Analyze how an emerging security technology is

Assignment Help Other Subject
Reference no: EM133756926

Case: Threat modeling is an important skill set that a security analyst should have in their toolbox. Evaluating different models and being familiar with each model will come with time. Integrating the results of threat modeling with different types of network protections can be challenging, as is evaluating and recommending different types of emerging technology integrated with existing technology. A security analyst needs to be able to think outside the box and integrate different models with the tasks at hand. A strong understanding of cryptography is valuable in protecting data in motion and at rest.

The final project builds off skills you practiced in the Module Three and Module Four Stepping Stones. The project also incorporates one milestone, which will be submitted in Module Five. The final project will be submitted in Module Seven. In this assignment, you will demonstrate your mastery of the following competencies:

Describe fundamental strategies of cyber defense

Describe the impact of emerging trends on security strategies

Compare and contrast different cryptographic techniques and select the appropriate solution for a given scenario

Case Scenario

For this final project, put yourself in the role of a security analyst who is performing an audit of your company. Your organization is a mid-sized manufacturing company that released its own smart headset. The headset has the ability to project important documents on an optical screen for the technicians in the field. The documents could be product schematics, invoices, emails, text messages, or any documents put in the shared drive on the server. The headset has constant communication with the server that resides in the central office; the connection is made through the technicians' cell phones via the Bluetooth connection.

Prompt
Apply your experience using threat models to describe a particular attack, and your understanding of cryptography to write a Cyber Defense and Emerging Trends paper. Be sure to integrate feedback from the Final Project Milestone into your submission.

You must address the critical elements listed below. The codes shown in brackets indicate the competency to which each critical element is aligned.

Personnel or Human Factor Trend
Select a personnel or human factor trend and discuss the following critical elements:

Describe how the trend or strategy provides protection to an organization.

Defend the trend as a credible solution based on your analysis of the threat model for the scenario.

Describe the security risks and rewards associated with the trend.
Analyze how an emerging personnel or human factor trend is affecting the cybersecurity landscape. In your response, detail the impact this trend has on existing security strategies, technologies, or policies.

Data Protection Strategy or Technology
Select a data protection strategy or technology and discuss the following critical elements:

Describe how the strategy or technology provides protection to an organization.
Defend the strategy or technology as a credible solution based on your analysis of the threat model for the scenario.
Describe the security risks and rewards associated with the strategy or technology.
Describe how cryptographic techniques are used with this data protection strategy or technology to achieve security objectives.
Discuss the advantages and disadvantages of the encryption method used in the data protection strategy or technology.
Discuss the security concerns related to cryptographic techniques.

System Protection
Select a technology in one of the following areas:

Network protection technologies
Endpoint and server protection technologies
Software code protection strategies and technologies
For your selected technology, discuss the following critical elements:
Describe how the selected technology provides protection to an organization.
Defend the technology as a credible solution based on your analysis of the threat model for the scenario.
Describe the security risks and rewards associated with the technology.
Analyze how an emerging security technology is affecting the cybersecurity landscape. In your response, detail the impact this technology has on existing security strategies, technologies, or policies.

Reference no: EM133756926

Questions Cloud

Determine the correct miles for each truck : Create spreadsheets and use Solver to determine the correct miles for each truck to travel to minimize cost for the problem
Analyze cultural-educational impacts of british colonialism : Analyze (1) cultural and educational impacts of British colonialism. What do you think about the educational impacts of British colonialism?
Male who has been brought to hospital by daughter : Mr. XY is an 84-year-old male who has been brought to hospital by his daughter. Mr. XY lives with his daughter and her family
Describe what you learned about the staging : describe what you learned about the staging in this case (e.g. in what ways was this crime scene staged? What was the motivation forth staging? etc.)
Analyze how an emerging security technology is : Analyze how an emerging security technology is affecting the cybersecurity landscape. In your response, detail the impact this technology has on existing
Observed within hispanic americans and arab americans : Compare and contrast at least four values/beliefs/practices commonly observed within hispanic americans and arab americans
Student completes a genogram and ecomap for family : During the interview, the student completes a genogram and ecomap for the family to include in the student paper.
Introduced to a very important concept called nativism : You will also be introduced to a very important concept called nativism. The questions you will need to answer are throughout the Canva Presentation.
Teaching session during scheduled health maintenance : Which common source of stress for a 6-year-old client would the nurse include in the teaching session during a scheduled health maintenance visit?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd