Overview The Scenario Imagine you are a cybersecurity expert working

 

Overview

The Scenario

Imagine you are a cybersecurity expert working for a company looking to overcome issues mentioned in Section 6 of A Comprehensive Survey on Network Anomaly Detection (Please see an attached copy.).  Choose one or more of the issues as your focus. Research and write a 2-3 page business brief about the network anomaly detection tools and methods that you propose as solutions to your chosen issue(s). Your audience for this brief is C-Suite (company leadership). They have some technical knowledge but will need your guidance to understand the need for new tools and methods.

Research
Search Internet resources, vendor pages, open-source projects, and GitHub pages for network anomaly detection tools and methods that address your issue(s). Identify the best ones for the issue(s) you chose.

Write

Include three sections: Introduction, body, and conclusion. Follow the general guidelines of this example (Please see attached Business Brief document.). Answer the kinds of questions your leadership is likely to ask:

  • What’s the purpose of these tools? Isn’t a firewall enough protection? What problem are we trying to solve?
  • What tools and methods are you recommending? Why these and not others?
  • Explain specifically how the tools and methods you found overcome the challenges. Provide the names of the tool, developers, community, website, any other useful information.

Follow APA’s general guidelines formatting (Links to an external site.(https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html)) the paper.

 

Criteria

Read the assignment rubric to understand how your work will be assessed.

This assignment is also used to assess M.S. in Cybersecurity Program Learning Outcomes (PLOs) through the rubric. The PLO assessment will appear as separate rows within the rubric; they will not contribute points to the assignment.

For your information, the following PLOs are being assessed:

  • PLO 5: Defend infrastructure against common threats and attacks.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions