Project 6: Global Approaches to Cybersecurity Start Here As a cybersecurity professional, it is important for you to not only understand the organizational and national human and technical factors, bu

Project 6: Global Approaches to CybersecurityStart HereAs a cybersecurity professional, it is important for you to not only understand the organizationaland national human and technical factors, but because you will encounter international threatsand concerns, it’s also important to be able to recognize threats from other countries.This is the last of six sequential projects. In this project, you are tasked with creating a chart thatdepicts your recommendations regarding the assessment and evaluation of the cybersecuritythreats and policies that can be linked to origins in the Middle East, Europe, Africa, and otherregions, including the relevant cultural differences in global security outlooks across theseregions. You will base your findings from the view of a consultant to an international companylooking to expand in those geographical areas. Generally, what kind of cybersecurity climate willthe company encounter?In your research, focus on a malicious cyber technology or capability (malware) that is specificto the global environment, i.e., Trojans, rootkits, worms, spyware, keystroke loggers, oradvanced persistent threats (do not select botnets, as they will be studied separately in thisproject). Along with your country threat assessments, you must also assess and evaluate theevolution of this malware and recommend how global cybersecurity policies might be used tocounter the effects.You will review the characteristics of your chosen malware by discussing six specificcharacteristics (purpose, size, attack method, attribution, etc.) and describe how thesecharacteristics have emerged, changed, or evolved over the past five to 10 years. Also discusswhat contributing factors may cause these characteristics to change, and how thesecharacteristics may change over the next 10 years. How might these technologies be counteredby global cybersecurity policy controls (do not describe technology controls) in the future?Support your position with policy, security practice, theories, principles, and recommendationsbased on your own thoughts, examples, and cited references.Finally, you will study botnets, which are a specific and particularly pervasive type of malware.You will learn about the global nature of botnets and the emerging security issues associatedwith botnets, to include their impact on the formulation of global cybersecurity policies.There are 13 steps in this project. Begin with the information below to review your projectscenario.TranscriptCompetenciesYour work will be evaluated using the competencies listed below.2.1: Identify and clearly explain the issue, question, or problem under critical consideration.7.2: Evaluate international cybersecurity policy.8.2: Evaluate specific cybersecurity threats and the combination of technologies and policies thatcan address them.Step 1: Project Practice – SIMTRAY Cyber Policy for a Small World: Day 1As a consultant to a global risk mitigation company, you will need an overview of globalcybersecurity issues and related policies. The global connections that characterize moderncyberspace and catalyze near-instantaneous communication and productivity are also theAchilles’ heel of governments. Cybernetworks, like their physical counterparts, are prone tobeing used as instruments of sabotage, espionage, disruption, and war. In order to familiarizeyourself with these types of global issues and relevant terminology and concepts, open theSIMTRAY titled ‘Cyber Policy for a Small World.’ NOTE: To view some SIMTRAYmodules in this project, Flash must be enabled in your browser. A quick internet search for“enable flash” in IE, Edge, Chrome, Firefox, or Safari will yield instructions if you need them.SIMTRAY is a simulation that will give you a sense of the need for cybersecurity personnel tomaintain a global perspective. There are no local incidents in cyberspace, but more importantly,you will reflect on US policy on cybercrime and cyberwarfare. Some of the issues and topicsaddressed in this exercise include EMP attack, the role of state actors, and attacks usingtechnologies such as botnets.The SIMTRAY will provide you with scores to give you a sense on how well you are graspingthe concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY asmany times as you need. Record your best score and at least one lesson learned from the exerciseto include in your report at the end of the three-day simulation.Step 2: Project Practice – SIMTRAY Cyber Policy for a Small World: Day 2In the previous step, you started to examine the SIMTRAY, ‘Cyber Policy for a Small World.”In this step, continue to focus on SIMTRAY, but document the specific technologies and policiesthat you believe could be better addressed in the global scene. You may encounter the followingtopics in this exercise: EMP Attack, the role of state actors, and attacks using technologies suchas botnets.The SIMTRAY will provide you with scores to give you a sense on how well you are graspingthe concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY asmany times as you need. Record your best score and at least one lesson learned from the exerciseto include in your report at the end of the three-day simulation.Step 3: Project Practice – SIMTRAY Cyber Policy for a Small World: Day 3In this step, you should continue to explore the scenarios within SIMTRAY, ‘Cyber Policy for aSmall World.’ If you have not already, you will most likely encounter the following topics inthis exercise: EMP Attack, the role of state actors, and attacks using technologies suchas botnets.Document events that you experience in the exercise that might affect the global cybersecuritypolicy. Think about threats brought about by new technologies and how these threats are or couldbe handled by global policy.The SIMTRAY will provide you with scores to give you a sense on how well you are graspingthe concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY asmany times as you need in order to have a firm grasp of the concepts. Compile your recordedscores, lessons learned and documented technologies and policies into a one-page report.Submit your report for feedback.Submission for Cyber Policy for a Small World Simtray ReportPrevious submissionsStep 4: Review Malicious Cyber TechnologyNow that you have practiced the SIMTRAY to familiarize yourself with global issues, you willfocus on a specific malicious cyber technology or capability (malware) that is specific to theglobal environment. Select one technology or capability and post a brief description on thediscussion board of the technology, its intended use, and how it is being used maliciously.Include a brief discussion of how your selected technology has evolved and how globalcybersecurity policies might be used to counter its effects.Possible choices include, but are not limited to: Trojans, rootkits, worms, spyware, keystrokeloggers, or advanced persistent threats (APTs). Do not select botnets.Step 5: Review International Cybersecurity ThreatsDue to the vast differences in culture, leadership, laws, and policies of countries around theglobe, cybersecurity threats are handled differently. These differences result in variousapproaches to cybersecurity economic issues, different tolerances for cybersecurity culturalissues, and different responses to cyberterrorism. Ultimately, global perspectives on internationalcybersecurity legal issues have broad impact as different nations attempt to both thrive in theglobal economic environment and survive in light of global cyberthreats. Organizations thatdesire to expand into foreign nations must consider these differences, particularly when they arenot relevant when operating in the United States.For this step, you will evaluate global cybersecurity threats coming from a minimum of threedifferent regions; for example, the Middle East, Europe, Africa, Russia, or other regions. Morespecifically, think about networked computing systems being critical to businesses, commerce,education, and governments. Keeping them secure is no longer solely the concern of corporateentities and the relevant regulatory environments. Global governments must also work to ensurethe security of their networks. Also consider your selected technology from the previous step.Complete the International Cybersecurity Threat Matrix for at least three countries or regions,aside from the United States and North America.Step 6: Review NATO and United NationsComplete the Andrew Bowers NATO Intern eLearning Module for an overview of the NATOcybersecurity stance. NOTE: To view some modules in this project, Flash must beenabled in your browser. A quick internet search for “enable flash” in IE, Edge, Chrome,Firefox, or Safari will yield instructions if you need them.Evaluate its effectiveness as well as the effectiveness of the United Nations cybersecurity stancein helping to contribute to cybersecurity international policy over the next decade. For moreinformation, read about international cybersecurity approaches.Update the International Cybersecurity Threat Matrix from the previous step, based on yourfindings in this step. Submit your matrix for feedback. This matrix will be included in your finalreport.Submission for International Cybersecurity Threat MatrixPrevious submissionsStep 7: Compile International Cybersecurity Environmental Scan FindingsCompile all of the information you found in the previous two steps and write a two-pagesummary. Use the International Cybersecurity Environmental Scan Template to guide yoursummary, which should include descriptions of the regions and of the cybersecurity threatsprevalent in the regions selected. Address the role of international bodies (NATO and UnitedNations) in influencing and contributing to international cybersecurity policies.Submit your summary for feedback. This summary will be included in your final report.Submission for International Cybersecurity