20 Nov To complete this assignment, review the prompt and grading rubric in the Module Four Stepping Stone Two Guidelines and Rubric. When you have finished your
To complete this assignment, review the prompt and grading rubric in the Module Four Stepping Stone Two Guidelines and Rubric. When you have finished your work, submit the assignment here for grading and instructor feedback.
CYB 250 Stepping Stone Two Guidelines and Rubric
Overview
In Module three, you were introduced to threat modeling. Prac�cing threat modeling develops a valuable skill. Therefore, in this exercise, you will review two lesser-known a�acks and
iden�fy the components of a threat model. This exercise is meant to expand your skill set in iden�fying events and threats while analyzing a�acks reported by other organiza�ons. If the
component of the threat model is not directly discernable, it is important that you use your previous knowledge and inference experience to try and iden�fy the component. Within the two
ar�cles linked in the Reading and Resources sec�on in Module Four of your course, you will find different uses of cryptography and man-in-the-middle a�acks. Analyzing cryptographic
techniques is an important skill that security analysts prac�ce to be�er understand data protec�on.
This ac�vity relates directly to the final project, where you will be required to complete a threat model for your project scenario and analyze cryptographic techniques. Take advantage of
feedback on this assignment to prepare you for your final project submission in Module Seven.
Prompt
Analyze the two ar�cles linked in the Reading and Resources sec�on in Module Four of your course. Use this informa�on to fill out the template and address the cri�cal elements listed
below.
I. Threat Modeling
A. To complete this assignment, first download the Module Four Stepping Stone Two Template course provided in the What to Submit sec�on. Iden�fy the elements of the threat
model by filling in the template for the case studies below.
i. Complete column for Bank A�acks thoroughly and accurately.
ii. Complete column for Bluetooth Bug thoroughly and accurately.
II. Cryptographic Techniques
A. Select one of the incidents from the table and analyze the following items:
i. Describe the cryptographic techniques employed by the organiza�on in the ar�cle.
ii. Describe how a man-in-the-middle a�ack compromised the cryptographic technique iden�fied above.
iii. Describe techniques that could have been used to prevent the man-in-the-middle a�ack from your selected ar�cle.
11/20/24, 10:23 AM Assignment Information
https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623163/View 1/3
What to Submit
Use the Module Four Stepping Stone Two Template to prepare your submission. Your submission should be 2 to 3 pages in length including the table. Use double spacing, 12-point Times
New Roman font, and one-inch margins. All sources must be cited using APA format. Use a file name that includes the course code, the assignment �tle, and your name—for example,
CYB_123_Assignment_Firstname_Lastname.docx.
Module Four Stepping Stone Two Rubric
Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
Threat Modeling: Bank
A�acks
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Completes column for Bank
A�acks thoroughly and
accurately
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
18
Threat Modeling: Bluetooth
Bug
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Completes column for
Bluetooth Bug thoroughly and
accurately
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
18
Cryptographic Techniques:
Techniques Employed
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Describes the cryptographic
techniques employed by the
organiza�on in the ar�cle
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
18
Cryptographic Techniques:
Man-in-the-Middle A�ack
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Describes how a man-in-the-
middle a�ack compromised the
cryptographic technique
iden�fied above
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
18
Cryptographic Techniques:
Prevent
Meets “Proficient” criteria and
addresses cri�cal element in an
excep�onally clear, insigh�ul,
sophis�cated, or crea�ve
manner
Describes techniques that
could have been used to
prevent the man-in-the-middle
a�ack from the selected ar�cle
Addresses “Proficient” criteria,
but there are gaps in clarity,
logic, or detail
Does not address cri�cal
element, or response is
irrelevant
18
11/20/24, 10:23 AM Assignment Information
https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623163/View 2/3
Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
Ar�cula�on of Response Submission is free of errors
related to cita�ons, grammar,
spelling, and organiza�on and
is presented in a professional
and easy-to-read format
Submission has no major errors
related to cita�ons, grammar,
spelling, or organiza�on
Submission has some errors
related to cita�ons, grammar,
spelling, or organiza�on that
nega�vely impact readability
and ar�cula�on of main ideas
Submission has cri�cal errors
related to cita�ons, grammar,
spelling, or organiza�on that
prevent understanding of ideas
10
Total: 100%
11/20/24, 10:23 AM Assignment Information
https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623163/View 3/3