Case Studies Question

Journal Assignment Module 7: Identity, Access, and the Software-Defined Perimeter

Each of your answers must be written using your own words. Do not copy and paste from your textbook or from the Internet. Copying content word-for-word does not demonstrate understanding of the concepts. This assignment is designed to assess whether you are reading and understanding the material from your textbook and learning modules, so these should be your primary sources. If you use additional research sources, you must include citations.

Minimum word count: At least 350 words per response
You must choose ONE question (1 or 2) and answer BOTH parts (A & B) for your chosen question.

Your responses should lean toward modern defensive strategies, Zero Trust thinking, and identity-centric security in an environment with an indefensible perimeter.

Assignment Instructions

Write a formal journal report using proper APA 7 formatting.

  • Select either Question 1 or Question 2
  • Answer both A & B for the selected question
  • Do not answer both Question 1 and Question 2

As a cybersecurity professional, the ability to clearly explain modern security architectures and identity controls is critical. Writing quality, correct citation, and depth of understanding are part of the gradable criteria.

Question 1: Perimeter Evolution (Answer A & B)

1a. Software-Defined Perimeter (SDP)

Describe and explain the concept of a software-defined perimeter. In your response, explain why traditional network perimeters are no longer sufficient and how SDP changes access control, visibility, and trust. Discuss how SDP supports cloud computing, remote work, and Zero Trust environments.

1b. Micro-Segmentation

Define and explain micro-segmentation. Describe how micro-segmentation limits lateral movement, reduces blast radius, and strengthens security when attackers bypass the perimeter. Explain why micro-segmentation is critical in modern cyber defense strategies.

Question 2: Identity and Authentication (Answer A & B)

2a. Why Kill the Password?

Explain why cybersecurity professionals increasingly argue that passwords should be eliminated or minimized. In your response, discuss human behavior, password reuse, phishing, credential stuffing, and large-scale breaches. Use the assigned article as a supporting source and connect your explanation to course concepts.
Resource:

2b. How Can We Make the Password Safer?

Explain how organizations can reduce risk when passwords are still required. Discuss modern approaches such as multi-factor authentication (MFA), password managers, passphrases, phishing-resistant authentication, monitoring, and identity-centric security models. Explain why reducing password impact is often more effective than relying on password complexity alone.

Writing and Submission Requirements

  • Length: Minimum 350 words per response
  • Total responses required: 2 (A & B from either Question 1 or Question 2)
  • Format: APA 7
  • Sources: Use the textbook and learning modules as primary sources
  • Additional research: Allowed, but must be cited
  • Writing: Original, professional, and analytical

File Submission Requirement

Submit your journal as a Microsoft Word (.docx) file using the following file-naming convention exactly:

LastName_W7A1.docx
Example: Wood_W7A1.docx

Assignments not submitted using the required file name may receive a grading penalty.

Student Submission Checklist

Selection

I selected ONLY ONE question (Question 1 or Question 2)
I answered BOTH A & B for my selected question

Content

Each response is at least 350 words
My responses focus on modern perimeter or identity security concepts
All writing is in my own words

Understanding and Analysis

I explained concepts clearly and accurately
I connected ideas to Zero Trust and modern cyber defense
I explained why these concepts matter in real-world environments

Sources and APA 7

I used the textbook/modules as primary sources
I cited the assigned article if I selected Question 2
Any outside research is cited properly
I included APA 7 in-text citations
I included a References section

Writing Quality

My writing is clear, organized, and professional
I proofread for grammar, spelling, and clarity

File Submission

My file is saved as a .docx
The file name is correct: LastName_W7A1.docx
I uploaded the correct file before the deadline

WRITE MY PAPER


Comments

Leave a Reply