The project milestone is attached below as well as the original scenario utilize

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

The project milestone is attached below as well as the original scenario utilize

The project milestone is attached below as well as the original scenario utilized. This should help complete this assignment.
Scenario One
As a new security analyst in a healthcare firm, you have been tasked
with getting the system fully patched and up to date. To remediate a
vulnerability with third-party software, the vendor requires a clone of
the system (a complete copy of the application, including all its data)
be sent to their facilities so they can do their own testing on it.
Overview
One of the three focus projects for this course is creating a technical brief
based on the research you’ve conducted. The audience for this brief is
the security or IT director for the fictional organization for which you
work. This technical brief will serve as the basis for a proactive
adversarial detection plan that your director will be creating. The
final product represents an authentic demonstration of competency
because, as a security analyst, you must develop skills that use a
variety of methods and tools to detect, characterize, and counter cyber
threat actors. Your work will contribute to larger team projects across
your organization. This project will also help you develop an important
mindset: thinking responsibly and proactively about what threat actors
would do to attack organizational assets.
The project incorporates one milestone, which will be submitted in Module Five. The project will be submitted in Module Seven.
In this assignment, you will demonstrate your mastery of the following course competency:
Develop reliable, ethical methods to detect, characterize, and counter cyber threat actors
Scenario
In a course announcement, your instructor will provide some scenarios
for you to choose from. In your chosen scenario, you are a security
analyst, creating a technical brief for the security or IT director
explaining how the situation informs the larger proactive adversarial
detection plan they are writing for the organization. The specific
technical information, results, or determinations you need are supplied
within the scenario. Your brief should address each critical element in
the Project Three prompt, discussing your best-practice tactics or
methods recommendations based on your research from the decision aid you
completed as the milestone for this project. The Conclusion section of
this activity requires you to expand on all the research you did for the
decision aid.
Prompt
In your technical brief, you must address the critical elements listed below.
Introduction
Identify your threat actors and characterize their
motivations or desired outcomes. Use research from the Project Three
resource guide or decision aid to support your response. For example, is
the threat actor gathering information for financial gain?
Analysis
Describe best practices or methods for detecting the threat actors from the scenario. Use research from the Project Three resource guide or decision aid to support your response.
Describe ethical and legal factors that should be
considered and their significance in terms of the company for which you
are employed in the scenario. Use research from the Project Three
resource guide or decision aid to support your response.
Describe at least one tactic or method that is important in responding to and countering this threat actor. Use research from the Project Three resource guide or decision aid to support your response.
Describe at least one tactic or method that would be employed to reduce the likelihood
of the same situation happening again. Use research from the Project
Three resource guide or decision aid to support your response.
Conclusion
Explain the potential ramifications of the tactics or methods you have suggested. Use research from the resource guide or decision aid to support your response.
What to Submit
Your submission should be approximately 2 pages in length (plus a
cover page and references) and should be written in APA format. Use
double spacing, 12-point Times New Roman font, and one-inch margins.
Include at least three references, which should be cited according to
APA style. Use a file name that includes the course code, the assignment
title, and your name—for example,
CYB_200_Project_Three_Neo_Anderson.docx.

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now