Paper 2

 

Overview

The Scenario

Imagine you are a cybersecurity expert working for a company looking to overcome issues mentioned in Section 6 of .  Choose one or more of the issues as your focus. Research and write a 2-3 page business brief about the network anomaly detection tools and methods that you propose as solutions to your chosen issue(s). Your audience for this brief is C-Suite (company leadership). They have some technical knowledge but will need your guidance to understand the need for new tools and methods.

Research
Search Internet resources, vendor pages, open-source projects, and GitHub pages for network anomaly detection tools and methods that address your issue(s). Identify the best ones for the issue(s) you chose.

Write

Include three sections: Introduction, body, and conclusion. Follow the general guidelines of . Answer the kinds of questions your leadership is likely to ask:

  • Whats the purpose of these tools? Isnt a firewall enough protection? What problem are we trying to solve?
  • What tools and methods are you recommending? Why these and not others?
  • Explain specifically how the tools and methods you found overcome the challenges. Provide the names of the tool, developers, community, website, any other useful information.

Follow the paper.

 

Criteria

Read the assignment rubric to understand how your work will be assessed.

This assignment is also used to assess M.S. in Cybersecurity Program Learning Outcomes (PLOs) through the rubric. The PLO assessment will appear as separate rows within the rubric; they will not contribute points to the assignment.

For your information, the following PLOs are being assessed:

  • PLO 5: Defend infrastructure against common threats and attacks.