Scenario
Your instructor will provide you with the scenario for this project in an announcement. The scenario will provide you with the beginning of a security plan that documents areas relevant to your decision making for the project.
Additionally, a fellow analyst is completing an evaluation of network protection technologies, specifically intrusion detection systems (IDSs) and intrusion prevention systems (IPSs), to help you with your decision-making process. You will be provided with the completed evaluation matrix in Module Seven for use in completing Project Three. Your manager has also provided a list of questions that they would use to evaluate the organizational needs in an IDS or IPS.
You will find the technology evaluation criteria and your managers questions in the Technology Evaluation Criteria document, which can be found in the Project Three Milestone task in Module Five of your course. For your submission, you will download and fill out the Technology Evaluation Criteria Worksheet, linked in the What to Submit section below and in the Project Three Milestone task in Module Five.
Based on your analysis of the technology evaluation criteria, the details provided in the scenario, and your managers guiding questions, you will identify the highest priority criteria and select Fundamental Security Design Principles related to your prioritization.
Prompt
Submit a completed Technology Evaluation Criteria Worksheet, which includes a filled-out table, your prioritized list, and two Fundamental Security Design Principles that best encompass your list. You will also need to justify and explain your selections.
Specifically, you must address the critical elements listed below.
Complete the blank column in the technology evaluation criteria table in the provided worksheet. Use the managers questions and the evaluation criteria to identify relevant company profile information for 10-13 evaluation criteria from the organizational security plan material in the scenario.
Based on your assessment of the relevant information from the organizational security plan, provide a prioritized list of the three most important evaluation criteria. Justify your rationale for determining the priority of your selected elements.
Select two Fundamental Security Design Principles that best encompass the priority list. Explain the correlation between your priority list and the principles you identified.
What to Submit
Download, fill out, and submit the Technology Evaluation Criteria Worksheet, which includes the technology evaluation criteria table, your prioritized list, and your chosen Fundamental Security Design Principles.
Attached Files (PDF/DOCX): scenario.pdf, Technology Evaluation Criteria.pdf, CYB 220 Module Five Technology Evaluation Criteria Worksheet.docx
Note: Content extraction from these files is restricted, please review them manually.

Leave a Reply
You must be logged in to post a comment.