15 Oct To complete this assignment, review the prompt and grading rubric in the Project Three Guidelines and Rubric. When you have finished your work, submit the a
To complete this assignment, review the prompt and grading rubric in the Project Three Guidelines and Rubric. When you have finished your work, submit the assignment here for grading and instructor feedback.
CYB 200 Project Three Guidelines and Rubric
Overview
One of the three focus projects for this course is crea�ng a technical brief based on the research you’ve conducted. The audience for this brief is the security or IT director for the fic�onal
organiza�on for which you work. This technical brief will serve as the basis for a proac�ve adversarial detec�on plan that your director will be crea�ng. The final product represents an
authen�c demonstra�on of competency because, as a security analyst, you must develop skills that use a variety of methods and tools to detect, characterize, and counter cyber threat
actors. Your work will contribute to larger team projects across your organiza�on. This project will also help you develop an important mindset: thinking responsibly and proac�vely about
what threat actors would do to a�ack organiza�onal assets.
The project incorporates one milestone, which will be submi�ed in Module Five. The project will be submi�ed in Module Seven.
In this assignment, you will demonstrate your mastery of the following course competency:
Develop reliable, ethical methods to detect, characterize, and counter cyber threat actors
Scenario
In a course announcement, your instructor will provide some scenarios for you to choose from. In your chosen scenario, you are a security analyst, crea�ng a technical brief for the security or
IT director explaining how the situa�on informs the larger proac�ve adversarial detec�on plan they are wri�ng for the organiza�on. The specific technical informa�on, results, or
determina�ons you need are supplied within the scenario. Your brief should address each cri�cal element in the Project Three prompt, discussing your best-prac�ce tac�cs or methods
recommenda�ons based on your research from the decision aid you completed as the milestone for this project. The Conclusion sec�on of this ac�vity requires you to expand on all the
research you did for the decision aid.
Prompt
In your technical brief, you must address the cri�cal elements listed below.
I. Introduc�on
A. Iden�fy your threat actors and characterize their mo�va�ons or desired outcomes. Use research from the Project Three resource guide or decision aid to support your response.
For example, is the threat actor gathering informa�on for financial gain?
II. Analysis
A. Describe best prac�ces or methods for detec�ng the threat actors from the scenario. Use research from the Project Three resource guide or decision aid to support your
response.
10/15/24, 11:25 AM Assignment Information
https://learn.snhu.edu/d2l/le/content/1698647/viewContent/35102840/View 1/3
B. Describe ethical and legal factors that should be considered and their significance in terms of the company for which you are employed in the scenario. Use research from the
Project Three resource guide or decision aid to support your response.
C. Describe at least one tac�c or method that is important in responding to and countering this threat actor. Use research from the Project Three resource guide or decision aid to
support your response.
D. Describe at least one tac�c or method that would be employed to reduce the likelihood of the same situa�on happening again. Use research from the Project Three resource
guide or decision aid to support your response.
III. Conclusion
A. Explain the poten�al ramifica�ons of the tac�cs or methods you have suggested. Use research from the resource guide or decision aid to support your response.
What to Submit
Your submission should be approximately 2 pages in length (plus a cover page and references) and should be wri�en in APA format. Use double spacing, 12-point Times New Roman font,
and one-inch margins. Include at least three references, which should be cited according to APA style. Use a file name that includes the course code, the assignment �tle, and your name—for
example, CYB_200_Project_Three_Neo_Anderson.docx.
Project Three Rubric
Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
Introduc�on: Characterize Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Iden�fies threat actors and
characterizes their mo�va�ons
or desired outcomes, using
research from the resource
guide or decision aid to support
the response
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
16
Analysis: Detec�ng Threat
Actors
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Describes best prac�ces or
methods for detec�ng the
threat actors, using research
from the resource guide or
decision aid to support the
response
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
16
10/15/24, 11:25 AM Assignment Information
https://learn.snhu.edu/d2l/le/content/1698647/viewContent/35102840/View 2/3
Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
Analysis: Ethical and Legal
Factors
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Describes ethical and legal
factors that need to be
considered and their
significance, using research
from the resource guide or
decision aid to support the
response
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
16
Analysis: Responding to and
Countering Threat Actor
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Describes at least one tac�c or
method that is important in
responding to and countering
the threat actor, using research
from the resource guide or
decision aid to support the
response
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
16
Analysis: Reduce Likelihood Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Describes at least one tac�c or
method that would be
employed to reduce the
likelihood of the same situa�on
happening again, using
research from the resource
guide or decision aid to support
the response
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
16
Conclusions: Ramifica�ons Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Explains the poten�al
ramifica�ons of the tac�cs or
methods suggested, using
research from the resource
guide or decision aid to support
the response
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
16
Ar�cula�on of Response Submission is free of errors
related to cita�ons, grammar,
spelling, and organiza�on and
is presented in a professional
and easy-to-read format
Submission has no major errors
related to cita�ons, grammar,
spelling, or organiza�on
Submission has some errors
related to cita�ons, grammar,
spelling, or organiza�on that
nega�vely impact readability
and ar�cula�on of main ideas
Submission has cri�cal errors
related to cita�ons, grammar,
spelling, or organiza�on that
prevent understanding of ideas
4
Total: 100%
10/15/24, 11:25 AM Assignment Information
https://learn.snhu.edu/d2l/le/content/1698647/viewContent/35102840/View 3/3