Question: 3 - Apply: Summative Assessment: Network Defense Fundamentals - Controls, Protocols, and Threats Report [due Day 7] Exam Content Imagine overseeing cybersecurity operations for a

3 - Apply: Summative Assessment: Network Defense Fundamentals - Controls, Protocols, and Threats Report [due Day 7]

Exam Content

Imagine overseeing cybersecurity operations for a major online sales company. You must have the most effective cybersecurity measures available at your disposal. Resolution after an attack has occurred is not a viable solution. So, your job is to make sure an attack never occur. Recalling the fundamental goals, benefits, challenges, and countermeasures you've learned so far:

Createa 2 to 3page MS Word report for your company, detailing the following:

  • Identify one potential network threat to your business.
  • Recommend 2 controls or protocols that need to be implemented to defend against attacks and limit the risk you identified for your business.
  • Describe 2 purposes of the controls or protocols you recommended for your business. For each, list 1 example where these controls or protocols were used in businesses. What did they protect against?
  • Discuss 1 significance of using OSI, TCP/IP, and SANS 20 Controls in network protection.
  • Name one control and protocol you find in a security policy.

apa Citeany sources to support your assignment.

Formatyour citations according to APA guidelines.

must following wk 3 grading rubric

Grading Rubrics CYB/120 v3 Page 2 of 7 Copyright 2022 by University of Phoenix. All rights reserved. Wk 3 - Summative Assessment: Network Defense Fundamentals - Controls, Protocols, and Threats Report Criteria and Weight Accomplished 90-100% A to A- Emerging 70-89% B+ to C- Beginning 50-69% D+ to F Not Evident 0% F 1. Threat to The Business Weight: 25% Clearly identified one potential network threat to the business Generally identified one potential network threat to the business Did not clearly identify one potential network threat to the business Did not identify one potential network threat to the business 2. Controls Weight: 15% Recommended 2 appropriate controls or protocols that need to be implemented to defend against attacks and limit the risk identified for the business Recommended 2 general controls or protocols that need to be implemented to defend against attacks and limit the risk identified for the business Did not clearly recommend 2 controls or protocols that need to be implemented to defend against attacks and limit the risk identified for the business Did not recommend 2 controls or protocols that need to be implemented to defend against attacks and limit the risk identified for the business 3. Protocols Weight: 15% Thoroughly and clearly described 2 purposes of the controls or protocols recommended for the businessfor each, listed 1 clear and detailed example where these controls or protocols were used in businesses; provided complete details regarding what they protected against Generally described 2 purposes of the controls or protocols recommended for the businessfor each, listed 1 moderate example where these controls or protocols were used in businesses; provided general details regarding what they protected against Vaguely described 2 purposes of the controls or protocols recommended for the businessfor each, listed 1 insufficient example where these controls or protocols were used in businesses; provided limited details regarding what they protected against Did not describe 2 purposes of the controls or protocols recommended for the business and list examples for each 4. OSI, TCP/IP, and SANS 20 Controls Uses Weight: 30% Thoroughly and clearly discussed 1 significance of using OSI, TCP/IP, and SANS 20 Controls in network protection Moderately discussed 1 significance of using OSI, TCP/IP, and SANS 20 Controls in network protection Insufficiently discussed 1 significance of using OSI, TCP/IP, and SANS 20 Controls in network protection Did not discuss the significance of using OSI, TCP/IP, and SANS 20 Controls in

Grading Rubrics CYB/120 v3 Page 3 of 7 Copyright 2022 by University of Phoenix. All rights reserved. Criteria and Weight Accomplished 90-100% A to A- Emerging 70-89% B+ to C- Beginning 50-69% D+ to F Not Evident 0% F 5. Control and Protocol in a Security Policy Weight: 10% Clearly named one control and protocol found in a security policy Generally named one control and protocol found in a security policy Did not clearly name one control and protocol found in a security policy Did not name one control or protocol found in a security policy 6. Writing Weight: 3% The Network Defense Fundamentals - Controls, Protocols, and Threats Report was concise, with exceptional attention to detail, and was free of errors. The Network Defense Fundamentals - Controls, Protocols, and Threats Report showed attention to detail through careful editing and quality writing; minimal writing convention errors (i.e., spelling, punctuation, usage, and sentence formation) were present. The Network Defense Fundamentals - Controls, Protocols, and Threats Report lacked detail and careful editing; numerous writing convention errors (i.e., spelling, punctuation, usage, and sentence formation) were present; errors may or may not have detracted from the readability of the content. Significant errors detracted from the readability of the content. 7. APA Guidelines Weight: 2% The Network Defense Fundamentals - Controls, Protocols, and Threats Report was properly formatted according to APA guidelines, and it included correct APA citations for all sources. The Network Defense Fundamentals - Controls, Protocols, and Threats Report was partially formatted according to APA guidelines, and it included APA citations for sources with few errors. The Network Defense Fundamentals - Controls, Protocols, and Threats Report was minimally formatted according to APA guidelines, and it included incorrect APA citations for sources. The Network Defense Fundamentals - Controls, Protocols, and Threats Report was not formatted according to APA guidelines, and it did not include APA citation for sources

You

7 days ago

Wk 3 - Summative Assessment: Network Defense Fundamentals - Controls, Protocols, and Threats Report Criteria and Weight Accomplished 90-100% A to A- Emerging 70-89% B+ to C- Beginning 50-69% D+ to F Not Evident 0% F 1. Threat to The Business Weight: 25% Clearly identified one potential network threat to the business Generally identified one potential network threat to the business Did not clearly identify one potential network threat to the business Did not identify one potential network threat

For this assignment you should write it in a report type format that would be circulated upwards to your manager/supervisor as well as to those stakeholders across the organization who may be affected by your plan. Be sure to cite some sources, and be sure to use APA format for the citations and reference page. The best advice I have is to review the attached Grading Rubric and use those requirements as a basic outline. I encourage you to use your creativity to develop something that, while p

I encourage you to use your creativity to develop something that, while professional, also does a good job getting the ideas across while being an interesting read. Think of how awful it could be in your career to read dry, uninteresting, vague, nothing-speak. Creativity can be a great way to get stakeholders to pay better attention and learn something while also getting but-in for your recommendations. It must have a intro and description and a conclusion.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Law Questions!