Posted: April 24th, 2025

Project 3 milestone

To complete this assignment, review the prompt and grading rubric in the

Project Three Milestone Guidelines and Rubric

. You will also need to access the

Project Three Milestone Decision Aid Template Word Document

.

CYB 200 Project Three Milestone Guidelines and Rubric

Overview

As a professional in cybersecurity, you should be aware of the best-prac�ce tac�cs and methods necessary for responding to a variety of cyber threat actors. For this ac�vity, you will

research and determine factors to detect, characterize, and counter a range of threat actor situa�ons to place into a decision aid template. This milestone will prepare you to think proac�vely

and ethically in terms of what threat actors would do to a�ack organiza�onal assets.

Be thorough in comple�ng the decision aid. Upon comple�on, this is a recommended ar�fact for your cyber playbook and will be tagged with the Human Security icon. You may use this

template or a blank Word document to address the cri�cal elements for the Project Three Milestone. This decision aid will inform your technical brief in Project Three, which will be based on

a scenario your instructor provides in the Project Three announcement. You will not use all the tac�cs and methods you researched, but rather choose and refine your answers based on the

specific situa�on.

Prompt

In your decision aid, address the cri�cal elements listed below.

I. Detec�on

A. Describe at least five best prac�ces or methods for detec�ng a threat actor specific to the categories in the decision aid template. Use research from outside resources to

support

your responses.

II. Characteriza�on

A. Define at least five types of threat actors specific to the categories in the decision aid template. Use research from

outside resources

to support your responses.

B. Describe at least four mo�va�ons or desired outcomes of threat actors specific to the categories in the decision aid template. Use research from outside resources to support

your responses.

C. Iden�fy the company assets of at least seven types of ins�tu�ons that may be at risk from a threat actor specific to the categories in the decision aid template. Use research from

outside resources to support your responses.

III. Response

A. Describe at least three poten�al counterstrategies or tac�cs that you might use to respond to and counter a threat actor (reac�ve approach). Use research from outside resources

to support your responses.

B. Describe at least three poten�al strategies or tac�cs that you would employ to reduce the likelihood of the same situa�on happening again (proac�ve approach). Use research

from outside resources to support your responses.



10/2/24, 9:21 AM Assignment Information

https://learn.snhu.edu/d2l/le/content/1698647/viewContent/35102837/View 1/3

https://learn.snhu.edu/content/enforced/1698647-CYB-200-13406.202481-1/course_documents/CYB%20200%20Project%20Three%20Milestone%20Decision%20Aid%20Template x?isCourseFile=true&ou=1698647

https://learn.snhu.edu/content/enforced/1698647-CYB-200-13406.202481-1/course_documents/CYB%20200%20Project%20Three%20Milestone%20Decision%20Aid%20Template x?isCourseFile=true&ou=1698647

https://app.readspeaker.com/cgi-bin/rsent?customerid=9568&url=https%3A%2F%2Flearn.snhu.edu%2Fcontent%2Fenforced%2F1698647-CYB-200-13406.202481-1%2FProject%2520Three%2520Milestone%2520Guidelines%2520and%2520Rubric.html&lang=en_us&readid=d2l_read_element_1

C. Explain your reason for determining the threat actor you chose (Response: Parts A and B) and jus�fy your strategies to both proac�vely and reac�vely respond to that type of

threat actor.

What to Submit

Your submission should address the cri�cal elements using either the decision aid template or a blank Word document and should be wri�en in APA format. If you do not use the provided

template, format your submission with 12-point Times New Roman font and one-inch margins. Cite your sources according to APA style. Use a file name that includes the course code, the

assignment �tle, and your name—for example, CYB_200_Project_Three_Milestone_Neo_Anderson x.

