11 Dec To complete this assignment, review the prompt and grading rubric in the Final Project Guidelines and Rubric. When you have finished your work, submit the as
To complete this assignment, review the prompt and grading rubric in the Final Project Guidelines and Rubric. When you have finished your work, submit the assignment here for grading and instructor feedback.
CYB 250 Final Project Guidelines and Rubric
Overview
Threat modeling is an important skill set that a security analyst should have in their toolbox. Evalua�ng different models and being familiar with each model will come with �me. Integra�ng
the results of threat modeling with different types of network protec�ons can be challenging, as is evalua�ng and recommending different types of emerging technology integrated with
exis�ng technology. A security analyst needs to be able to think outside the box and integrate different models with the tasks at hand. A strong understanding of cryptography is valuable in
protec�ng data in mo�on and at rest.
The final project builds off skills you prac�ced in the Module Three and Module Four Stepping Stones. The project also incorporates one milestone, which will be submi�ed in Module Five.
The final project will be submi�ed in Module Seven. In this assignment, you will demonstrate your mastery of the following competencies:
Describe fundamental strategies of cyber defense
Describe the impact of emerging trends on security strategies
Compare and contrast different cryptographic techniques and select the appropriate solu�on for a given scenario
Scenario
For this final project, put yourself in the role of a security analyst who is performing an audit of your company. Your organiza�on is a mid-sized manufacturing company that released its own
smart headset. The headset has the ability to project important documents on an op�cal screen for the technicians in the field. The documents could be product schema�cs, invoices, emails,
text messages, or any documents put in the shared drive on the server. The headset has constant communica�on with the server that resides in the central office; the connec�on is made
through the technicians’ cell phones via the Bluetooth connec�on.
Prompt
Apply your experience using threat models to describe a par�cular a�ack, and your understanding of cryptography to write a Cyber Defense and Emerging Trends paper. Be sure to integrate
feedback from the Final Project Milestone into your submission.
You must address the cri�cal elements listed below. The codes shown in brackets indicate the competency to which each cri�cal element is aligned.
I. Personnel or Human Factor Trend
Select a personnel or human factor trend and discuss the following cri�cal elements:
A. Describe how the trend or strategy provides protec�on to an organiza�on.
B. Defend the trend as a credible solu�on based on your analysis of the threat model for the scenario.
C. Describe the security risks and rewards associated with the trend.
12/10/24, 10:24 AM Assignment Information
https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623167/View 1/5
D. Analyze how an emerging personnel or human factor trend is affec�ng the cybersecurity landscape. In your response, detail the impact this trend has on exis�ng security
strategies, technologies, or policies.
II. Data Protec�on Strategy or Technology
Select a data protec�on strategy or technology and discuss the following cri�cal elements:
A. Describe how the strategy or technology provides protec�on to an organiza�on.
B. Defend the strategy or technology as a credible solu�on based on your analysis of the threat model for the scenario.
C. Describe the security risks and rewards associated with the strategy or technology.
D. Describe how cryptographic techniques are used with this data protec�on strategy or technology to achieve security objec�ves.
E. Discuss the advantages and disadvantages of the encryp�on method used in the data protec�on strategy or technology.
F. Discuss the security concerns related to cryptographic techniques.
III. System Protec�on
Select a technology in one of the following areas:
Network protec�on technologies
Endpoint and server protec�on technologies
So�ware code protec�on strategies and technologies
For your selected technology, discuss the following cri�cal elements:
A. Describe how the selected technology provides protec�on to an organiza�on.
B. Defend the technology as a credible solu�on based on your analysis of the threat model for the scenario.
C. Describe the security risks and rewards associated with the technology.
D. Analyze how an emerging security technology is affec�ng the cybersecurity landscape. In your response, detail the impact this technology has on exis�ng security
strategies, technologies, or policies.
What to Submit
Your submission should be 5–7 pages in length (plus a cover page and references). Use double spacing, 12-point Times New Roman font, and one-inch margins. Any references should be
cited according to APA style. Use a file name that includes the course code, the assignment �tle, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.
12/10/24, 10:24 AM Assignment Information
https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623167/View 2/5
Final Project Rubric
Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
Personnel or Human Factor
Trend: Protec�on
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Describes how the trend or
strategy provides protec�on to
an organiza�on
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
5
Personnel or Human Factor
Trend: Credible Solu�on
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Defends the trend as a credible
solu�on based on analysis of
the threat model for the
scenario
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
5
Personnel or Human Factor
Trend: Risks and Rewards
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Describes the security risks
and rewards associated with
the trend
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
6
Personnel or Human Factor
Trend: Emerging Trend
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Analyzes how an emerging
personnel or human factor
trend is affec�ng the
cybersecurity landscape.
Details the impact this trend
has on exis�ng security
strategies, technologies, or
policies.
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
6
Data Protec�on Strategy or
Technology: Protec�on
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Describes how the strategy or
technology provides protec�on
to an organiza�on
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
5
12/10/24, 10:24 AM Assignment Information
https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623167/View 3/5
Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
Data Protec�on Strategy or
Technology: Credible
Solu�on
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Defends the strategy or
technology as a credible
solu�on based on analysis of
the threat model for the
scenario
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
5
Data Protec�on Strategy or
Technology: Risks and
Rewards
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Describes the security risks
and rewards associated with
the strategy or technology
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
6
Data Protec�on Strategy or
Technology: Cryptographic
Techniques
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Describes how cryptographic
techniques are used with this
data protec�on strategy or
technology to achieve security
objec�ves
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
10
Data Protec�on Strategy or
Technology: Advantages and
Disadvantages
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Discusses the advantages and
disadvantages of the
encryp�on method used in the
data protec�on strategy or
technology
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
10
Data Protec�on Strategy or
Technology: Security
Concerns
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Discusses the security
concerns related to
cryptographic techniques
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
10
System Protec�on:
Protec�on
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Describes how the selected
technology provides protec�on
to an organiza�on
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
5
12/10/24, 10:24 AM Assignment Information
https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623167/View 4/5
Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
System Protec�on: Credible
Solu�on
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Defends the technology as a
credible solu�on based on
analysis of the threat model for
the scenario
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
5
System Protec�on: Risks
and Rewards
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Describes the security risks
and rewards associated with
the technology
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
6
System Protec�on:
Emerging Security
Technology
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Analyzes how an emerging
security technology is affec�ng
the cybersecurity landscape.
Details the impact this
technology has on exis�ng
security strategies,
technologies, or policies.
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
6
Ar�cula�on of Response Submission is free of errors
related to cita�ons, grammar,
spelling, and organiza�on and
is presented in a professional
and easy-to-read format
Submission has no major errors
related to cita�ons, grammar,
spelling, or organiza�on
Submission has some errors
related to cita�ons, grammar,
spelling, or organiza�on that
nega�vely impact readability
and ar�cula�on of main ideas
Submission has cri�cal errors
related to cita�ons, grammar,
spelling, or organiza�on that
prevent understanding of ideas
10
Total: 100%
12/10/24, 10:24 AM Assignment Information
https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623167/View 5/5
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.