Environmental Scan SummaryStep 8: Create Regional Fact Sheet on Identification and Implication of CybersecurityThreatsTo illustrate the impact of cybersecurity threats, develop a one-page fact sheet using one of theregions from your matrix. Explain the cybersecurity threat experienced in one region, theevolution of the associated malware, the implications (e.g., economic, political, national security,etc.) of it to that region and how global cybersecurity policies might be used to counter theeffects.You will discuss six specific characteristics (purpose, size, attack method, attribution, etc.) of themalware and describe how these characteristics have emerged, changed, or evolved over the pastfive to 10 years. Also discuss what contributing factors may cause these characteristics tochange, and how these characteristics may change over the next 10 years. How might thesetechnologies be countered by global cybersecurity policy controls (do not describe technologycontrols) in the future? Support your position with policy, security practice, theories, principles,and recommendations based on your own thoughts, examples, and cited references.Submit your regional fact sheet for feedback.Submission for Regional Fact SheetPrevious submissionsStep 9: Review Global Cybersecurity Threats: Deep Dive on BotnetsA botnet is a particular type of cyberthreat in which a network of computers is infectedwith malware and then co-opted and controlled by one entity. Botnets are globallypervasive and used in many modern-day cyber intrusions. It’s important to understandhow they operate and their impact to global security.Review the learning content modules listed below and create notes using the BotnetResearch Template.Learning Content Modules: Botnets Creating Profit Global Botnets and Emerging Issues Botnet Attack at Westwood MutualNOTE: To view some modules in this project, Flash must be enabled in your browser. Aquick internet search for “enable flash” in IE, Edge, Chrome, Firefox, or Safari will yieldinstructions if you need them.The notes in the research template will be used for your evaluation of the internationalconcerns of botnets in the next step.Submission for Botnet EvaluationPrevious submissionsStep 10: Evaluate BotnetsEvaluate the issues associated with botnets and with formulating global cybersecurity policy.Identify the characteristics of botnets, and how they have evolved over the past five to 10 years.Research the key technical features of botnets and determine the factors that contribute to botnetcharacteristics to change. Your Botnet Evaluation should be one-and-a-half to two pages inlength.Submit your Botnet Evaluation for feedback.Submission for Botnet EvaluationPrevious submissionsStep 11: Discuss BotnetsIn a two-page document, Discuss six specific characteristics of the global nature of botnets (such as purpose, size,attack method, attribution, etc.). Describe how these characteristics have emerged, changed, or evolved over the past fiveto 10 years. Describe the key technical features of six example botnets. Discuss what contributing factors may cause botnet characteristics to change, and howthese characteristics may change over the next 10 years.Submit your Botnet Discussion for feedback.Submission for Botnet DiscussionPrevious submissionsStep 12: Consider the Future of BotnetsCreate a one-page document that answers the following questions, taking into consideration yourcountry research and botnet reviews. How might future botnets be countered by global cybersecurity policy controls (do notdescribe technology controls) in the future? What impact could global cybersecurity policies have on the eradication of botnets?Submit your Botnet Conclusion for feedback.Submission for Botnet ConclusionPrevious submissionsStep 13: Compose Global Cybersecurity Environment ReportThroughout this project, you have researched and considered global cybersecurity issues,technologies, and related policies. You have evaluated various countries and internationalorganizations. It is now time to compose your consultant’s report to GlobalOutreachdocumenting your findings. Refer to the instruction for the Global Cybersecurity EnvironmentReport for additional guidelines.Submit your completed report.Check Your Evaluation CriteriaBefore you submit your assignment, review the competencies below, which your instructor willuse to evaluate your work. A good practice would be to use each competency as a self-check toconfirm you have incorporated all of them. To view the complete grading rubric, click My Tools,select Assignments from the drop-down menu, and then click the project title. 2.1: Identify and clearly explain the issue, question, or problem under criticalconsideration. 7.2: Evaluate international cybersecurity policy. 8.2: Evaluate specific cybersecurity threats and the combination of technologies andpolicies that can address them.Submission for Global Cybersecurity Environment ReportPrevious submissions

Looking for this or a Similar Assignment? Click below to Place your Order

Open chat