Posted: April 24th, 2025
To complete this assignment, review the prompt and grading rubric in the
Project Three Milestone Guidelines and Rubric
. You will also need to access the
Project Three Milestone Decision Aid Template Word Document
.
CYB 200 Project Three Milestone Guidelines and Rubric
Overview
As a professional in cybersecurity, you should be aware of the best-prac�ce tac�cs and methods necessary for responding to a variety of cyber threat actors. For this ac�vity, you will
research and determine factors to detect, characterize, and counter a range of threat actor situa�ons to place into a decision aid template. This milestone will prepare you to think proac�vely
and ethically in terms of what threat actors would do to a�ack organiza�onal assets.
Be thorough in comple�ng the decision aid. Upon comple�on, this is a recommended ar�fact for your cyber playbook and will be tagged with the Human Security icon. You may use this
template or a blank Word document to address the cri�cal elements for the Project Three Milestone. This decision aid will inform your technical brief in Project Three, which will be based on
a scenario your instructor provides in the Project Three announcement. You will not use all the tac�cs and methods you researched, but rather choose and refine your answers based on the
specific situa�on.
Prompt
In your decision aid, address the cri�cal elements listed below.
I. Detec�on
A. Describe at least five best prac�ces or methods for detec�ng a threat actor specific to the categories in the decision aid template. Use research from outside resources to
support
your responses.
II. Characteriza�on
A. Define at least five types of threat actors specific to the categories in the decision aid template. Use research from
outside resources
to support your responses.
B. Describe at least four mo�va�ons or desired outcomes of threat actors specific to the categories in the decision aid template. Use research from outside resources to support
your responses.
C. Iden�fy the company assets of at least seven types of ins�tu�ons that may be at risk from a threat actor specific to the categories in the decision aid template. Use research from
outside resources to support your responses.
III. Response
A. Describe at least three poten�al counterstrategies or tac�cs that you might use to respond to and counter a threat actor (reac�ve approach). Use research from outside resources
to support your responses.
B. Describe at least three poten�al strategies or tac�cs that you would employ to reduce the likelihood of the same situa�on happening again (proac�ve approach). Use research
from outside resources to support your responses.
10/2/24, 9:21 AM Assignment Information
https://learn.snhu.edu/d2l/le/content/1698647/viewContent/35102837/View 1/3
https://learn.snhu.edu/content/enforced/1698647-CYB-200-13406.202481-1/course_documents/CYB%20200%20Project%20Three%20Milestone%20Decision%20Aid%20Template x?isCourseFile=true&ou=1698647
https://learn.snhu.edu/content/enforced/1698647-CYB-200-13406.202481-1/course_documents/CYB%20200%20Project%20Three%20Milestone%20Decision%20Aid%20Template x?isCourseFile=true&ou=1698647
https://app.readspeaker.com/cgi-bin/rsent?customerid=9568&url=https%3A%2F%2Flearn.snhu.edu%2Fcontent%2Fenforced%2F1698647-CYB-200-13406.202481-1%2FProject%2520Three%2520Milestone%2520Guidelines%2520and%2520Rubric.html&lang=en_us&readid=d2l_read_element_1
C. Explain your reason for determining the threat actor you chose (Response: Parts A and B) and jus�fy your strategies to both proac�vely and reac�vely respond to that type of
threat actor.
What to Submit
Your submission should address the cri�cal elements using either the decision aid template or a blank Word document and should be wri�en in APA format. If you do not use the provided
template, format your submission with 12-point Times New Roman font and one-inch margins. Cite your sources according to APA style. Use a file name that includes the course code, the
assignment �tle, and your name—for example, CYB_200_Project_Three_Milestone_Neo_Anderson x.
