Chat with us, powered by LiveChat To complete this assignment, review the prompt and grading rubric in the Module Four Stepping Stone Two Guidelines and Rubric. When you have finished your - Essayabode

To complete this assignment, review the prompt and grading rubric in the Module Four Stepping Stone Two Guidelines and Rubric. When you have finished your

To complete this assignment, review the prompt and grading rubric in the Module Four Stepping Stone Two Guidelines and Rubric. When you have finished your work, submit the assignment here for grading and instructor feedback.

CYB 250 Stepping Stone Two Guidelines and Rubric

Overview

In Module three, you were introduced to threat modeling. Prac�cing threat modeling develops a valuable skill. Therefore, in this exercise, you will review two lesser-known a�acks and

iden�fy the components of a threat model. This exercise is meant to expand your skill set in iden�fying events and threats while analyzing a�acks reported by other organiza�ons. If the

component of the threat model is not directly discernable, it is important that you use your previous knowledge and inference experience to try and iden�fy the component. Within the two

ar�cles linked in the Reading and Resources sec�on in Module Four of your course, you will find different uses of cryptography and man-in-the-middle a�acks. Analyzing cryptographic

techniques is an important skill that security analysts prac�ce to be�er understand data protec�on.

This ac�vity relates directly to the final project, where you will be required to complete a threat model for your project scenario and analyze cryptographic techniques. Take advantage of

feedback on this assignment to prepare you for your final project submission in Module Seven.

Prompt

Analyze the two ar�cles linked in the Reading and Resources sec�on in Module Four of your course. Use this informa�on to fill out the template and address the cri�cal elements listed

below.

I. Threat Modeling

A. To complete this assignment, first download the Module Four Stepping Stone Two Template course provided in the What to Submit sec�on. Iden�fy the elements of the threat

model by filling in the template for the case studies below.

i. Complete column for Bank A�acks thoroughly and accurately.

ii. Complete column for Bluetooth Bug thoroughly and accurately.

II. Cryptographic Techniques

A. Select one of the incidents from the table and analyze the following items:

i. Describe the cryptographic techniques employed by the organiza�on in the ar�cle.

ii. Describe how a man-in-the-middle a�ack compromised the cryptographic technique iden�fied above.

iii. Describe techniques that could have been used to prevent the man-in-the-middle a�ack from your selected ar�cle.



11/20/24, 10:23 AM Assignment Information

https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623163/View 1/3

What to Submit

Use the Module Four Stepping Stone Two Template to prepare your submission. Your submission should be 2 to 3 pages in length including the table. Use double spacing, 12-point Times

New Roman font, and one-inch margins. All sources must be cited using APA format. Use a file name that includes the course code, the assignment �tle, and your name—for example,

CYB_123_Assignment_Firstname_Lastname.docx.

Module Four Stepping Stone Two Rubric

Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value

Threat Modeling: Bank

A�acks

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Completes column for Bank

A�acks thoroughly and

accurately

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

18

Threat Modeling: Bluetooth

Bug

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Completes column for

Bluetooth Bug thoroughly and

accurately

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

18

Cryptographic Techniques:

Techniques Employed

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Describes the cryptographic

techniques employed by the

organiza�on in the ar�cle

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

18

Cryptographic Techniques:

Man-in-the-Middle A�ack

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Describes how a man-in-the-

middle a�ack compromised the

cryptographic technique

iden�fied above

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

18

Cryptographic Techniques:

Prevent

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Describes techniques that

could have been used to

prevent the man-in-the-middle

a�ack from the selected ar�cle

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

18

11/20/24, 10:23 AM Assignment Information

https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623163/View 2/3

Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value

Ar�cula�on of Response Submission is free of errors

related to cita�ons, grammar,

spelling, and organiza�on and

is presented in a professional

and easy-to-read format

Submission has no major errors

related to cita�ons, grammar,

spelling, or organiza�on

Submission has some errors

related to cita�ons, grammar,

spelling, or organiza�on that

nega�vely impact readability

and ar�cula�on of main ideas

Submission has cri�cal errors

related to cita�ons, grammar,

spelling, or organiza�on that

prevent understanding of ideas

10

Total: 100%

11/20/24, 10:23 AM Assignment Information

https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623163/View 3/3

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?