Cyber Defense and Emerging Trends Paper

Cyber Defense and Emerging Trends Paper
Overview
Threat modeling is an important skill set that a security analyst should have in his or her toolbox. Evaluating different models and
being familiar with each model will come with time. The Howard model is an excellent example of how to evaluate threats and the
different components that make up a threat. Integrating the results of threat modeling with different types of network protections
can be challenging, as is evaluating and recommending different types of emerging technology integrated with existing technology.
A security analyst needs to be able to think outside the box and integrate different models with tasks at hand. A strong
understanding of cryptography is a valuable skill in protecting data in motion and at rest.
The final project builds off of skills you practiced in the Module Three and Module Four Stepping Stones. The project also
incorporates one milestone, which will be submitted in Module Five. The final project will be submitted in Module Seven.
In this assignment, you will demonstrate your mastery of the following competencies:
 CYB-250-01: Describe fundamental strategies of cyber defense
 CYB-250-02: Describe the impact of emerging trends on security strategies
 CYB-250-03: Compare and contrast different cryptographic techniques and select the appropriate solution for a given
scenario
Scenario
For this final project, put yourself in the role of a security analyst who is performing an audit of your company. Your organization is a
mid-sized manufacturing company that released its own smart headset. The headset has the ability to project important documents
on an optical screen for the technicians in the field. The documents could be product schematics, invoices, emails, text messages, or

any documents put in the shared drive on the server. The headset has constant communication with the server that resides in the
central office; the connection is made through the technicians’ cell phones via the Bluetooth connection.
Prompt
Apply your experience using threat models to describe a particular attack, and your understanding of cryptography to write a Cyber
Defense and Emerging Trends paper. Be sure to integrate feedback from the Final Project Milestone into your submission.
You must address the critical elements listed below. The codes shown in brackets indicate the competency to which each critical
element is aligned.
I. Personnel or Human Factor Trend
Select a personnel or human factor trend and discuss the following critical elements:
A. Describe how the trend or strategy provides protection to an organization. [CYB-250-01]
B. Defend the trend as a credible solution based on your analysis of the threat model for the scenario. [CYB-250-01]
C. Describe the security risks and rewards associated with the trend. [CYB-250-02]
D. Analyze how an emerging personnel or human factor trend is affecting the cybersecurity landscape. In your response,
detail the impact this trend has on existing security strategies, technologies, or policies. [CYB-250-02]
II. Data Protection Strategy or Technology
Select a data protection strategy or technology and discuss the following critical elements:
A. Describe how the strategy or technology provides protection to an organization. [CYB-250-01]
B. Defend the strategy or technology as a credible solution based on your analysis of the threat model for the scenario.
[CYB-250-01]
C. Describe the security risks and rewards associated with the strategy or technology. [CYB-250-02]
D. Describe how cryptographic techniques are used with this data protection strategy or technology to achieve security
objectives. [CYB-250-03]
2

Get Your Custom Essay Written From Scratch
Are You Overwhelmed With Writing Assignments?
Give yourself a break and turn to our top writers. They’ll follow all the requirements to compose a premium-quality piece for you.
Order Now

 

 

 

 

 

E. Discuss the advantages and disadvantages of the encryption method used in the data protection strategy or
technology. [CYB-250-03]
F. Discuss the security concerns related to cryptographic techniques. [CYB-250-03]
III. System Protection
Select a technology in one of the following areas:
 Network protection technologies
 Endpoint/server protection technologies
 Software code protection strategies and technologies
For your selected technology, discuss the following critical elements:
A. Describe how the selected technology provides protection to an organization. [CYB-250-01]
B. Defend the technology as a credible solution based on your analysis of the threat model for the scenario.
[CYB-250-01]
C. Describe the security risks and rewards associated with the technology. [CYB-250-02]
D. Analyze how an emerging security technology is affecting the cybersecurity landscape. In your response, detail the
impact this technology has on existing security strategies, technologies, or policies. [CYB-250-02]
Key Deliverables
Deliverable Module Due Grading
Stepping Stone One Three Stepping Stone One Rubric
Stepping Stone Two Four Stepping Stone Two Rubric
Final Project Milestone Five Final Project Milestone Rubric
Final Project Seven Final Project Rubric
3

 

