Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

Project 6: Global Approaches to Cybersecurity Start Here As a cybersecurity professional, it is important for you to not only understand the organizational and national human and technical factors, bu

Project 6: Global Approaches to Cybersecurity

Start Here

As a cybersecurity professional, it is important for you to not only understand the organizational

and national human and technical factors, but because you will encounter international threats

and concerns, it's also important to be able to recognize threats from other countries.

This is the last of six sequential projects. In this project, you are tasked with creating a chart that

depicts your recommendations regarding the assessment and evaluation of the cybersecurity

threats and policies that can be linked to origins in the Middle East, Europe, Africa, and other

regions, including the relevant cultural differences in global security outlooks across these

regions. You will base your findings from the view of a consultant to an international company

looking to expand in those geographical areas. Generally, what kind of cybersecurity climate will

the company encounter?

In your research, focus on a malicious cyber technology or capability (malware) that is specific

to the global environment, i.e., Trojans, rootkits, worms, spyware, keystroke loggers, or

advanced persistent threats (do not select botnets, as they will be studied separately in this

project). Along with your country threat assessments, you must also assess and evaluate the

evolution of this malware and recommend how global cybersecurity policies might be used to

counter the effects.

You will review the characteristics of your chosen malware by discussing six specific

characteristics (purpose, size, attack method, attribution, etc.) and describe how these

characteristics have emerged, changed, or evolved over the past five to 10 years. Also discuss

what contributing factors may cause these characteristics to change, and how these

characteristics may change over the next 10 years. How might these technologies be countered

by global cybersecurity policy controls (do not describe technology controls) in the future?

Support your position with policy, security practice, theories, principles, and recommendations

based on your own thoughts, examples, and cited references.

Finally, you will study botnets, which are a specific and particularly pervasive type of malware.

You will learn about the global nature of botnets and the emerging security issues associated

with botnets, to include their impact on the formulation of global cybersecurity policies.

There are 13 steps in this project. Begin with the information below to review your project

scenario.

Transcript

Competencies

Your work will be evaluated using the competencies listed below.

2.1: Identify and clearly explain the issue, question, or problem under critical consideration.

7.2: Evaluate international cybersecurity policy.

8.2: Evaluate specific cybersecurity threats and the combination of technologies and policies that

can address them.

Step 1: Project Practice - SIMTRAY Cyber Policy for a Small World: Day 1

As a consultant to a global risk mitigation company, you will need an overview of global

cybersecurity issues and related policies. The global connections that characterize modern

cyberspace and catalyze near-instantaneous communication and productivity are also the

Achilles' heel of governments. Cybernetworks, like their physical counterparts, are prone to

being used as instruments of sabotage, espionage, disruption, and war. In order to familiarize

yourself with these types of global issues and relevant terminology and concepts, open the

SIMTRAY titled "Cyber Policy for a Small World." NOTE: To view some SIMTRAY

modules in this project, Flash must be enabled in your browser. A quick internet search for

“enable flash” in IE, Edge, Chrome, Firefox, or Safari will yield instructions if you need them.

SIMTRAY is a simulation that will give you a sense of the need for cybersecurity personnel to

maintain a global perspective. There are no local incidents in cyberspace, but more importantly,

you will reflect on US policy on cybercrime and cyberwarfare. Some of the issues and topics

addressed in this exercise include EMP attack, the role of state actors, and attacks using

technologies such as botnets.

The SIMTRAY will provide you with scores to give you a sense on how well you are grasping

the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as

many times as you need. Record your best score and at least one lesson learned from the exercise

to include in your report at the end of the three-day simulation.

Step 2: Project Practice - SIMTRAY Cyber Policy for a Small World: Day 2

In the previous step, you started to examine the SIMTRAY, "Cyber Policy for a Small World.”

In this step, continue to focus on SIMTRAY, but document the specific technologies and policies

that you believe could be better addressed in the global scene. You may encounter the following

topics in this exercise: EMP Attack, the role of state actors, and attacks using technologies such

as botnets.

The SIMTRAY will provide you with scores to give you a sense on how well you are grasping

the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as

many times as you need. Record your best score and at least one lesson learned from the exercise

to include in your report at the end of the three-day simulation.

