Work on your project milestone 1 and report your evidence to support that the milestone was completed.
Submit a 2-page status report that includes your evaluation of theories, principles, and best practices surrounding cybersecurity and your project.
This should include recent strategies for cybersecurity defenses. Also, describe the tasks completed in this milestone in an updated work breakdown structure (WBS), in Excel®, Word, or Project®, showing the actual time it took to complete each task. Finally, describe lessons learned while implementing this milestone. In addition, demonstrate that the milestone is fully completed by showing sufficient evidence. Depending on the project, the evidence can take the form of research findings, diagrams, designs, screenshots, databases, queries, source code, configurations, videos, policies, etc. Your evidence should result in at least 5 pages. This is in addition to your 2-page status report. If your evidence is in the form of videos, the videos should be at least 8–10 minutes long. This is only for your evidence.
Please see milestone below:
Milestone 1: Project Launch
The first phase focuses on the project’s initiation phase through planning and consulting with the stakeholders involved. This phase will initiate meetings to assess and describe the security vulnerabilities in the currently deployed endpoint architecture (Chandel et al., 2019). Each project shall have a clear charter, including the specific deliverables, goals, and expected results. The planning phase will also involve the development of a work schedule and responsibilities, as well as measures of checking the accomplishments made during its execution. This way, all the key stakeholders are on the same page regarding implementing the envisaged project, creating a platform for effective and efficient implementation.
Category: Computer Science homework help
In previous modules, you studied different types of cyberattacks and the concep
In previous modules, you studied different types of cyberattacks and the concepts and practices of threat modeling. Tools like the Lockheed Martin Cyber Kill Chain can help extend threat modeling into incident handling. Discuss using tools like the Cyber Kill Chain to handle incident response for emerging technologies.
In response to your peers, discuss the possible gaps left by using a tool like the one described in their initial posts.
To complete this assignment, review the Discussion Rubric.
RESPONSE ONE
Hello all,
Regarding all of the research experienced, the fourteen (14) page paper discussing the Kill Chain Defense Process from Lockheed Martin has inciteful information. Intelligence driven defense is the most effective form of protection for the network. Noting that every threat actor creates their own unique profile and personal attack signature to recognize helps an analyst narrow down the list of suspects for an attack. The attacks are further defined as Advanced Persistent Threats (APT). As each attack is attempted, every nuance is recorded and archived to anticipate future attacks.
From reading the paper, it notes that there is another way to recognizing the threat actor:
Find, Fix, Track, Target, Engage, and Assess.
The same way the military plans for an assault, this method is helpful to create an effective strategy to retaliate against a known threat. The paper also notes a case study that examines an email that proves and documents attack attempts by outside threats, or indicators. It shows how innocent messages can have elaborate code that gets embedded and can infiltrate the system undetected would like to see more examples of the case study in the future as there are threats that will be different from the last.
RESPONSE TWO
Good evening,
One tool that i found that is similar to the Lockheed Martin Cyber Kill Chain is the MITRE ATT&CK frame work. Both of these tools illustrate the phases of a cyber attack that include reconnaissance, weaponization and deliver, exploitation, installation, command and control, and finally actions. All of these tools do a great job in starting the process of incident response, and each have their advantages and disadvantages. Where they both succeed is that they are to identify how cyber attacks occur and the process in which they are trying to attack. These tools can help us during incident response as we are able to see the attacks and respond accordingly within procedures.
1. This Final Project P must be a technical paper on UX topics that have be
1. This Final Project P must be a technical paper on UX topics that have been pre-approved in earlier weeks by your instructor, using knowledge gained in the course.
2. The P Topic must be the one approved earlier.
3. It must follow the P Outline submitted earlier.
4. The p must:
● Use formatted references according to APA guidelines.
● Use 5 or more sources with annotated bibliography sources.
● NOT use Wikipedia or Webopedia as a reference–these sources have credibility issues.
● Be written in 5-7 pages – with full APA formatting.
● Follow a conventional report format (introduction, abstract (optional), body, conclusion, and references).
● Use images, models or diagrams to reinforce certain aspects of the pap.
● Limit Turnitin percent to 15% or less percent.
● Use provided rubric.
SOURCES TO CONSIDER:
● What is Plagiarism: https://owl.purdue.edu/owl/avoiding_plagiarism/plagiarism_faq.html
● What is Plagiarism and How to Avoid It: https://www.youtube.com/watch?v=4iw8J4Bwygs
● Writing@APUS: https://www.apus.edu/apus-library/resources-services/Writing/writing-center.html
● Purdue Online Writing Lab: https://owl.purdue.edu/writinglab/students/navigating_WL.html
● APA General Format: https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html
● Grammarly for Reviewing Papers and Writing:https://www.grammarly.com/
Instructions for properly completing the assignment:
1. Download the attached template called “ENTD120_Assignment7_Final_Project_Pap_LastNameFirst.doc”.
2. Change the file name by applying your Last Name and First Name in place of the LastNameFirst.
3. Then upload to Assignment #7 area of the Assignments.
Image Source:https://cdn.pixabay.com/photo/2015/06/01/09/04/samsung-793043_640.jpg
Attachments
ENTD120_Assignment7_Final_Project_Pap_LastNameFirst.docx(14.98 KB) Student Pap Setup Guide, APA Style 7th Edition.pdf(2.76 MB) WRITING AND APA Checklist 7th Edition.pdf(1.18 MB)
Work on your project milestone 1 and report your evidence to support that the
Work on your project milestone 1 and report your evidence to support that the milestone was completed.
Submit a 2-page status report that includes your evaluation of theories, principles, and best practices surrounding cybersecurity and your project.
This should include recent strategies for cybersecurity defenses. Also, describe the tasks completed in this milestone in an updated work breakdown structure (WBS), in Excel®, Word, or Project®, showing the actual time it took to complete each task. Finally, describe lessons learned while implementing this milestone. In addition, demonstrate that the milestone is fully completed by showing sufficient evidence. Depending on the project, the evidence can take the form of research findings, diagrams, designs, screenshots, databases, queries, source code, configurations, videos, policies, etc. Your evidence should result in at least 5 pages. This is in addition to your 2-page status report. If your evidence is in the form of videos, the videos should be at least 8–10 minutes long. This is only for your evidence.
Please see milestone below:
Milestone 1: Project Launch
The first phase focuses on the project’s initiation phase through planning and consulting with the stakeholders involved. This phase will initiate meetings to assess and describe the security vulnerabilities in the currently deployed endpoint architecture (Chandel et al., 2019). Each project shall have a clear charter, including the specific deliverables, goals, and expected results. The planning phase will also involve the development of a work schedule and responsibilities, as well as measures of checking the accomplishments made during its execution. This way, all the key stakeholders are on the same page regarding implementing the envisaged project, creating a platform for effective and efficient implementation.
In previous modules, you studied different types of cyberattacks and the concep
In previous modules, you studied different types of cyberattacks and the concepts and practices of threat modeling. Tools like the Lockheed Martin Cyber Kill Chain can help extend threat modeling into incident handling. Discuss using tools like the Cyber Kill Chain to handle incident response for emerging technologies.
In response to your peers, discuss the possible gaps left by using a tool like the one described in their initial posts.
To complete this assignment, review the Discussion Rubric.
RESPONSE ONE
Hello all,
Regarding all of the research experienced, the fourteen (14) page paper discussing the Kill Chain Defense Process from Lockheed Martin has inciteful information. Intelligence driven defense is the most effective form of protection for the network. Noting that every threat actor creates their own unique profile and personal attack signature to recognize helps an analyst narrow down the list of suspects for an attack. The attacks are further defined as Advanced Persistent Threats (APT). As each attack is attempted, every nuance is recorded and archived to anticipate future attacks.
From reading the paper, it notes that there is another way to recognizing the threat actor:
Find, Fix, Track, Target, Engage, and Assess.
The same way the military plans for an assault, this method is helpful to create an effective strategy to retaliate against a known threat. The paper also notes a case study that examines an email that proves and documents attack attempts by outside threats, or indicators. It shows how innocent messages can have elaborate code that gets embedded and can infiltrate the system undetected would like to see more examples of the case study in the future as there are threats that will be different from the last.
