CYB 220 Project Three Guidelines and Rubric Overview Sound guidance in selecting technologies that ensure compliance with organizational security requirements is a key contribution that a cybersecurity practitioner provides to their organization. The ability to balance technical effectiveness against business considerations such as cost, implementation time, and the impacts on staffing, end-users, and infrastructure is a key skill. For this project (due in Module Seven), you will be writing an evaluation of network protection technologies to your manager. This evaluation requires you to assess multiple technology options by weighing criteria associated with cost and effectiveness and then recommending a solution that satisfies the given requirements. In addition, your recommendation should be guided by a fundamental security design principle you select as a basis for your recommendation. In this assignment, you will demonstrate your mastery of the following course competency:  CYB-220-02: Describe the fundamental principles and practices of intrusion detection and prevention Scenario Your instructor has provided you with the specific scenario for this project as part of the Project Three Milestone. The scenario provided you with the beginning of a security plan that documents areas of relevance to your evaluation that you need for decision making in your project. Additionally, a fellow analyst has completed an evaluation of network protection technologies, specifically intrusion detection systems (IDSs) and intrusion prevention systems (IPSs), to help you with your decision-making process. Your manager has reviewed the evaluation, based on effectiveness and cost, and has verified its accuracy. Based on your analysis of the technology evaluation and the details provided in the scenario, recommend a network protection system for implementation. Prompt You must address the critical elements listed below. The codes shown in brackets indicate the course competency to which each critical element is aligned. A. Explain how you are employing one of the Fundamental Security Design Principles to inform your recommendation. [CYB-220-02] B. Justify a recommended network protection approach. Describe how you balanced effectiveness, cost, and technical capabilities to select the network protection technology. [CYB-220-02] C. Recommend resources (e.g., organizational assets, workforce allocation, policies/procedures, hardware) that are necessary for implementing or monitoring your chosen network protection approach. These resources should optimize the technology or maximize organizational resources. Explain your recommendation using an adversarial mindset or systems thinking approach. [CYB-220-02] 2 Project Three Rubric Guidelines for Submission: Your evaluation of network protection technologies should be 2 to 3 pages in length (plus a cover page and references) and must be written in APA format. Use double spacing, 12-point Times New Roman font, and one-inch margins. Use a filename that includes the course code, the assignment title, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx