Work on your project milestone 2 and report your evidence to support that the

 
Work on your project milestone 2 and report your evidence to support that the milestone was completed.
Submit a 2-page status report that includes research conducted for the project that outlines cybersecurity principles. Also, describe the tasks completed in this milestone in an updated work breakdown structure (WBS), in Excel, Word, or Project, showing the actual time it took to complete each task. Finally, describe lessons learned while implementing this milestone. In addition, demonstrate that the milestone is fully completed by showing sufficient evidence. Depending on the project, the evidence can take the form of research findings, diagrams, designs, screenshots, databases, queries, source code, configurations, videos, policies, etc. Your evidence should result in at least 5 pages. This is in addition to your 2-page status report. If your evidence is in the form of videos, the videos should be at least 8–10 minutes long. This is only for your evidence.
Assignment Requirements
You should follow current APA format.
  
Milestone 2: Risk Assessment & Architecture Design
The second model evaluates the risk and defines the dangerous areas and threats at the organization’s endpoint. The assessment will include monitoring network traffic, reading the access logs, and regularly testing potential attack scenarios. Consequently, an appropriate Zero Trust architecture compatible with the organization’s settings will be developed. Some design features are micro-segmentation to reduce the possibility of lateral movement, implementation of MFA to enhance the access controls, and choosing EDR for accurate time threat identification. Scalability will also be considered in the architectural design to allow for growth within the organization in the future.

Leave a Comment

Scroll to Top