You will situate yourself as the security analyst in one of the provided scenarios, creating a technical brief that explains to the security/IT director how the situation informs the larger proactive adversarial detection plan that he or she is writing for the organization
CYB 200 Project Three Guidelines and Rubric
Overview
One of the three focus projects for this course is the creation of a technical brief based on research you’ve conducted. The audience for this brief is the security/IT director for a fictional organization at which you are employed for the purposes of this assignment. This technical brief will serve as the basis for a proactive adversarial detection plan that your director will be creating. The final product represents an authentic demonstration of competency because, as a security analyst, you will need to be able to develop skills that employ a variety of methods and tools necessary to detect, characterize, and counter cyber threat actors. Your work will contribute to larger team projects across your organization. This project will also help position you to cultivate an important mind-set: thinking responsibly, proactively, and in terms of what threat actors would do to attack organizational assets.
The project incorporates one milestone, which will be submitted in Module Five. The project will be submitted in Module Seven.
In this assignment, you will demonstrate your mastery of the following course competency:
CYB-200-02: Develop reliable, ethical methods to detect, characterize, and counter cyber threat actors
Scenario
In a course announcement, your instructor will provide you with some scenarios for you to choose from. You will situate yourself as the security analyst in one of the provided scenarios, creating a technical brief that explains to the security/IT director how the situation informs the larger proactive adversarial detection plan that he or she is writing for the organization. You do not require specific technical information from the system at hand, as the results or determinations are supplied for you within the scenario. Rather, you should address each critical element in the Project Three prompt, speaking broadly to what your best-practice tactics or methods would be, based on your research from the decision aid you completed as the milestone for this project. The Conclusion section of this activity requires you to extrapolate on all the research you have done for the decision aid.
Prompt
In your technical brief, you must address the critical elements listed below. The codes shown in brackets indicate the course competency to which each critical element is aligned.
I. Introduction
A. Identify your threat actors and characterize their motivations or desired outcomes. Use research from the Project Three resource guide or decision aid to support your response. For example, is the threat actor gathering information for financial gain? [CYB-200-02]
1
II. Analysis
A. Describe best practices or methods for detecting the threat actors from the scenario. Use research from the Project Three resource guide or decision aid to support your response. [CYB-200-02]
B. Describe ethical and legal factors that should be considered and their significance in terms of the company for which you are employed in the
scenario. Use research from the Project Three resource guide or decision aid to support your response. [CYB-200-02]
C. Describe at least one tactic or method that is important in responding to and countering this threat actor. Use research from the Project Three
resource guide or decision aid to support your response. [CYB-200-02]
D. Describe at least one tactic or method that would be employed to reduce the likelihood of the same situation happening again. Use research
from the Project Three resource guide or decision aid to support your response. [CYB-200-02]
III. Conclusion
A. Explain the potential ramifications of the tactics or methods you have suggested. Use research from the resource guide or decision aid to support your response. [CYB-200-02]
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.