Cyber Security Project

ISE 510 Final Project Milestone Two Guidelines and Rubric Test Plan Prompt: For this milestone, w rite a test plan that detail s your approach to the security breach analysis and recommendations (final project) . You can do research to include any other topics you found relevant, but you should at least discuss the following:  Introduction o Introduce your company (Limetree Inc. ) and state its capabilities . o State your goal for the security breach analysis project .  Scope : o Defin e the scope of the project.  Hardware and Software : o Create a list of hardware and software present .  Resources : o Determine resources required with brief explanation of why each is required (e.g ., internet access, compu ters, additional personnel ).  Timeline and Benchmarks : o Discuss your timeline for the project (how long it will take and why) . o Discuss what regulatory be nchmark you will be using to make vulnerability determination .  Approach: o State your approach (Example: Review interview result, analyze virtual environment, review industry best practices , etc.) . o Define how you will categorize your findings ( Example : low, medium, high ). Guidelines for Submission : Your test plan should be 5–7 pages in length and should be submitted as a Microsoft Word document (or equivalent) using 12 -point Times New Roman font and one -inch margins Instructor Feedba ck: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more in formation, review these instructions . Critical Elements Exemplary (100%) Proficient (90 %) Needs Improvement (70 %) Not Evident (0%) Value Security Test Plan: Introduction and Goal Meets “Proficient” criteria and profile expertly balances necessary detail with brevity Provides brief profile of business or organization that has been attacked and its organizational goals Provides brief profile of busine ss or organization that has been attacked and its organizational goals but with gaps in clarity, detail, or accuracy Does not provide brief profile of business or organization that has been attacked and its organizational goals 15 Security Test Plan: Scope Meets “Proficient” criteria and response demonstrates nuanced understanding of using established cyber security standards in developing the scope of security test plans Determines scope of risk assessment, based on analysis of security breach and est ablished cyber security standards Determines scope of risk assessment, but response has gaps in accuracy or detail or is not based on analysis or established standards Does not determine scope of risk assessment 15 Security Test Plan:

Hardware and Software Meets “Proficient” criteria and response demonstrates nuanced understanding of using established cyber security standards in developing security test plans and assigning resources Creates list of system hardware and software within target of risk assessment, based on analysis of security breach and established cyber security standards Creates list of system hardware and software within target of risk assessment, but response has gaps in accuracy or detail or is not based on analysis or established standards Does not create list of system hardware and software within target of risk assessment 15 Security Test Plan: Resources Meets “Proficient” criteria and response demonstrates nuanced understanding of using established cyber security standards in developing security test plans and assigning resources Documents resources required for risk assessment, based on analysis of security breach and established cyber security standards Determines scope of risk assessment, but response has gaps in accuracy or detail or is not based on analysis or established standards Does not document resources required for risk assessment 15 Security Test Plan: Timeline and Benchmarks Meets “Proficient” criteria and response clearly outlines timeline and applicable benchmark data Outlines timeline and benchmark data , based on analysis of security breach and established cyber security standards Timeline and benchmarks listed however has gaps in accuracy or detail or is not based on analysis or established standards Does not outline timeline or benchmarks for risk assessment 15 Security Test Plan: Approach Meets “Proficient” criteria and response clearly lists acceptable approach for risk assessment Lists approach based on analysis of security breach and established cyber security standards Approach is listed however has gaps in accuracy or detail or is not based on analysis or established standards Does not list approach taken for risk assessment 15 Articulation of Response Submission is free of errors related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy to read format Submission has no major errors related to citations, grammar, spelling, syntax, or organization Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to c itations, grammar, spelling, syntax, or organization that prevent understanding of ideas 10 Total 100%