Vincent_Cooper 5-3 Final Project Milestone Cyber Defense Paper Draft

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

250

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by AdmiralMorningCapybara30

Report
1 5-3 Final Project Milestone: Cyber Defense Paper Draft Southern New Hampshire University CYB-250- Q6341 Instructor: Nancy McDonnell Vincent Cooper August 9 th , 2023
2 I. Trend in Personnel or Human Factors A. Human factors account for a large number of cyber security incidents. “In 2022 Data Breach Investigations Report, Verizon found that 82% of breaches involved the human element.” (Living Security Team, 2023.) Since our new smart headset has constant communication with the server that resides in the central office via a Bluetooth connection from the technicians’ cell phone, I believe its highly necessarily to implement a security strategy to provide a high level of protection for the company’s sensitive information including the employee’s data. The security trend or measure I decided to go with is Role-based access control (RBAC). “RBAC Restricts network access based on a person's role within an organization and has become one of the main methods for advanced access control.” (Living Security Team, 2023.) Role-based access control is a personnel trend that provides security for organizations and businesses. By setting each user’s roles and permissions based on their position and job tasks, RBAC lowers the risk of threats and unauthorized access. This useful trend also utilizes the principle of least privilege and ensures that only users with the proper permissions can access resources and information specific to their role. The use of this trend will help lower security risks when it comes to the smart headset being connected to the technician’s cellphone. B. based on my analysis of the threat model, Role-based access control can be considered a credible solution because it lowers the security risks in relation to unauthorized access to sensitive data within the company’s network using the smart headset. Since only authorized employees (technicians)will have access, the threat of a data leak or exploitation of sensitive data belonging to the company lowers significantly. This ensures that the technicians will be able to access the sensitive data on the new smart headset.
3 II. Data Protection Technology or Strategy  A. The data protection strategy or technology that I chose based on the threat model in relation to our new smart headset is data encryption. Data encryption is a technology that provides protection by transforming data into an incomprehensible format with the use of cryptographic techniques. It ensures that data is safe and secure, even if it is somehow compromised.  B. Data encryption protects sensitive information when it’s being transmitted between the smart headset and the company’s network which reflects the threat model positively. Due to the data being encrypted, it remains incomprehensible to hackers or anyone without authorized access. This makes the sensitive data useless to anyone who attempts to attack and compromise the Bluetooth connection or the server. III. System Protection A. The enterprise is protected using endpoint protection technologies, such as intrusion detection and prevention systems (IDPS) and endpoint security software. Endpoint security software protects devices from viruses and unauthorized access while IDPS scans network traffic for suspicious activity. (Malarkodi, K. P., 2023) B. Endpoint and server protection technologies guard against a variety of attack vectors, such as malware infection or unauthorized access to crucial systems, aligning with the threat model. The potential harm is reduced by these technologies' real-time detection and mitigation of hazards. (Malarkodi, K. P., 2023) 
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 References: Malarkodi, K. P., Sugumar, R., Baswaraj, D., Hasan, A., Kousalya, A., & Nirmala, S. (2023, March). Cyber Physical Systems: Security Technologies, Application and Defense. In 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS) (Vol. 1, pp. 2536-2546). IEEE. Möller, D. P. (2023). Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices (Vol. 103). Springer Nature. Rosário, A. T. (2022). Internet of Things, Security of Data, and Cyber Security. In Achieving Full Realization and Mitigating the Challenges of the Internet of Things (pp. 148-185). IGI Global. Zhang, E. (2023) What is Role-Based Access Control (RBAC)? Examples, Benefits, and More https://www.digitalguardian.com/blog/what-role-based-access-control-rbac-examples-benefits- and-more