Question: Scenario For this final project, put yourself in the role of a security analyst who is performing an audit of your company. Your organization is
Scenario
For this final project, put yourself in the role of a security analyst who is performing an audit of your company. Your organization is a midsized
manufacturing company that released its own smart headset. The headset has the ability to project important documents on an optical screen
for the technicians in the field. The documents could be product schematics, invoices, emails, text messages, or any documents put in the
shared drive on the server. The headset has constant communication with the server that resides in the central office; the connection is made
through the technicians' cell phones via the Bluetooth connection.
Prompt
Apply your experience using threat models to describe a particular attack, and your understanding of cryptography to write a Cyber Defense
and Emerging Trends paper. Be sure to integrate feedback from the Final Project Milestone into your submission.
You must address the critical elements listed below. The codes shown in brackets indicate the competency to which each critical element is
aligned.
I. Personnel or Human Factor Trend
Select a personnel or human factor trend and discuss the following critical elements:
A Describe how the trend or strategy provides protection to an organization.
B Defend the trend as a credible solution based on your analysis of the threat model for the scenario.
C Describe the security risks and rewards associated with the trend.
D Analyze how an emerging personnel or human factor trend is affecting the cybersecurity landscape. In your response, detail the impact
this trend has on existing security strategies, technologies, or policies.
II Data Protection Strategy or Technology
Select a data protection strategy or technology and discuss the following critical elements:
A Describe how the strategy or technology provides protection to an organization.
B Defend the strategy or technology as a credible solution based on your analysis of the threat model for the scenario.
C Describe the security risks and rewards associated with the strategy or technology.
D Describe how cryptographic techniques are used with this data protection strategy or technology to achieve security objectives.
E Discuss the advantages and disadvantages of the encryption method used in the data protection strategy or technology.
F Discuss the security concerns related to cryptographic techniques.
III. System Protection
Select a technology in one of the following areas:
Network protection technologies
Endpointserver protection technologies
Software code protection strategies and technologies
For your selected technology, discuss the following critical elements:
A Describe how the selected technology provides protection to an organization.
B Defend the technology as a credible solution based on your analysis of the threat model for the scenario.
C Describe the security risks and rewards associated with the technology.
D Analyze how an emerging security technology is affecting the cybersecurity landscape. In your response, detail the impact this
technology has on existing security strategies, technologies, or policies.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
