and Restriction:
Filtering Transit traffic with transit ACLs.
· Layer 2 protocol information such as EtherTypes.
· Layer 3 protocol information such as ICMP, TCP, or UDP.
· Layer 3 header information such as source and destination IP addresses.
· Layer 4 header information such as source and destination TCP or UDP ports.
a. ACL configuration best practices
· The permit IP source any - destination any command is not...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here