Include a brief discussion of how your selected technology
Project 6 Start Here
As a cybersecurity professional, it is important for you to not only understand the organizational and national human and technical factors, but because you will encounter international threats and concerns, it’s also important to be able to recognize threats from other countries.
In this project, you are tasked with creating a chart that depicts your recommendations regarding the assessment and evaluation of the cybersecurity threats and policies that can be linked to origins in the Middle East, Europe, Africa, and other regions, including the relevant cultural differences in global security outlooks across these regions. You will base your findings from the view of a consultant to an international company looking to expand in those geographical areas. Generally, what kind of cybersecurity climate will the company encounter?
In your research, focus on a malicious cyber technology or capability (malware) that is specific to the global environment, i.e., Trojans, rootkits, worms, spyware, keystroke loggers, or advanced persistent threats (do not select botnets, as they will be studied separately in this project). Along with your country threat assessments, you must also assess and evaluate the evolution of this malware and recommend how global cybersecurity policies might be used to counter the effects.
You will review the characteristics of your chosen malware by discussing six specific characteristics (purpose, size, attack method, attribution, etc.) and describe how these characteristics have emerged, changed, or evolved over the past five to 10 years. Also discuss what contributing factors may cause these characteristics to change, and how these characteristics may change over the next 10 years. How might these technologies be countered by global cybersecurity policy controls (do not describe technology controls) in the future? Support your position with policy, security practice, theories, principles, and recommendations based on your own thoughts, examples, and cited references.
Finally, you will study botnets, which are a specific and particularly pervasive type of malware. You will learn about the global nature of botnets and the emerging security issues associated with botnets, to include their impact on the formulation of global cybersecurity policies.
This is the last of six sequential projects. There are 13 steps in this project. Begin with the information below to review your project scenario.
Scenario
GlobalOutreach is an international company that specializes in risk mitigation, with particular emphasis on cyber risk. You are a consultant to GlobalOutreach, which is looking to expand into the geographical areas of the Middle East, Europe, Africa, and other regions. The company has asked you to provide your thoughts (based on research) on what kind of cybersecurity climate can be expected when expanding to these areas. Your assessment of the global environment will include the identification of specific cyberthreats pervasive in selected regions as well as the identification and characterization of malware in these regions.
You decide to also focus on networked computing systems, which are important to businesses, commerce, and education worldwide, but may be controlled by the global governments that vary from country to country. Botnets, which leverage networks of computers, are a particular global concern, and GlobalOutreach has dedicated research funds to better understanding the propagation of botnets and also how to eradicate them. Networked computing systems are particularly vulnerable to botnets, which can be used in distributed denial-of-service attacks and other malicious purposes.
Your report will highlight cybersecurity policies in three international regions as well as in NATO and the United Nations, representing global alliances, and will then document the impact of your selected malware in the three geographic areas. It will feature the types of malicious activities most widely observed and what they are used for, and will also consider the role of international cybersecurity policies in eradicating the malware.
A comprehensive report will show GlobalOutreach that you are in the best position to advise about global affairs, laying the groundwork for future consulting with the company.
When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.
2.1: Identify and clearly explain the issue, question, or problem under critical consideration.
7.2: Evaluate international cybersecurity policy.
8.2: Evaluate specific cybersecurity threats and the combination of technologies and policies that can counter them.
Step 1: Project Practice – SIMTRAY Cyber Policy for a Small World: Day 1
As a consultant to a global risk mitigation company, you will need an overview of global cybersecurity issues and related policies. The global connections that characterize modern cyberspace and catalyze near-instantaneous communication and productivity are also the Achilles’ heel of governments. Cybernetworks, like their physical counterparts, are prone to being used as instruments of sabotage, espionage, disruption, and war. In order to familiarize yourself with these types of global issues and relevant terminology and concepts, open the SIMTRAY titled “Cyber Policy for a Small World.”
SIMTRAY is a simulation that will give you a sense of the need for cybersecurity personnel to maintain a global perspective. There are no local incidents in cyberspace, but more importantly, you will reflect on US policy on cybercrime and cyberwarfare. Some of the issues and topics addressed in this exercise include EMP Attack, the role of state actors, and attacks using technologies such as botnets.
The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need. Record your best score and at least one lesson learned from the exercise to include in your report at the end of the three-day simulation.
Step 2: Project Practice – SIMTRAY Cyber Policy for a Small World: Day 2
In the previous step, you started to examine the SIMTRAY, “Cyber Policy for a Small World.. In this step, continue to focus on SIMTRAY, but document the specific technologies and policies that you believe could be better addressed in the global scene. You may encounter the following topics in this exercise: EMP Attack, the role of state actors, and attacks using technologies such as botnets.
The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need. Record your best score and at least one lesson learned from the exercise to include in your report at the end of the three-day simulation.
Step 3: Project Practice – SIMTRAY Cyber Policy for a Small World: Day 3
In this step, you should continue to explore the scenarios within SIMTRAY, “Cyber Policy for a Small World.” If you have not already, you will most likely encounter the following topics in this exercise: EMP Attack, the role of state actors, and attacks using technologies such as botnets.
Document events that you experience in the exercise that might affect the global cybersecurity policy. Think about threats brought about by new technologies and how these threats are or could be handled by global policy.
The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need in order to have a firm grasp of the concepts. Compile your recorded scores, lessons learned and documented technologies and policies into a one-page report.
Submit your report for feedback.
Step 4: Malicious Cyber Technology Review
Now that you have practiced the SIMTRAY to familiarize yourself with global issues, you will focus on a specific malicious cyber technology or capability (malware) that is specific to the global environment. Select one technology or capability and post a brief description on the discussion board of the technology, its intended use, and how it is being used maliciously. Include a brief discussion of how your selected technology has evolved and how global cybersecurity policies might be used to counter its effects.
Possible choices include, but are not limited to: Trojans, rootkits, worms, spyware, keystroke loggers, or advanced persistent threats (APTs). Do not select botnets.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.