✍ ️Get Free Writing Help
WhatsApp

Project 2 – Checklist Project 2 Requires the Following Three Deliverables: 1.


Project 2 – Checklist
Project 2 Requires the Following Three Deliverables:

1. Cybersecurity Incident Report (CIR) – 12 pages minimum
2. Executive Summary (one-page summary at the beginning of your CIR) 3. Lab Report

Specific Details

1. Cybersecurity Incident Report (CIR) – 12 pages minimum

A. Develop a Wireless and BYOD Security Plan

• Executive summary: A one-page summary at the beginning of the report. • Using NIST 800-153, provide an executive summary to answer other

security concerns related to BYOD and wireless.
• Provide answers to the threat of unauthorized equipment or rogue access

points on the company wireless network and the methods to find other

rogue access points.
• Describe how to detect rogue access points and how they can actually

connect to the network.
• Describe how to identify authorized access points within your network. • Within your plan, include how the Cyber Kill Chain framework and

approach could be used to improve the incident response times for

networks.
• Include this at the beginning of your CIR as the basis for all wireless- and

BYOD-related problems within the network.
• Title the section “Wireless and BYOD Security Plan.”

B. Track Suspicious Behavior

Propose how you would track suspicious employee movements using various tools and techniques.

“How would you track the location of the company asset?”

Explain how identity theft could occur and how MAC spoofing could take

place in the workplace.

How would you protect against both identity theft and MAC spoofing?

Address if it is feasible to determine if MAC spoofing and identity theft has

taken place in the workplace.

Include a whitelist of approved devices for this network. Examples may

include authorized access points, firewalls, and other similar devices.

Discuss any legal issues, problems, or concerns with your actions.

What should be conducted before starting this investigation?

Were your actions authorized, was the notification valid, or are there any other concerns?

Include your responses as part of the CIR with the title “Tracking Suspicious Behavior.”

C. Develop a Continuous Improvement Plan

Provide for your leadership a description of wired equivalent privacy and also Wi-Fi protected access networks, for education purposes.

Include the pros and cons of each type of wireless network, as well as WPA2.

Define the scheme for using preshared keys for encryption.

Is this FIPS 140-2 compliant, and if not, what is necessary to attain this?

Include a list of other wireless protocols, such as Bluetooth

Provide a comparative analysis of four protocols including the pros, cons,

and suitability for your company.

Include your responses as part of the CIR with the title “Continuous

Improvement Plan.”

D. Develop Remote Configuration Management

Include a description of remote configuration management and describe how it is used in maintain the security posture of your company’s network

The owner of an undocumented device must be removed from the network. Implement this and explain how you would remove the employee’s device.

Explain how you would show proof that the device was removed?

Include your responses as part of the CIR with the title “Remote

Configuration Management.”

E. Investigate Employee Misconduct

Provide a definition of ad hoc wireless networks and identify the threats and vulnerabilities to a company.

How could this network contribute to the company infrastructure and how would you protect against those threats?

Address self-configuring dynamic networks on open access architecture and the threats and vulnerabilities associated with them, as well as the possible protections that should be implemented.

How would you detect an employee connecting to a self-configuring network or an ad hoc network?

How would signal hiding be a countermeasure for wireless networks?

What are the countermeasures for signal hiding?

How is the service set identifier (SSID) used by cybersecurity professionals on wireless networks?

Are these always broadcast, and if not, why not?

How would you validate that the user is working outside of business hours?

Include your responses as part of the CIR with the title “Employee

Misconduct.”

F. Analysis of Wireless Traffic

• Analyze wireless traffic.
• Include your responses from the lab as part of the CIR with the title

“Wireless Traffic Analysis.”

2. Executive Summary – one page

Provide a one-page summary at the beginning of your CIR

3. Lab Experience Report with Screenshots

Graduate School level Report.

Summarizes the Lab Experience and Findings

Responds to the Questions

Format this report as recommended in the document “How to Write a good

Lab Report”

Tables and Figures

In all reports, and especially in the LAB Report, the screen pictures are images inserted as figures in your report.

Number figures consecutively throughout your paper.

Figures should be labeled with a number followed by a descriptive caption or title.

Captions should be concise but comprehensive and contain at least 20 words. They should describe the data shown, draw attention to important features contained within the figure, and may sometimes also include interpretations of the data.

This is a good reference: Purdue Online Writing Lab – Tables and Figures.

Additional examples: APA Style – Sample Figures.

The post Project 2 – Checklist Project 2 Requires the Following Three Deliverables: 1. appeared first on PapersSpot.

Don`t copy text!