OBJECTIVE & PURPOSE:
The purpose of this assignment is to help students be able to: Identify the bad actors in cyberspace, compare and contrast their resources, capabilities/techniques, motivations and aversion to risk (CTH1); Describe different types of cybersecurity attacks and their characteristics (CTH2); Describe potential system attacks and the actors that might perform them (CSF2); Describe cyber defense tools, methods, and components, as well as how to apply cyber defense methods to prepare a system to mitigate attacks (Kill Chain) (CSF3); and Understand the Federal, State, and Local Cyber Defense partners/structures/programs (ISC3)
DESCRIPTION OF THE ASSIGNMENT:
Your assignment will be to develop a written paper that will provide a summary of the following:
Bad Actors in Cyberspace: Identify the bad actors in cyberspace, compare and contrast their resources, capabilities/techniques, motivations and aversion to risk (Use references to support your claims).
Types of Cybersecurity Attacks: In your own words (no quotes, but use references to support your claims) describe five different types of cybersecurity attacks and their characteristics.
Types of System Attacks: In your own words (no quotes, but use references to support your claims) describe three different potential system attacks and the actors that might perform them.
Cyber Defense: In your own words (no quotes, but use references to support your claims) describe three different cyber defense tools, methods, and components, as well as how to apply cyber defense methods to prepare a system to mitigate attacks (kill chain).
Cyber Defense Partners/Structures/Programs: In your own words (no quotes, but use references to support your claims), describe the Federal, State, and Local Cyber Defense partners/structures/programs by outlining at least three examples.
Conclusion: In your own words (no quotes!!!), provide a conclusion that summarises the whole paper.
In particular, you will need to develop a five-page document (not more!) that outlines each of the section above and provides the details to address the points above.
FORMAT:
All text in the proposal should be word-processed (letter or correspondence-quality font), New Times Roman or Calibri, 12 point, double space and standard margins. The body of the proposal should be five-pages long (not including title page, Table of Contents, & Certificate of Authorship).
The following information should also be included:
Title page:
· Project Title
· Assignment Name and Number
· Name and e-mail
· Professor's name
· Class Name and Number (e.g. ISEC-615 Winter 2019)
· Due date
The report should also be done professionally and should include:
· Table of Contents (with sections & page numbers identified)
· Page numbers on all pages
· Clear and consistent headers of all sections
· Reference List following APA closely
· Certificate of Authorship - Use the certificate provided as the last page of the document!
Professional and appealing document is expected! As required by Code of Student Conduct and Academic Responsibility, please make sure to document appropriately your references and state it in your own words, or put in quotations.
This case will be graded out of 100 points. This assignment will weight 5 points of your final grade.
Does not meet standard
Nearly meets standard
Meets standard
Exceeds standard
Title page
Total mess, nothing is there
Few required items there
Evidence of all items, but not in a professional appearance
All required items there and look professional
TOC page
Total mess, nothing is there
Few required items there
Evidence of all items, but not in a professional appearance
All assignment sections noted, page numbers indicated, and look professional
Overall layout
Total mess
Few required items there
Evidence of all items, but not in a professional appearance
Assignment look highly professional
Bad Actors in Cyberspace
Not found
Few required items there
Evidence of all items, but not in a professional appearance
Section noted professionally and with proper APA citations
Types of Cybersecurity Attacks
Not found
Few required items there
Evidence of all items, but not in a professional appearance
Section noted highly professional with proper APA citations
Types of System Attacks
Not found
Few required items there
Evidence of all items, but not in a professional appearance
Section noted highly professional with proper APA citations
Cyber Defense
Not found
Few required items there
Evidence of all items, but not in a professional appearance
Section noted highly professional with proper APA citations
Cyber Defense Partners/Structures/Programs
Not found
Few required items there
Evidence of all items, but not in a professional appearance
Section noted highly professional with proper APA citations
Conclusion
Not found
Few required items there
Evidence of all items, but not in a professional appearance
Section noted highly professional with proper APA citations
References
Not found
Some references appear, but not in APA
All references appear, but not fully per APA
All references appear and follow closely APA
Certificate of Authorship
Not found
Parts of required items there
Evidence of all items, but not in a professional appearance
All required items there and in the template provided