RESPONSE TWO
Good evening,
One tool that i found that is similar to the Lockheed Martin Cyber Kill Chain is the MITRE ATT&CK frame work. Both of these tools illustrate the phases of a cyber attack that include reconnaissance, weaponization and deliver, exploitation, installation, command and control, and finally actions. All of these tools do a great job in starting the process of incident response, and each have their advantages and disadvantages. Where they both succeed is that they are to identify how cyber attacks occur and the process in which they are trying to attack. These tools can help us during incident response as we are able to see the attacks and respond accordingly within procedures.
1. This Final Project P must be a technical paper on UX topics that have be
1. This Final Project P must be a technical paper on UX topics that have been pre-approved in earlier weeks by your instructor, using knowledge gained in the course.
2. The P Topic must be the one approved earlier.
3. It must follow the P Outline submitted earlier.
4. The p must:
● Use formatted references according to APA guidelines.
● Use 5 or more sources with annotated bibliography sources.
● NOT use Wikipedia or Webopedia as a reference–these sources have credibility issues.
● Be written in 5-7 pages – with full APA formatting.
● Follow a conventional report format (introduction, abstract (optional), body, conclusion, and references).
● Use images, models or diagrams to reinforce certain aspects of the pap.
● Limit Turnitin percent to 15% or less percent.
● Use provided rubric.
SOURCES TO CONSIDER:
● What is Plagiarism: https://owl.purdue.edu/owl/avoiding_plagiarism/plagiarism_faq.html
● What is Plagiarism and How to Avoid It: https://www.youtube.com/watch?v=4iw8J4Bwygs
● Writing@APUS: https://www.apus.edu/apus-library/resources-services/Writing/writing-center.html
● Purdue Online Writing Lab: https://owl.purdue.edu/writinglab/students/navigating_WL.html
● APA General Format: https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html
● Grammarly for Reviewing Papers and Writing:https://www.grammarly.com/
Instructions for properly completing the assignment:
1. Download the attached template called “ENTD120_Assignment7_Final_Project_Pap_LastNameFirst.doc”.
2. Change the file name by applying your Last Name and First Name in place of the LastNameFirst.
3. Then upload to Assignment #7 area of the Assignments.
Image Source:https://cdn.pixabay.com/photo/2015/06/01/09/04/samsung-793043_640.jpg
Attachments
ENTD120_Assignment7_Final_Project_Pap_LastNameFirst.docx(14.98 KB) Student Pap Setup Guide, APA Style 7th Edition.pdf(2.76 MB) WRITING AND APA Checklist 7th Edition.pdf(1.18 MB)
Work on your project milestone 1 and report your evidence to support that the
Work on your project milestone 1 and report your evidence to support that the milestone was completed.
Submit a 2-page status report that includes your evaluation of theories, principles, and best practices surrounding cybersecurity and your project.
This should include recent strategies for cybersecurity defenses. Also, describe the tasks completed in this milestone in an updated work breakdown structure (WBS), in Excel®, Word, or Project®, showing the actual time it took to complete each task. Finally, describe lessons learned while implementing this milestone. In addition, demonstrate that the milestone is fully completed by showing sufficient evidence. Depending on the project, the evidence can take the form of research findings, diagrams, designs, screenshots, databases, queries, source code, configurations, videos, policies, etc. Your evidence should result in at least 5 pages. This is in addition to your 2-page status report. If your evidence is in the form of videos, the videos should be at least 8–10 minutes long. This is only for your evidence.
Please see milestone below:
Milestone 1: Project Launch
The first phase focuses on the project’s initiation phase through planning and consulting with the stakeholders involved. This phase will initiate meetings to assess and describe the security vulnerabilities in the currently deployed endpoint architecture (Chandel et al., 2019). Each project shall have a clear charter, including the specific deliverables, goals, and expected results. The planning phase will also involve the development of a work schedule and responsibilities, as well as measures of checking the accomplishments made during its execution. This way, all the key stakeholders are on the same page regarding implementing the envisaged project, creating a platform for effective and efficient implementation.