Project Three Milestone Rubric
Criteria Proficient (100%) Needs Improvement (75%) Not Evident (0%) Value
Detec�on: Detec�ng a
Threat Actor
Describes at least five best prac�ces or
methods for detec�ng a threat
actor
specific to the categories in the decision
aid
template
Addresses “Proficient” criteria, but there
are gaps in clarity, logic, or detail
Does not address cri�cal element, or
response is irrelevant
13
Characteriza�on: Types of
Threat Actors
Defines at least five types of threat actors
specific to the categories in the decision
aid template
Addresses “Proficient” criteria, but there
are gaps in clarity, logic, or detail
Does not address cri�cal element, or
response is irrelevant
13
Characteriza�on:
Mo�va�ons
Describes at least four mo�va�ons or
desired outcomes of threat actors specific
to the categories in the decision aid
template
Addresses “Proficient” criteria, but there
are gaps in clarity, logic, or detail
Does not address cri�cal element, or
response is irrelevant
13
Characteriza�on: Company
Assets
Iden�fies the company assets of at least
seven types of ins�tu�ons that may be at
risk from a threat actor specific to the
categories in the decision aid template
Addresses “Proficient” criteria, but there
are gaps in clarity, logic, or detail
Does not address cri�cal element, or
response is irrelevant
13
Response: Counterstrategies
Describes at least three poten�al
counterstrategies or tac�cs to respond to
and counter a threat actor
Addresses “Elements Met” criteria, but
there are gaps in clarity, logic, or detail
Does not address cri�cal element, or
response is irrelevant
13
Response: Reduce the
Likelihood
Describes at least three poten�al
strategies or tac�cs to reduce the
likelihood of the same situa�on happening
again
Addresses “Elements Met” criteria, but
there are gaps in clarity, logic, or detail
Does not address cri�cal element, or
response is irrelevant
13
10/2/24, 9:21 AM Assignment Information
https://learn.snhu.edu/d2l/le/content/1698647/viewContent/35102837/View 2/3
Criteria Proficient (100%) Needs Improvement (75%) Not Evident (0%) Value
Response: Explain Explains reason for choosing threat and
jus�fies strategies to both proac�vely and
reac�vely respond to that type of threat
actor
Addresses “Elements Met” criteria, but
there are gaps in clarity, logic, or detail
Does not address cri�cal element, or
response is irrelevant
13
Cita�ons Submission includes cita�ons for each
cri�cal element and has no major errors
related to cita�ons
Submission includes some cita�ons or has
some errors related to cita�ons
Submission does not include cita�ons or
has cri�cal errors related to cita�ons
5
Ar�cula�on of Response Submission has no major errors related to
grammar, spelling, or organiza�on
Submission has some errors related to
grammar, spelling, or organiza�on that
nega�vely impact readability and
ar�cula�on of main ideas
Submission has cri�cal errors related to
grammar, spelling, or organiza�on that
prevent understanding of ideas
4
Total: 100%
10/2/24, 9:21 AM Assignment Information
https://learn.snhu.edu/d2l/le/content/1698647/viewContent/35102837/View 3/3
CYB 200 Project Three Milestone Decision Aid Template
Complete the template by filling in the blank cells provided.
I. Detection
1. Describe the following best practices or methods for detecting a threat actor.
Awareness
Auditing
Monitoring
Testing
Sandboxing
Citations:
II. Characterization
2. Briefly define the following threat actors.
Individuals
who are
“shoulder
surfers”
Individuals
who do not
follow policy
Individuals
using others’
credentials
Individuals
who tailgate
Individuals
who steal
assets from
company
property
Citations:
3. Describe the following motivations or desired outcomes of threat actors.
Fraud
Sabotage
Vandalism
Theft
Citations:
4. Identify the company assets that may be at risk from a threat actor for the following types of
institutions.
Remember: Each company will react differently in terms of the type of assets it is trying to protect.
Financial
Medical
Educational
Government
Retail
Pharmaceutical
Entertainment
Citations:
III. Response
Choose a threat actor from Question 2 to research for the response section of the decision aid:
Threat Actor
5. Describe three potential strategies or tactics that you would use to respond to and counter the threat
actor you chose.
Hint: What are the best practices for reacting to this type of threat actor?
Strategy 1 Strategy 2 Strategy 3
Citations:
6. Describe three potential strategies or tactics that you would employ to reduce the likelihood of a
similar threat occurring again.
Hint: What are the best practices for proactively responding to this type of threat actor?
Strategy 1 Strategy 2 Strategy 3
Citations:
7. Explain your reason for determining the threat actor you chose to research. Why are the strategies you
identified appropriate for responding to this threat actor? Justify your tactics to proactively and reactively
respond to this threat actor.
Place an order in 3 easy steps. Takes less than 5 mins.