CYB 220 Project One Guidelines and Rubric Overview One of the main projects for this course is the creation of a virtual systems and networking concept brief in which you will configure operating...

1 answer below »
To complete this assignment, review the prompt and grading rubric in theProject One Guidelines and Rubric PDFdocument. You will also need to access theInfoSecenvironment.


CYB 220 Project One Guidelines and Rubric Overview One of the main projects for this course is the creation of a virtual systems and networking concept brief in which you will configure operating systems in a simulated environment as a proof of concept before implementing changes in the live production environment. This work is often referred to as “sandboxing.” As a security analyst, you will be asked to install and configure new settings within a virtualized environment. The audience for this brief is the system administrator for a fictional organization at which you are employed. This brief will serve as the basis for a proposal that your manager will be creating to propose a new network configuration. You have also been asked to provide a level of justification around the basic concepts of virtual systems so that your system administrator can include that in a proposal to other organizational stakeholders. The project leverages the skills that you have built using tools in Modules Two and Three. The project will be submitted in Module Five. Access the GNS3 environment by navigating to the Project One - Virtual Systems and Networking Concept Brief lab. In this assignment, you will demonstrate your mastery of the following course competency:  CYB-220-01: Describe the basic concepts and uses of virtual systems and networks Scenario As a security analyst, you are tasked with creating a concept brief for your system administrator. This task includes creating multiple accounts, configuring network settings, and modifying group policies. To help you complete this task, your instructor will provide you with a scenario containing network configuration settings and group policy changes that you will need to implement. Additionally, you will be asked to describe the benefits and drawbacks of virtualization technology. Prompt Address the critical elements listed below. The codes shown in brackets indicate the course competency to which each critical element is aligned. Virtual Systems and Networking Concept Brief I. Using Virtual Systems A. Configure group policy settings to meet project specifications. Provide screenshots from the local group policy editor dialog box as evidence of each change. [CYB-220-01] B. Configure network resources to meet the network configuration settings. Provide a screenshot of each network setting configuration. [CYB-220-01] II. Conceptual Justification for Uses of Virtual Systems A. Describe the benefits of using virtualization technology in sandboxing. [CYB-220-01] B. Describe the drawbacks of using virtualization technology in sandboxing. [CYB-220-01] C. Describe a situation other than sandboxing where virtualization technology would be a valuable solution. [CYB-220-01] Project One Rubric Guidelines for Submission: Your submission should be 1 to 3 pages in length (in addition to screenshots). Use double spacing, 12-point Times New Roman font, and one-inch margins. Any sources you use should be cited according to APA style. Use a filename that includes the course code, the assignment title, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx. Critical Elements Exemplary Proficient Needs Improvement Not Evident Value Using Virtual Systems: Settings [CYB-220-01] Configures group policy settings to meet project specifications and provides screenshots from the local group policy editor dialog box as evidence of each change (100%) Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail (55%) Does not address critical element, or response is irrelevant (0%) 19 Using Virtual Systems: Network [CYB-220-01] Configures network resources to meet the network configuration settings and provides a screenshot of each network setting configuration (100%) Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail (55%) Does not address critical element, or response is irrelevant (0%) 19 Conceptual Justification for Uses of Virtual Systems: Benefits [CYB-220-01] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner (100%) Describes the benefits of using virtualization technology in sandboxing (85%) Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail (55%) Does not address critical element, or response is irrelevant (0%) 19 Conceptual Justification for Uses of Virtual Systems: Drawbacks [CYB-220-01] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner (100%) Describes the drawbacks of using virtualization technology in sandboxing (85%) Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail (55%) Does not address critical element, or response is irrelevant (0%) 19 Critical Elements Exemplary Proficient Needs Improvement Not Evident Value Conceptual Justification for Uses of Virtual Systems: Situation [CYB-220-01] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner (100%) Describes a situation other than sandboxing where virtualization technology would be a valuable solution (85%) Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail (55%) Does not address critical element, or response is irrelevant (0%) 19 Articulation of Response Submission is free of errors related to grammar, spelling, and organization and is presented in a professional and easy-to-read format (100%) Submission has no major errors related to grammar, spelling, or organization (85%) Submission has some errors related to grammar, spelling, or organization that negatively impact readability and articulation of main ideas (55%) Submission has critical errors related to grammar, spelling, or organization that prevent understanding of ideas (0%) 5 Total 100%
Answered 2 days AfterOct 01, 2021

Answer To: CYB 220 Project One Guidelines and Rubric Overview One of the main projects for this course is the...

Neha answered on Oct 03 2021
133 Votes
The sandbox can be defined as the isolated testing environment which allow the user to exit different programs or open the files without having its impact on the platform, system or the application on which they are running. The software developers use it for testing the new programming code. Without sandboxing the applications can have unlimited access to the data and system resources which are present on the network. They allow to have safe execution of the malicious code without harming host device, network, or the other connected devices. We can use a sandbox for detecting the malware and offers the additional layer to protect it against security threats and exploit which are using zero-day vulnerabilities.
The malware is becoming sophisticated, and it is becoming difficult to detect the malware. The sandbox helps to protect critical infrastructure of the organization from suspicious code because it is executed on a different system. It will allow the information technology team to test for the malicious code in isolated testing...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here