Step 3: Project Practice - SIMTRAY Cyber Policy for a Small World: Day 3

In this step, you should continue to explore the scenarios within SIMTRAY, "Cyber Policy for a

Small World." If you have not already, you will most likely encounter the following topics in

this exercise: EMP Attack, the role of state actors, and attacks using technologies such

as botnets.

Document events that you experience in the exercise that might affect the global cybersecurity

policy. Think about threats brought about by new technologies and how these threats are or could

be handled by global policy.

The SIMTRAY will provide you with scores to give you a sense on how well you are grasping

the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as

many times as you need in order to have a firm grasp of the concepts. Compile your recorded

scores, lessons learned and documented technologies and policies into a one-page report.

Submit your report for feedback.

Submission for Cyber Policy for a Small World Simtray Report

Previous submissions

Step 4: Review Malicious Cyber Technology

Now that you have practiced the SIMTRAY to familiarize yourself with global issues, you will

focus on a specific malicious cyber technology or capability (malware) that is specific to the

global environment. Select one technology or capability and post a brief description on the

discussion board of the technology, its intended use, and how it is being used maliciously.

Include a brief discussion of how your selected technology has evolved and how global

cybersecurity policies might be used to counter its effects.

Possible choices include, but are not limited to: Trojans, rootkits, worms, spyware, keystroke

loggers, or advanced persistent threats (APTs). Do not select botnets.

Step 5: Review International Cybersecurity Threats

Due to the vast differences in culture, leadership, laws, and policies of countries around the

globe, cybersecurity threats are handled differently. These differences result in various

approaches to cybersecurity economic issues, different tolerances for cybersecurity cultural

issues, and different responses to cyberterrorism. Ultimately, global perspectives on international

cybersecurity legal issues have broad impact as different nations attempt to both thrive in the

global economic environment and survive in light of global cyberthreats. Organizations that

desire to expand into foreign nations must consider these differences, particularly when they are

not relevant when operating in the United States.

For this step, you will evaluate global cybersecurity threats coming from a minimum of three

different regions; for example, the Middle East, Europe, Africa, Russia, or other regions. More

specifically, think about networked computing systems being critical to businesses, commerce,

education, and governments. Keeping them secure is no longer solely the concern of corporate

entities and the relevant regulatory environments. Global governments must also work to ensure

the security of their networks. Also consider your selected technology from the previous step.

Complete the International Cybersecurity Threat Matrix for at least three countries or regions,

aside from the United States and North America.

Step 6: Review NATO and United Nations

Complete the Andrew Bowers NATO Intern eLearning Module for an overview of the NATO

cybersecurity stance. NOTE: To view some modules in this project, Flash must be

enabled in your browser. A quick internet search for “enable flash” in IE, Edge, Chrome,

Firefox, or Safari will yield instructions if you need them.

Evaluate its effectiveness as well as the effectiveness of the United Nations cybersecurity stance

in helping to contribute to cybersecurity international policy over the next decade. For more

information, read about international cybersecurity approaches.

Update the International Cybersecurity Threat Matrix from the previous step, based on your

findings in this step. Submit your matrix for feedback. This matrix will be included in your final

report.

Submission for International Cybersecurity Threat Matrix

Previous submissions

Step 7: Compile International Cybersecurity Environmental Scan Findings

Compile all of the information you found in the previous two steps and write a two-page

summary. Use the International Cybersecurity Environmental Scan Template to guide your

summary, which should include descriptions of the regions and of the cybersecurity threats

prevalent in the regions selected. Address the role of international bodies (NATO and United

Nations) in influencing and contributing to international cybersecurity policies.

Submit your summary for feedback. This summary will be included in your final report.

Submission for International Cybersecurity Environmental Scan Summary

Step 8: Create Regional Fact Sheet on Identification and Implication of Cybersecurity

Threats

To illustrate the impact of cybersecurity threats, develop a one-page fact sheet using one of the

regions from your matrix. Explain the cybersecurity threat experienced in one region, the

evolution of the associated malware, the implications (e.g., economic, political, national security,

etc.) of it to that region and how global cybersecurity policies might be used to counter the

effects.

You will discuss six specific characteristics (purpose, size, attack method, attribution, etc.) of the

malware and describe how these characteristics have emerged, changed, or evolved over the past

five to 10 years. Also discuss what contributing factors may cause these characteristics to

change, and how these characteristics may change over the next 10 years. How might these

technologies be countered by global cybersecurity policy controls (do not describe technology

controls) in the future? Support your position with policy, security practice, theories, principles,

and recommendations based on your own thoughts, examples, and cited references.

