Unit 7 Assignment Directions: Project 4 Part A – Planning a Grey Box Approach
To start this task for the City of Gotham, you will plan a grey box approach based on the business specifications provided below. You will assess and improve the security of the Gotham City server. As you work on this project, pay attention to implementing common and standard cybersecurity controls. Please note you will use Splunk as your secure environment in Unit 8.
The business specifications: You should aim to select 2-3 business specifications based on this list:
- Compliance with Industry Regulations: Ensure that the secure environment adheres to relevant industry regulations and standards such as PCI-DSS, HIPAA, or GDPR, depending on the nature of the business.
- Data Privacy and Protection: Implement robust measures to safeguard sensitive data, including encryption protocols, access controls, and data loss prevention mechanisms to ensure compliance with data protection laws and maintain customer trust.
- High Availability and Disaster Recovery: Design a secure environment to ensure high availability of services and to establish disaster recovery procedures to minimize downtime and data loss in the event of system failures or cyber-attacks.
- Scalability and Flexibility: Build the environment with scalability in mind to accommodate future growth and changes in business requirements, ensuring that it remains agile and adaptable to evolving cybersecurity threats and technological advancements.
- User Authentication and Authorization: Implement secure authentication mechanisms, such as multi-factor authentication and robust authorization controls to ensure that only authorized users have access to sensitive resources and data within the environment.
- Continuous Monitoring and Incident Response: Establish comprehensive monitoring capabilities to detect and respond to security incidents in real-time, including intrusion detection systems, security information and event management (SIEM) solutions, and incident response protocols.
Comprehensive Assessment and Proposal
Exercise 1: Synthesize an applied project that incorporates cutting-edge best practices in cybersecurity.
Instructions
In this first exercise, you will create a comprehensive assessment and proposal of the work to be performed for your consultancy with the City of Gotham.
- To achieve this objective, you will comprehensively assess the City of Gotham’s existing cybersecurity infrastructure, policies, and practices. This assessment will involve:
- Reviewing the city’s current network architecture, including hardware, software, and network configurations.
- Assessing the effectiveness of existing security controls, such as firewalls, intrusion detection systems, and antivirus software.
- Evaluating the security policies and procedures in place to determine their alignment with industry best practices.
- Analyzing the city’s incident response capabilities, including incident detection, analysis, containment, and recovery processes.
- Identifying any vulnerabilities and weaknesses in the current system through vulnerability scanning and penetration testing.
- Considering the unique requirements and constraints of the City of Gotham in developing a tailored proposal.
- Based on the assessment findings, you will synthesize an applied project proposal incorporating cutting-edge cybersecurity best practices. The proposal should outline the necessary improvements and enhancements required to establish a solid Cybersecurity Operation Center (SOC) for the City of Gotham. Add your work in the Comprehensive Assessment and Proposal template.
Key Concepts and Compliance Analysis
Exercise 2: Classify key concepts and national cybersecurity standards.
Instructions
In this second exercise, you need to review NIST publications and international laws as well as ISO standards and GDPR (General Data Protection Regulation) to help you identify the key concepts and national cybersecurity standards in your project.
- Research and define key concepts in cybersecurity, such as threat intelligence, incident response, vulnerability management, network security, and identity and access management.
- Review and select 3-5 associated skills from this Industry and Associated Skills Master List that are represented in your project. Throughout your studies in cybersecurity, your courses have outlined these various skills. You should be familiar with these skills by now in your journey.
- Classify and explain the relevance of each concept to the City of Gotham’s cybersecurity project, considering the specific vulnerabilities and risks faced by the city.
- Familiarize yourself with national cybersecurity standards and regulations mandated by the government, such as the NIST Cybersecurity Framework, ISO 27001, and relevant privacy laws.
- Evaluate the city’s current compliance status, and identify any gaps or deficiencies in meeting the required standards.
- Develop a roadmap for aligning the city’s cybersecurity practices with the relevant national standards and regulations.
- Add your information in the Comprehensive Assessment and Proposal template in the Applied Project Proposal section.
Training Program and Simulated Exercises
Exercise 3: Create a plan for hands-on, experiential learning activities within the realm of cybersecurity.
Instructions
In this third exercise, you will design a comprehensive training program to enhance the cybersecurity skills of the City of Gotham’s IT security team.
- Develop hands-on, experiential learning activities like simulated exercises and workshops that replicate real-world cybersecurity scenarios.
- Incorporate practical scenarios that reflect the city’s specific challenges and vulnerabilities, such as ransomware attacks, insider threats, or social engineering attempts.
- Define metrics to measure the effectiveness of the training program, such as improved incident response time, reduced security incidents, or increased employee awareness.
- Establish a schedule for regular training sessions and workshops to ensure continuous improvement of cybersecurity skills within the IT security team.
- Add your information in the Comprehensive Assessment and Proposal template in the Training Program section.
Strategic Approaches and Project Plan
Exercise 4: Formulate specific, measurable objectives, and devise strategic approaches for the execution of the cybersecurity project.
Instructions
In this fourth exercise, based on the assessment findings and the city’s priorities, you will formulate SMART (specific, measurable, attainable, relevant, and timely) goals for implementing the Cybersecurity Operation Center. Before getting started on these steps, refer to the resources on creating measurable goals.
- Define objectives such as enhancing network security, improving incident response capabilities, implementing vulnerability management processes, strengthening identity and access management controls, and ensuring compliance with national cybersecurity standards.
- Review and select 3-7 main competencies that your project is achieving based on the objectives you defined. Use the CTCH Competency Master List You should already be familiar with many of these competencies as your projects in previous courses were assessed against them. The SMART goals you develop for your project should be based on these competencies. These competencies are directly reflective of the CAE / KUs (Center for Academic Excellence / Knowledge Units), which is the National Center for Security Administration for cyber-affiliated schools. Any future employer in cybersecurity will be familiar with this center and the knowledge units; therefore, aligning the correct competencies to your project is critical.
- Devise strategic approaches to address each competency, considering factors such as resource allocation, budgeting, procurement of security tools and technologies, and collaboration with external cybersecurity vendors or consultants.
- Develop a detailed project plan outlining the timeline, milestones, and responsible parties for executing the cybersecurity project.
- Implement a monitoring and evaluation framework to track the progress of the project and to ensure its successful completion.
- Add your information into the Project Charter template, which will be included as an appendix in your Comprehensive Assessment and Proposal.
Conclusion
By addressing the exercises outlined above, you will synthesize an applied project that incorporates cutting-edge best practices in cybersecurity. You will conduct a comprehensive assessment, develop a proposal for improvements, classify key concepts and compliance standards, create a training program with simulated exercises, and formulate specific, measurable objectives with strategic approaches for executing the cybersecurity project. Through your guidance and expertise, the City of Gotham will establish a solid Cybersecurity Operation Center, ensuring the protection of its assets and user data, guaranteeing its compliance with government regulations, and restoring trust in its security capabilities.
Tutorial for Planning a Grey Box Approach

