CYB 220 Project Three Milestone Guidelines and Rubric
Overview
A critical skill for you to have as a cybersecurity practitioner is to prioritize criteria, requirements, and data to determine the best course of action. The factors that influence your decisions can vary from cost to complexity, effectiveness to available resources, or best-practice to executive viewpoint. How can you evaluate the issues to determine what elements of your environment are most important?
In this assignment, you will begin analyzing information related to selecting and recommending a network protection technology solution to your manager. The final evaluation and recommendation will be submitted as Project Three in Module Seven; however, in this milestone, you will examine organizational information, consider how various factors influence the decision-making criteria, and fill in a technology evaluation of your own based on your manager’s questions.
Scenario
Your instructor will provide you with the scenario for this project in an announcement. The scenario will provide you with the beginning of a security plan that documents areas of relevance to your decision making for the project.
Additionally, a fellow analyst is completing an evaluation of network protection technologies, specifically intrusion detection systems (IDSs) and intrusion prevention systems (IPSs), to help you with your decision-making process. You will be provided with the completed evaluation matrix in Module Seven for use in completing Project Three. Your manager has also provided a list of questions that they would use to evaluate the organizational needs in an IDS or IPS.
The technology evaluation criteria and your manager’s questions can be found in the Technology Evaluation Criteria document. For your submission, you will download and fill out the Technology Evaluation Criteria Worksheet. Both of these documents can be found in the Project Three Milestone task in Module Five of your course.
Based on your analysis of the technology evaluation criteria, the details provided in the scenario, and your manager’s guiding questions, you will identify the highest priority criteria and select Fundamental Security Design Principles related to your prioritization.
Prompt
Submit a completed Technology Evaluation Criteria Worksheet, which includes a filled-out table, your prioritized list, and two Fundamental Security Design Principles that best encompass your list. You will also need to justify and explain your selections.
Specifically, you must address the critical elementslisted below.
Using the manager’s questions and the evaluation criteria, identify relevant information from the organizational security plan material in the scenario to complete the blank column in the technology evaluation criteria table in the provided worksheet.
Based on your assessment of the relevant information from the organizational security plan, provide a prioritized list of the three most essential evaluation criteria. Justify your rationale for determining the priority of your selected elements.
Select two Fundamental Security Design Principles that best encompass the priority list. Explain the correlation between your priority list and the principles you identified.
What to Submit
Download, fill out, and submit the Technology Evaluation Criteria Worksheet, which includes the technology evaluation criteria table, your prioritized list, and your chosen Fundamental Security Design Principles. Use a filename that includes the course code, the assignment title, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx.