CYB 250 Final Project Milestone Guidelines and Rubric Cyber Defense Paper Draft CYB 250 Final Project Milestone Guidelines and Rubric Cyber Defense Paper Draft Overview When it comes to cyber defense,...

1 answer below »
To complete this assignment, review the prompt and grading rubric in theFinal Project Milestone Guidelines and Rubric PDFdocument.


CYB 250 Final Project Milestone Guidelines and Rubric Cyber Defense Paper Draft CYB 250 Final Project Milestone Guidelines and Rubric Cyber Defense Paper Draft Overview When it comes to cyber defense, having a well-rounded toolbox of strategies is important. For this milestone paper draft, you will be analyzing trends in personnel or human factors, data protection, and system protection. You will evaluate these trends as solutions using threat modeling, a skill you practiced in Modules Three and Four. This draft is an opportunity to begin work on your final project and receive feedback from your instructor before completing your project in Module Seven. Scenario For this final project, put yourself in the role of a security analyst who is performing an audit of your company. Your organization is a mid-sized manufacturing company that released its own smart headset. The headset has the ability to project important documents on an optical screen for the technicians in the field. The documents could be product schematics, invoices, emails, text messages, or any documents put in the shared drive on the server. The headset has constant communication with the server that resides in the central office; the connection is made through the technicians’ cell phones via the Bluetooth connection. Prompt Create your cyber defense paper draft by selecting your trends below and completing a threat model for each trend using what you learned in Stepping Stone One. Be sure to integrate your feedback on this assignment into your final, polished project submission in Module Seven. You must address the critical elements listed below. I. Personnel or h uman factor trend Select a personnel or human factor trend and discuss the following critical elements: A. Describe how the trend or strategy provides protection to an organization. B. Defend the trend as a credible solution based on your analysis of the threat model for the scenario. 1 II. Data protection strategy or tech nology trend Select a data protection strategy or technology and discuss the following critical elements: A. Describe how the strategy or technology provides protection to an organization. B. Defend the strategy or technology as a credible solution based on your analysis of the threat model for the scenario. III. System p rotection trend Select a technology in one of the following areas: ● Network protection technologies ● Endpoint/server protection technologies ● Software code protection strategies and technologies For your selected t echnology, discuss the following critical elements: A. Describe how the selected technology provides protection to an organization. B. Defend the technology as a credible solution based on your analysis of the threat model for the scenario. Final Project Milestone Rubric Guidelines for Submission: Your submission should be 2 to 3 pages in length (plus a cover page and references). Use double spacing, 12-point Times New Roman font, and one-inch margins. Any references should be cited according to APA style. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx. Critical Elements Proficient (100%) Needs Improvement (70%) Not Evident (0%) Value Personnel or Human Factor Trend: Protection Describes how the trend or strategy provides protection to an organization Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 15 Personnel or Human Factor Trend: Credible Solution Defends the trend as a credible solution based on analysis of the threat model for the scenario Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 15 Data Protection Strategy or Technology: Protection Describes how the strategy or technology provides protection to an organization Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 15 2 Critical Elements Proficient (100%) Needs Improvement (70%) Not Evident (0%) Value Data Protection Strategy or Technology: Credible Solution Defends the strategy or technology as a credible solution based on analysis of the threat model for the scenario Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 15 System Protection: Protection Describes how the technology provides protection to an organization Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 15 System Protection: Credible Solution Defends the technology as a credible solution based on analysis of the threat model for the scenario Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 15 Articulation of Response Submission has no major errors related to citations, grammar, spelling, or organization Submission has some errors related to citations, grammar, spelling, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas 10 Total 100% 3 CYB 250 Final Project Milestone Guidelines and Rubric Cyber Defense Paper Draft Overview Scenario Prompt Final Project Milestone Rubric
Answered 3 days AfterFeb 09, 2022

Answer To: CYB 250 Final Project Milestone Guidelines and Rubric Cyber Defense Paper Draft CYB 250 Final...

Swapnil answered on Feb 12 2022
115 Votes
Personnel or Human Factor Trend:
Strategy for protecting an organization:
The following are the different ways to protecting a headset organi
zation:
· Securing the organization with the strong passwords and enabling the two factor authentication: Basically we can use the passwords that can gives the combination of capital and lower case letters, numbers and symbols and it’s better to avoiding the actual words and common sentences.
· Educating the teams for preventing the cyber-attacks: Always check for the emails and files which avoids the suspicious links. So that the teams can be prevents the cyber-attacks.
· Get your business for cyber-attacks essentials: Getting the cyber essentials certifies documents that can provide the security to the IT against the cyber-attacks.
· You can always update the management for your organization status: Basically you need to update the management of IT so it can always patch the latest software. It can incudes the information about the latest updates.
· Backup an important data of an organization to avoiding the business: You can always backup an important data of your organization which can include the business continuity and disaster recovery solution.
Data Protection Strategy or Technology Trend:
The following are the different ways to protecting the data strategy trend:
· Train your workforce: Organizations basically use the security awareness that can educate to...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here