To complete this assignment, review the prompt and grading rubric in the Module Four Stepping Stone Two Guidelines and Rubric. When you have finished your

CYB 250 Stepping Stone Two Guidelines and Rubric

Overview

In Module three, you were introduced to threat modeling. Prac�cing threat modeling develops a valuable skill. Therefore, in this exercise, you will review two lesser-known a�acks and

iden�fy the components of a threat model. This exercise is meant to expand your skill set in iden�fying events and threats while analyzing a�acks reported by other organiza�ons. If the

component of the threat model is not directly discernable, it is important that you use your previous knowledge and inference experience to try and iden�fy the component. Within the two

ar�cles linked in the Reading and Resources sec�on in Module Four of your course, you will find different uses of cryptography and man-in-the-middle a�acks. Analyzing cryptographic

techniques is an important skill that security analysts prac�ce to be�er understand data protec�on.

This ac�vity relates directly to the final project, where you will be required to complete a threat model for your project scenario and analyze cryptographic techniques. Take advantage of

feedback on this assignment to prepare you for your final project submission in Module Seven.

Prompt

Analyze the two ar�cles linked in the Reading and Resources sec�on in Module Four of your course. Use this informa�on to fill out the template and address the cri�cal elements listed

below.

I. Threat Modeling

A. To complete this assignment, first download the Module Four Stepping Stone Two Template course provided in the What to Submit sec�on. Iden�fy the elements of the threat

model by filling in the template for the case studies below.

i. Complete column for Bank A�acks thoroughly and accurately.

ii. Complete column for Bluetooth Bug thoroughly and accurately.

II. Cryptographic Techniques

A. Select one of the incidents from the table and analyze the following items:

i. Describe the cryptographic techniques employed by the organiza�on in the ar�cle.

ii. Describe how a man-in-the-middle a�ack compromised the cryptographic technique iden�fied above.

iii. Describe techniques that could have been used to prevent the man-in-the-middle a�ack from your selected ar�cle.



11/20/24, 10:23 AM Assignment Information

https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623163/View 1/3

What to Submit

Use the Module Four Stepping Stone Two Template to prepare your submission. Your submission should be 2 to 3 pages in length including the table. Use double spacing, 12-point Times

New Roman font, and one-inch margins. All sources must be cited using APA format. Use a file name that includes the course code, the assignment �tle, and your name—for example,

CYB_123_Assignment_Firstname_Lastname.docx.

Module Four Stepping Stone Two Rubric

Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value

Threat Modeling: Bank

A�acks

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Completes column for Bank

A�acks thoroughly and

accurately

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

18

Threat Modeling: Bluetooth

Bug

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Completes column for

Bluetooth Bug thoroughly and

accurately

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

18

Cryptographic Techniques:

Techniques Employed

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Describes the cryptographic

techniques employed by the

organiza�on in the ar�cle

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

18

Cryptographic Techniques:

Man-in-the-Middle A�ack

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Describes how a man-in-the-

middle a�ack compromised the

cryptographic technique

iden�fied above

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

18

Cryptographic Techniques:

Prevent

Meets “Proficient” criteria and

addresses cri�cal element in an

excep�onally clear, insigh�ul,

sophis�cated, or crea�ve

manner

Describes techniques that

could have been used to

prevent the man-in-the-middle

a�ack from the selected ar�cle

Addresses “Proficient” criteria,

but there are gaps in clarity,

logic, or detail

Does not address cri�cal

element, or response is

irrelevant

18

11/20/24, 10:23 AM Assignment Information

https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623163/View 2/3

Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value

Ar�cula�on of Response Submission is free of errors

related to cita�ons, grammar,

spelling, and organiza�on and

is presented in a professional

and easy-to-read format

Submission has no major errors

related to cita�ons, grammar,

spelling, or organiza�on

Submission has some errors

related to cita�ons, grammar,

spelling, or organiza�on that

nega�vely impact readability

and ar�cula�on of main ideas

Submission has cri�cal errors

related to cita�ons, grammar,

spelling, or organiza�on that

prevent understanding of ideas

10

Total: 100%

11/20/24, 10:23 AM Assignment Information

https://learn.snhu.edu/d2l/le/content/1748997/viewContent/36623163/View 3/3

Last Completed Projects

topic title academic level Writer delivered