Journal Assignment Module 7: Identity, Access, and the Software-Defined Perimeter
Each of your answers must be written using your own words. Do not copy and paste from your textbook or from the Internet. Copying content word-for-word does not demonstrate understanding of the concepts. This assignment is designed to assess whether you are reading and understanding the material from your textbook and learning modules, so these should be your primary sources. If you use additional research sources, you must include citations.
Minimum word count: At least 350 words per response
You must choose ONE question (1 or 2) and answer BOTH parts (A & B) for your chosen question.
Your responses should lean toward modern defensive strategies, Zero Trust thinking, and identity-centric security in an environment with an indefensible perimeter.
Assignment Instructions
Write a formal journal report using proper APA 7 formatting.
- Select either Question 1 or Question 2
- Answer both A & B for the selected question
- Do not answer both Question 1 and Question 2
As a cybersecurity professional, the ability to clearly explain modern security architectures and identity controls is critical. Writing quality, correct citation, and depth of understanding are part of the gradable criteria.
Question 1: Perimeter Evolution (Answer A & B)
1a. Software-Defined Perimeter (SDP)
Describe and explain the concept of a software-defined perimeter. In your response, explain why traditional network perimeters are no longer sufficient and how SDP changes access control, visibility, and trust. Discuss how SDP supports cloud computing, remote work, and Zero Trust environments.
1b. Micro-Segmentation
Define and explain micro-segmentation. Describe how micro-segmentation limits lateral movement, reduces blast radius, and strengthens security when attackers bypass the perimeter. Explain why micro-segmentation is critical in modern cyber defense strategies.
Question 2: Identity and Authentication (Answer A & B)
2a. Why Kill the Password?
Explain why cybersecurity professionals increasingly argue that passwords should be eliminated or minimized. In your response, discuss human behavior, password reuse, phishing, credential stuffing, and large-scale breaches. Use the assigned article as a supporting source and connect your explanation to course concepts.
Resource:
2b. How Can We Make the Password Safer?
Explain how organizations can reduce risk when passwords are still required. Discuss modern approaches such as multi-factor authentication (MFA), password managers, passphrases, phishing-resistant authentication, monitoring, and identity-centric security models. Explain why reducing password impact is often more effective than relying on password complexity alone.
Writing and Submission Requirements
- Length: Minimum 350 words per response
- Total responses required: 2 (A & B from either Question 1 or Question 2)
- Format: APA 7
- Sources: Use the textbook and learning modules as primary sources
- Additional research: Allowed, but must be cited
- Writing: Original, professional, and analytical
File Submission Requirement
Submit your journal as a Microsoft Word (.docx) file using the following file-naming convention exactly:
LastName_W7A1.docx
Example: Wood_W7A1.docx
Assignments not submitted using the required file name may receive a grading penalty.
Student Submission Checklist
Selection
I selected ONLY ONE question (Question 1 or Question 2)
I answered BOTH A & B for my selected question
Content
Each response is at least 350 words
My responses focus on modern perimeter or identity security concepts
All writing is in my own words
Understanding and Analysis
I explained concepts clearly and accurately
I connected ideas to Zero Trust and modern cyber defense
I explained why these concepts matter in real-world environments
Sources and APA 7
I used the textbook/modules as primary sources
I cited the assigned article if I selected Question 2
Any outside research is cited properly
I included APA 7 in-text citations
I included a References section
Writing Quality
My writing is clear, organized, and professional
I proofread for grammar, spelling, and clarity
File Submission
My file is saved as a .docx
The file name is correct: LastName_W7A1.docx
I uploaded the correct file before the deadline

Leave a Reply
You must be logged in to post a comment.