Chat with us, powered by LiveChat To complete this assignment, review the prompt and grading rubric in the Final Project Guidelines and Rubric. When you have finished your work, submit the as - Essayabode

To complete this assignment, review the prompt and grading rubric in the Final Project Guidelines and Rubric. When you have finished your work, submit the as

To complete this assignment, review the prompt and grading rubric in the Final Project Guidelines and Rubric. When you have finished your work, submit the assignment here for grading and instructor feedback.

CYB 250 Final Project Guidelines and Rubric

Overview

Threat modeling is an important skill set that a security analyst should have in their toolbox. Evalua�ng different models and being familiar with each model will come with �me. Integra�ng

the results of threat modeling with different types of network protec�ons can be challenging, as is evalua�ng and recommending different types of emerging technology integrated with

exis�ng technology. A security analyst needs to be able to think outside the box and integrate different models with the tasks at hand. A strong understanding of cryptography is valuable in

protec�ng data in mo�on and at rest.

The final project builds off skills you prac�ced in the Module Three and Module Four Stepping Stones. The project also incorporates one milestone, which will be submi�ed in Module Five.

The final project will be submi�ed in Module Seven. In this assignment, you will demonstrate your mastery of the following competencies:

Describe fundamental strategies of cyber defense

Describe the impact of emerging trends on security strategies

Compare and contrast different cryptographic techniques and select the appropriate solu�on for a given scenario

Scenario

For this final project, put yourself in the role of a security analyst who is performing an audit of your company. Your organiza�on is a mid-sized manufacturing company that released its own

smart headset. The headset has the ability to project important documents on an op�cal screen for the technicians in the field. The documents could be product schema�cs, invoices, emails,

text messages, or any documents put in the shared drive on the server. The headset has constant communica�on with the server that resides in the central office; the connec�on is made

through the technicians’ cell phones via the Bluetooth connec�on.

Prompt

Apply your experience using threat models to describe a par�cular a�ack, and your understanding of cryptography to write a Cyber Defense and Emerging Trends paper. Be sure to integrate

feedback from the Final Project Milestone into your submission.

You must address the cri�cal elements listed below. The codes shown in brackets indicate the competency to which each cri�cal element is aligned.

I. Personnel or Human Factor Trend

Select a personnel or human factor trend and discuss the following cri�cal elements:

A. Describe how the trend or strategy provides protec�on to an organiza�on.

B. Defend the trend as a credible solu�on based on your analysis of the threat model for the scenario.

C. Describe the security risks and rewards associated with the trend.



12/10/24, 10:24 AM Assignment Information

https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623167/View 1/5

D. Analyze how an emerging personnel or human factor trend is affec�ng the cybersecurity landscape. In your response, detail the impact this trend has on exis�ng security

strategies, technologies, or policies.

II. Data Protec�on Strategy or Technology

Select a data protec�on strategy or technology and discuss the following cri�cal elements:

A. Describe how the strategy or technology provides protec�on to an organiza�on.

B. Defend the strategy or technology as a credible solu�on based on your analysis of the threat model for the scenario.

C. Describe the security risks and rewards associated with the strategy or technology.

D. Describe how cryptographic techniques are used with this data protec�on strategy or technology to achieve security objec�ves.

E. Discuss the advantages and disadvantages of the encryp�on method used in the data protec�on strategy or technology.

F. Discuss the security concerns related to cryptographic techniques.

III. System Protec�on

Select a technology in one of the following areas:

Network protec�on technologies

Endpoint and server protec�on technologies

So�ware code protec�on strategies and technologies

For your selected technology, discuss the following cri�cal elements:

A. Describe how the selected technology provides protec�on to an organiza�on.

B. Defend the technology as a credible solu�on based on your analysis of the threat model for the scenario.

C. Describe the security risks and rewards associated with the technology.

D. Analyze how an emerging security technology is affec�ng the cybersecurity landscape. In your response, detail the impact this technology has on exis�ng security

strategies, technologies, or policies.

What to Submit

Your submission should be 5–7 pages in length (plus a cover page and references). Use double spacing, 12-point Times New Roman font, and one-inch margins. Any references should be

cited according to APA style. Use a file name that includes the course code, the assignment �tle, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.

12/10/24, 10:24 AM Assignment Information

https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623167/View 2/5

Final Project Rubric

Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value

Personnel or Human Factor

Trend: Protec�on

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Describes how the trend or

strategy provides protec�on to

an organiza�on

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

5

Personnel or Human Factor

Trend: Credible Solu�on

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Defends the trend as a credible

solu�on based on analysis of

the threat model for the

scenario

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

5

Personnel or Human Factor

Trend: Risks and Rewards

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Describes the security risks

and rewards associated with

the trend

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

6

Personnel or Human Factor

Trend: Emerging Trend

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Analyzes how an emerging

personnel or human factor

trend is affec�ng the

cybersecurity landscape.

Details the impact this trend

has on exis�ng security

strategies, technologies, or

policies.

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

6

Data Protec�on Strategy or

Technology: Protec�on

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Describes how the strategy or

technology provides protec�on

to an organiza�on

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

5

12/10/24, 10:24 AM Assignment Information

https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623167/View 3/5

Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value

Data Protec�on Strategy or

Technology: Credible

Solu�on

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Defends the strategy or

technology as a credible

solu�on based on analysis of

the threat model for the

scenario

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

5

Data Protec�on Strategy or

Technology: Risks and

Rewards

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Describes the security risks

and rewards associated with

the strategy or technology

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

6

Data Protec�on Strategy or

Technology: Cryptographic

Techniques

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Describes how cryptographic

techniques are used with this

data protec�on strategy or

technology to achieve security

objec�ves

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

10

Data Protec�on Strategy or

Technology: Advantages and

Disadvantages

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Discusses the advantages and

disadvantages of the

encryp�on method used in the

data protec�on strategy or

technology

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

10

Data Protec�on Strategy or

Technology: Security

Concerns

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Discusses the security

concerns related to

cryptographic techniques

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

10

System Protec�on:

Protec�on

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Describes how the selected

technology provides protec�on

to an organiza�on

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

5

12/10/24, 10:24 AM Assignment Information

https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623167/View 4/5

Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value

System Protec�on: Credible

Solu�on

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Defends the technology as a

credible solu�on based on

analysis of the threat model for

the scenario

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

5

System Protec�on: Risks

and Rewards

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Describes the security risks

and rewards associated with

the technology

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

6

System Protec�on:

Emerging Security

Technology

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Analyzes how an emerging

security technology is affec�ng

the cybersecurity landscape.

Details the impact this

technology has on exis�ng

security strategies,

technologies, or policies.

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

6

Ar�cula�on of Response Submission is free of errors

related to cita�ons, grammar,

spelling, and organiza�on and

is presented in a professional

and easy-to-read format

Submission has no major errors

related to cita�ons, grammar,

spelling, or organiza�on

Submission has some errors

related to cita�ons, grammar,

spelling, or organiza�on that

nega�vely impact readability

and ar�cula�on of main ideas

Submission has cri�cal errors

related to cita�ons, grammar,

spelling, or organiza�on that

prevent understanding of ideas

10

Total: 100%

12/10/24, 10:24 AM Assignment Information

https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623167/View 5/5

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?