Project Three Milestone Rubric

Criteria Proficient (100%) Needs Improvement (75%) Not Evident (0%) Value

Detec�on: Detec�ng a

Threat Actor

Describes at least five best prac�ces or

methods for detec�ng a threat

actor

specific to the categories in the decision

aid

template

Addresses “Proficient” criteria, but there

are gaps in clarity, logic, or detail

Does not address cri�cal element, or

response is irrelevant

13

Characteriza�on: Types of

Threat Actors

Defines at least five types of threat actors

specific to the categories in the decision

aid template

Addresses “Proficient” criteria, but there

are gaps in clarity, logic, or detail

Does not address cri�cal element, or

response is irrelevant

13

Characteriza�on:

Mo�va�ons

Describes at least four mo�va�ons or

desired outcomes of threat actors specific

to the categories in the decision aid

template

Addresses “Proficient” criteria, but there

are gaps in clarity, logic, or detail

Does not address cri�cal element, or

response is irrelevant

13

Characteriza�on: Company

Assets

Iden�fies the company assets of at least

seven types of ins�tu�ons that may be at

risk from a threat actor specific to the

categories in the decision aid template

Addresses “Proficient” criteria, but there

are gaps in clarity, logic, or detail

Does not address cri�cal element, or

response is irrelevant

13

Response: Counterstrategies

Describes at least three poten�al

counterstrategies or tac�cs to respond to

and counter a threat actor

Addresses “Elements Met” criteria, but

there are gaps in clarity, logic, or detail

Does not address cri�cal element, or

response is irrelevant

13

Response: Reduce the

Likelihood

Describes at least three poten�al

strategies or tac�cs to reduce the

likelihood of the same situa�on happening

again

Addresses “Elements Met” criteria, but

there are gaps in clarity, logic, or detail

Does not address cri�cal element, or

response is irrelevant

13

10/2/24, 9:21 AM Assignment Information

https://learn.snhu.edu/d2l/le/content/1698647/viewContent/35102837/View 2/3

Criteria Proficient (100%) Needs Improvement (75%) Not Evident (0%) Value

Response: Explain Explains reason for choosing threat and

jus�fies strategies to both proac�vely and

reac�vely respond to that type of threat

actor

Addresses “Elements Met” criteria, but

there are gaps in clarity, logic, or detail

Does not address cri�cal element, or

response is irrelevant

13

Cita�ons Submission includes cita�ons for each

cri�cal element and has no major errors

related to cita�ons

Submission includes some cita�ons or has

some errors related to cita�ons

Submission does not include cita�ons or

has cri�cal errors related to cita�ons

5

Ar�cula�on of Response Submission has no major errors related to

grammar, spelling, or organiza�on

Submission has some errors related to

grammar, spelling, or organiza�on that

nega�vely impact readability and

ar�cula�on of main ideas

Submission has cri�cal errors related to

grammar, spelling, or organiza�on that

prevent understanding of ideas

4

Total: 100%

10/2/24, 9:21 AM Assignment Information

https://learn.snhu.edu/d2l/le/content/1698647/viewContent/35102837/View 3/3

CYB 200 Project Three Milestone Decision Aid Template

Complete the template by filling in the blank cells provided.

I. Detection

1. Describe the following best practices or methods for detecting a threat actor.

Awareness

Auditing

Monitoring

Testing

Sandboxing

Citations:

II. Characterization

2. Briefly define the following threat actors.

Individuals
who are

“shoulder
surfers”

Individuals
who do not

follow policy

Individuals
using others’
credentials

Individuals
who tailgate

Individuals
who steal

assets from
company
property

Citations:

3. Describe the following motivations or desired outcomes of threat actors.

Fraud

Sabotage

Vandalism

Theft

Citations:

4. Identify the company assets that may be at risk from a threat actor for the following types of
institutions.

Remember: Each company will react differently in terms of the type of assets it is trying to protect.

Financial

Medical

Educational

Government

Retail

Pharmaceutical

Entertainment

Citations:

III. Response

Choose a threat actor from Question 2 to research for the response section of the decision aid:

Threat Actor

5. Describe three potential strategies or tactics that you would use to respond to and counter the threat
actor you chose.

Hint: What are the best practices for reacting to this type of threat actor?

Strategy 1 Strategy 2 Strategy 3

Citations:

6. Describe three potential strategies or tactics that you would employ to reduce the likelihood of a
similar threat occurring again.

Hint: What are the best practices for proactively responding to this type of threat actor?

Strategy 1 Strategy 2 Strategy 3

Citations:

7. Explain your reason for determining the threat actor you chose to research. Why are the strategies you
identified appropriate for responding to this threat actor? Justify your tactics to proactively and reactively

respond to this threat actor.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00