In previous modules, you studied different types of cyberattacks and the concep
In previous modules, you studied different types of cyberattacks and the concepts and practices of threat modeling. Tools like the Lockheed Martin Cyber Kill Chain can help extend threat modeling into incident handling. Discuss using tools like the Cyber Kill Chain to handle incident response for emerging technologies.
In response to your peers, discuss the possible gaps left by using a tool like the one described in their initial posts.
To complete this assignment, review the Discussion Rubric.
RESPONSE ONE
Hello all,
Regarding all of the research experienced, the fourteen (14) page paper discussing the Kill Chain Defense Process from Lockheed Martin has inciteful information. Intelligence driven defense is the most effective form of protection for the network. Noting that every threat actor creates their own unique profile and personal attack signature to recognize helps an analyst narrow down the list of suspects for an attack. The attacks are further defined as Advanced Persistent Threats (APT). As each attack is attempted, every nuance is recorded and archived to anticipate future attacks.
From reading the paper, it notes that there is another way to recognizing the threat actor:
Find, Fix, Track, Target, Engage, and Assess.
The same way the military plans for an assault, this method is helpful to create an effective strategy to retaliate against a known threat. The paper also notes a case study that examines an email that proves and documents attack attempts by outside threats, or indicators. It shows how innocent messages can have elaborate code that gets embedded and can infiltrate the system undetected would like to see more examples of the case study in the future as there are threats that will be different from the last.
RESPONSE TWO
Good evening,
One tool that i found that is similar to the Lockheed Martin Cyber Kill Chain is the MITRE ATT&CK frame work. Both of these tools illustrate the phases of a cyber attack that include reconnaissance, weaponization and deliver, exploitation, installation, command and control, and finally actions. All of these tools do a great job in starting the process of incident response, and each have their advantages and disadvantages. Where they both succeed is that they are to identify how cyber attacks occur and the process in which they are trying to attack. These tools can help us during incident response as we are able to see the attacks and respond accordingly within procedures.
1. This Final Project P must be a technical paper on UX topics that have be
1. This Final Project P must be a technical paper on UX topics that have been pre-approved in earlier weeks by your instructor, using knowledge gained in the course.
2. The P Topic must be the one approved earlier.
3. It must follow the P Outline submitted earlier.
4. The p must:
● Use formatted references according to APA guidelines.
● Use 5 or more sources with annotated bibliography sources.
● NOT use Wikipedia or Webopedia as a reference–these sources have credibility issues.
● Be written in 5-7 pages – with full APA formatting.
● Follow a conventional report format (introduction, abstract (optional), body, conclusion, and references).
● Use images, models or diagrams to reinforce certain aspects of the pap.
● Limit Turnitin percent to 15% or less percent.
● Use provided rubric.
SOURCES TO CONSIDER:
● What is Plagiarism: https://owl.purdue.edu/owl/avoiding_plagiarism/plagiarism_faq.html
● What is Plagiarism and How to Avoid It: https://www.youtube.com/watch?v=4iw8J4Bwygs
● Writing@APUS: https://www.apus.edu/apus-library/resources-services/Writing/writing-center.html
● Purdue Online Writing Lab: https://owl.purdue.edu/writinglab/students/navigating_WL.html
● APA General Format: https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html
● Grammarly for Reviewing Papers and Writing:https://www.grammarly.com/
Instructions for properly completing the assignment:
1. Download the attached template called “ENTD120_Assignment7_Final_Project_Pap_LastNameFirst.doc”.
2. Change the file name by applying your Last Name and First Name in place of the LastNameFirst.
3. Then upload to Assignment #7 area of the Assignments.
Image Source:https://cdn.pixabay.com/photo/2015/06/01/09/04/samsung-793043_640.jpg
Attachments
ENTD120_Assignment7_Final_Project_Pap_LastNameFirst.docx(14.98 KB) Student Pap Setup Guide, APA Style 7th Edition.pdf(2.76 MB) WRITING AND APA Checklist 7th Edition.pdf(1.18 MB)
Follow the attach instructions to complete this work. Use the attached template
Follow the attach instructions to complete this work.
Use the attached template ( A and B) to complete this work.
Part A should be done separately, make sure it aligns with it rubric.( 60 points)
Part B should be done separately, make sure it aligns with it rubric.(100 points)