26 Nov To complete this assignment, review the prompt and grading rubric in the Final Project Milestone Guidelines and Rubric. When you have finished your work, sub
To complete this assignment, review the prompt and grading rubric in the Final Project Milestone Guidelines and Rubric. When you have finished your work, submit the assignment here for grading and instructor feedback.
CYB 250 Final Project Milestone Guidelines and Rubric
Overview
When it comes to cyber defense, having a well-rounded toolbox of strategies is important. For this milestone paper dra�, you will be analyzing trends in personnel or human factors, data
protec�on, and system protec�on. You will evaluate these trends as solu�ons using threat modeling, a skill you prac�ced in Modules Three and Four. This dra� is an opportunity to begin
work on your final project and receive feedback from your instructor before comple�ng your project in Module Seven.
Scenario
For this final project, put yourself in the role of a security analyst who is performing an audit of your company. Your organiza�on is a mid-sized manufacturing company that released its own
smart headset. The headset has the ability to project important documents on an op�cal screen for the technicians in the field. The documents could be product schema�cs, invoices, emails,
text messages, or any documents put in the shared drive on the server. The headset has constant communica�on with the server that resides in the central office; the connec�on is made
through the technicians’ cell phones via the Bluetooth connec�on.
Prompt
Create your cyber defense paper dra� by selec�ng your trends below and comple�ng a threat model for each trend using what you learned in Stepping Stone One. Be sure to integrate your
feedback on this assignment into your final, polished project submission in Module Seven.
You must address the cri�cal elements listed below.
I. Personnel or Human Factor Trend
Select a personnel or human factor trend and discuss the following cri�cal elements:
A. Describe how the trend or strategy provides protec�on to an organiza�on.
B. Defend the trend as a credible solu�on based on your analysis of the threat model for the scenario.
II. Data Protec�on Strategy or Technology
Select a data protec�on strategy or technology and discuss the following cri�cal elements:
A. Describe how the strategy or technology provides protec�on to an organiza�on.
B. Defend the strategy or technology as a credible solu�on based on your analysis of the threat model for the scenario.
III. System Protec�on
Select a technology in one of the following areas:
Network protec�on technologies
11/25/24, 12:40 PM Assignment Information
https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623165/View 1/3
Endpoint and server protec�on technologies
So�ware code protec�on strategies and technologies
For your selected technology, discuss the following cri�cal elements:
A. Describe how the selected technology provides protec�on to an organiza�on.
B. Defend the technology as a credible solu�on based on your analysis of the threat model for the scenario.
What to Submit
Your submission should be 2 to 3 pages in length (plus a cover page and references). Use double spacing, 12-point Times New Roman font, and one-inch margins. Any references should be
cited according to APA style. Use a file name that includes the course code, the assignment �tle, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.
Final Project Milestone Rubric
Criteria Proficient (100%) Needs Improvement (70%) Not Evident (0%) Value
Personnel or Human Factor
Trend: Protec�on
Describes how the trend or strategy
provides protec�on to an organiza�on
Addresses “Proficient” criteria, but there
are gaps in clarity, logic, or detail
Does not address cri�cal element, or
response is irrelevant
15
Personnel or Human Factor
Trend: Credible Solu�on
Defends the trend as a credible solu�on
based on analysis of the threat model for
the scenario
Addresses “Proficient” criteria, but there
are gaps in clarity, logic, or detail
Does not address cri�cal element, or
response is irrelevant
15
Data Protec�on Strategy or
Technology: Protec�on
Describes how the strategy or technology
provides protec�on to an organiza�on
Addresses “Proficient” criteria, but there
are gaps in clarity, logic, or detail
Does not address cri�cal element, or
response is irrelevant
15
Data Protec�on Strategy or
Technology: Credible
Solu�on
Defends the strategy or technology as a
credible solu�on based on analysis of the
threat model for the scenario
Addresses “Proficient” criteria, but there
are gaps in clarity, logic, or detail
Does not address cri�cal element, or
response is irrelevant
15
System Protec�on:
Protec�on
Describes how the technology provides
protec�on to an organiza�on
Addresses “Proficient” criteria, but there
are gaps in clarity, logic, or detail
Does not address cri�cal element, or
response is irrelevant
15
System Protec�on: Credible
Solu�on
Defends the technology as a credible
solu�on based on analysis of the threat
model for the scenario
Addresses “Proficient” criteria, but there
are gaps in clarity, logic, or detail
Does not address cri�cal element, or
response is irrelevant
15
11/25/24, 12:40 PM Assignment Information
https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623165/View 2/3
Criteria Proficient (100%) Needs Improvement (70%) Not Evident (0%) Value
Ar�cula�on of Response Submission has no major errors related to
cita�ons, grammar, spelling, or
organiza�on
Submission has some errors related to
cita�ons, grammar, spelling, or
organiza�on that nega�vely impact
readability and ar�cula�on of main ideas
Submission has cri�cal errors related to
cita�ons, grammar, spelling, or
organiza�on that prevent understanding of
ideas
10
Total: 100%
11/25/24, 12:40 PM Assignment Information
https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623165/View 3/3