Overview
Sound guidance in selecting technologies that ensure compliance with or
Overview
Sound guidance in selecting technologies that ensure compliance with organizational security requirements is a key contribution that a cybersecurity practitioner provides to their organization. The ability to balance technical effectiveness against business considerations such as cost, implementation time, and the impacts on staffing, end-users, and infrastructure is a key skill.
For this project (due in Module Seven), you will be writing an evaluation of network protection technologies to your manager. This evaluation requires you to assess multiple technology options by weighing criteria associated with cost and effectiveness and then recommending a solution that satisfies the given requirements. In addition, your recommendation should be guided by a fundamental security design principle you select as a basis for your recommendation.
In this assignment, you will demonstrate your mastery of the following course competency:
Describe the fundamental principles and practices of intrusion detection and prevention
Scenario
Your instructor has provided you with the specific scenario for this project as part of the Project Three Milestone. The scenario provided you with the beginning of a security plan that documents areas of relevance to your evaluation that you need for decision making in your project
Additionally, a fellow analyst has completed an evaluation of network protection technologies, specifically intrusion detection systems (IDSs) and intrusion prevention systems (IPSs), to help you with your decision-making process. Your manager has reviewed the evaluation, based on effectiveness and cost, and has verified its accuracy.
Based on your analysis of the technology evaluation and the details provided in the scenario, recommend a network protection system for implementation.
Prompt
You must address the critical elements listed below.
Explain how you are employing one of the Fundamental Security Design Principles to inform your recommendation.
Justify a recommended network protection approach. Describe how you balanced effectiveness, cost, and technical capabilities to select the network protection technology
Recommend resources (e.g., organizational assets, workforce allocation, policies/procedures, hardware) that are necessary for implementing or monitoring your chosen network protection approach. These resources should optimize the technology or maximize organizational resources. Explain your recommendation using an adversarial mindset or systems thinking approach.
What to Submit
Your evaluation of network protection technologies should be 2 to 3 pages in length (plus a cover page and references) and must be written in APA format. Use double spacing, 12-point Times New Roman font, and one-inch margins. Use a filename that includes the course code, the assignment title, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx
Project Three Rubric
CriteriaExemplary (100%)Proficient (85%)Needs Improvement (55%)Not Evident (0%)Value
Employing a Fundamental Security Design PrincipleMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerExplains how one of the Fundamental Security Design Principles is employed to inform the recommendationAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant31
Recommended Network Protection ApproachMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerJustifies a recommended network protection approach that includes a description of how effectiveness, cost, and technical capabilities were balancedAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant31
Resource RecommendationsMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerRecommends resources that are necessary for implementing or monitoring the chosen network protection approach to optimize the technology or maximize organizational resources, including how using an adversarial mindset or systems thinking approach influenced the recommendationAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant31
Articulation of ResponseSubmission is free of errors related to citations, grammar, spelling, and organization and is presented in a professional and easy-to-read formatSubmission has no major errors related to citations, grammar, spelling, or organizationSubmission has some errors related to citations, grammar, spelling, or organization that negatively impact readability and articulation of main ideasSubmission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas7
Total:100%