Submit your regional fact sheet for feedback.

Submission for Regional Fact Sheet

Previous submissions

Step 9: Review Global Cybersecurity Threats: Deep Dive on Botnets

A botnet is a particular type of cyberthreat in which a network of computers is infected

with malware and then co-opted and controlled by one entity. Botnets are globally

pervasive and used in many modern-day cyber intrusions. It's important to understand

how they operate and their impact to global security.

Review the learning content modules listed below and create notes using the Botnet

Research Template.

Learning Content Modules:

 Botnets Creating Profit

 Global Botnets and Emerging Issues

 Botnet Attack at Westwood Mutual

NOTE: To view some modules in this project, Flash must be enabled in your browser. A

quick internet search for “enable flash” in IE, Edge, Chrome, Firefox, or Safari will yield

instructions if you need them.

The notes in the research template will be used for your evaluation of the international

concerns of botnets in the next step.

Submission for Botnet Evaluation

Previous submissions

Step 10: Evaluate Botnets

Evaluate the issues associated with botnets and with formulating global cybersecurity policy.

Identify the characteristics of botnets, and how they have evolved over the past five to 10 years.

Research the key technical features of botnets and determine the factors that contribute to botnet

characteristics to change. Your Botnet Evaluation should be one-and-a-half to two pages in

length.

Submit your Botnet Evaluation for feedback.

Submission for Botnet Evaluation

Previous submissions

Step 11: Discuss Botnets

In a two-page document,

 Discuss six specific characteristics of the global nature of botnets (such as purpose, size,

attack method, attribution, etc.).

 Describe how these characteristics have emerged, changed, or evolved over the past five

to 10 years.

 Describe the key technical features of six example botnets.

 Discuss what contributing factors may cause botnet characteristics to change, and how

these characteristics may change over the next 10 years.

Submit your Botnet Discussion for feedback.

Submission for Botnet Discussion

Previous submissions

Step 12: Consider the Future of Botnets

Create a one-page document that answers the following questions, taking into consideration your

country research and botnet reviews.

 How might future botnets be countered by global cybersecurity policy controls (do not

describe technology controls) in the future?

 What impact could global cybersecurity policies have on the eradication of botnets?

Submit your Botnet Conclusion for feedback.

Submission for Botnet Conclusion

Previous submissions

Step 13: Compose Global Cybersecurity Environment Report

Throughout this project, you have researched and considered global cybersecurity issues,

technologies, and related policies. You have evaluated various countries and international

organizations. It is now time to compose your consultant's report to GlobalOutreach

documenting your findings. Refer to the instruction for the Global Cybersecurity Environment

Report for additional guidelines.

Submit your completed report.

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will

use to evaluate your work. A good practice would be to use each competency as a self-check to

confirm you have incorporated all of them. To view the complete grading rubric, click My Tools,

select Assignments from the drop-down menu, and then click the project title.

 2.1: Identify and clearly explain the issue, question, or problem under critical

consideration.

 7.2: Evaluate international cybersecurity policy.

 8.2: Evaluate specific cybersecurity threats and the combination of technologies and

policies that can address them.

Submission for Global Cybersecurity Environment Report

Previous submissions

Show more
3cubedeveloper
3cubedeveloper
  • @
  • 838 orders completed
ANSWER

Tutor has posted answer for $45.00. See answer's preview

$45.00

* **** uploaded the ************ ************* ************* Scan ********* I **** removed ***** ***** because * ** getting ** ***** of **** **** ****** when * *** to ****** them * believe *** **** the ***** ***** **** * **** ******* * will **** *** ******* ******** laterKind *******

Click here to download attached files: Botnet_Discussion_Step_11.docx
Click here to download attached files: Regional_Fact_Sheet_8.docx
Click here to download attached files: Future_of_Botnets_12.docx
Click here to download attached files: InternationalCybersecurityEnvironmentalScanTemplate.docx
Click here to download attached files: BotnetResearchTemplate_Revised.docx
Click here to download attached files: Rootkits_Reviewed_Step_4_Revised.docx
Click here to download attached files: InternationalCybersecurityThreatMatrix_Revised.docx
Click here to download attached files: Botnet_Evaluation_Step_10_Revised.docx
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question