Final Project Rubric
Guidelines for Submission: Your submission should be 5–7 pages in length (plus a cover page and references). Use double spacing,
12-point Times New Roman font, and one-inch margins. Any references should be cited according to APA style. Use a file name that
includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.
Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
Personnel or
Human Factor
Trend:
Protection
[CYB-250-01]
Meets “Proficient” criteria
and addresses critical
element in an exceptionally
clear, insightful,
sophisticated, or creative
manner
Describes how the trend or
strategy provides
protection to an
organization
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address critical
element, or response is
irrelevant
5
Personnel or
Human Factor
Trend:
Credible Solution
[CYB-250-01]
Meets “Proficient” criteria
and addresses critical
element in an exceptionally
clear, insightful,
sophisticated, or creative
manner
Defends the trend as a
credible solution based on
analysis of the threat
model for the scenario
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address critical
element, or response is
irrelevant
5
Personnel or
Human Factor
Trend:
Risks and Rewards
[CYB-250-02]
Meets “Proficient” criteria
and addresses critical
element in an exceptionally
clear, insightful,
sophisticated, or creative
manner
Describes the security risks
and rewards associated
with the trend
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address critical
element, or response is
irrelevant
6
4
Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
Personnel or
Human Factor
Trend:
Emerging Trend
[CYB-250-02]
Meets “Proficient” criteria
and addresses critical
element in an exceptionally
clear, insightful,
sophisticated, or creative
manner
Analyzes how an emerging
personnel or human factor
trend is affecting the
cybersecurity landscape.
Details the impact this
trend has on existing
security strategies,
technologies, or policies.
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address critical
element, or response is
irrelevant
6
Data Protection
Strategy or
Technology:
Protection
[CYB-250-01]
Meets “Proficient” criteria
and addresses critical
element in an exceptionally
clear, insightful,
sophisticated, or creative
manner
Describes how the strategy
or technology provides
protection to an
organization
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address critical
element, or response is
irrelevant
5
Data Protection
Strategy or
Technology:
Credible Solution
[CYB-250-01]
Meets “Proficient” criteria
and addresses critical
element in an exceptionally
clear, insightful,
sophisticated, or creative
manner
Defends the strategy or
technology as a credible
solution based on analysis
of the threat model for the
scenario
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address critical
element, or response is
irrelevant
5
Data Protection
Strategy or
Technology:
Risks and Rewards
[CYB-250-02]
Meets “Proficient” criteria
and addresses critical
element in an exceptionally
clear, insightful,
sophisticated, or creative
manner
Describes the security risks
and rewards associated
with the strategy or
technology
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address critical
element, or response is
irrelevant
6
5

Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
Data Protection
Strategy or
Technology:
Cryptographic
Techniques
[CYB-250-03]
Meets “Proficient” criteria
and addresses critical
element in an exceptionally
clear, insightful,
sophisticated, or creative
manner
Describes how
cryptographic techniques
are used with this data
protection strategy or
technology to achieve
security objectives
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address critical
element, or response is
irrelevant
10
Data Protection
Strategy or
Technology:
Advantages and
Disadvantages
[CYB-250-03]
Meets “Proficient” criteria
and addresses critical
element in an exceptionally
clear, insightful,
sophisticated, or creative
manner
Discusses the advantages
and disadvantages of the
encryption method used in
the data protection
strategy or technology
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address critical
element, or response is
irrelevant
10
Data Protection
Strategy or
Technology:
Security Concerns
[CYB-250-03]
Meets “Proficient” criteria
and addresses critical
element in an exceptionally
clear, insightful,
sophisticated, or creative
manner
Discusses the security
concerns related to
cryptographic techniques
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address critical
element, or response is
irrelevant
10
System
Protection:
Protection
[CYB-250-01]
Meets “Proficient” criteria
and addresses critical
element in an exceptionally
clear, insightful,
sophisticated, or creative
manner
Describes how the selected
technology provides
protection to an
organization
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address critical
element, or response is
irrelevant
5
System
Protection:
Credible Solution
[CYB-250-01]
Meets “Proficient” criteria
and addresses critical
element in an exceptionally
clear, insightful,
sophisticated, or creative
manner
Defends the technology as
a credible solution based
on analysis of the threat
model for the scenario
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address critical
element, or response is
irrelevant
5
6
Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
System
Protection:
Risks and Rewards
[CYB-250-02]
Meets “Proficient” criteria
and addresses critical
element in an exceptionally
clear, insightful,
sophisticated, or creative
manner
Describes the security risks
and rewards associated
with the technology
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address critical
element, or response is
irrelevant
6
System
Protection:
Emerging Security
Technology
[CYB-250-02]
Meets “Proficient” criteria
and addresses critical
element in an exceptionally
clear, insightful,
sophisticated, or creative
manner
Analyzes how an emerging
security technology is
affecting the cybersecurity
landscape. Details the
impact this technology has
on existing security
strategies, technologies, or
policies.
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address critical
element, or response is
irrelevant
6
Articulation of
Response
Submission is free of errors
related to citations,
grammar, spelling, and
organization and is
presented in a professional
and easy-to-read format
Submission has no major
errors related to citations,
grammar, spelling, or
organization
Submission has some errors
related to citations, grammar,
spelling, or organization that
negatively impact readability
and articulation of main ideas
Submission has critical
errors related to citations,
grammar, spelling, or
organization that prevent
understanding of ideas
10
Total 100%
7