Csia 485 project #6 detailed assignment description

            Policies

Clearly describes the current IT cyber security policy.

Basically describes the current IT cyber security policy.

Weakly describes the current IT cyber security policy.

Little description of the current IT cyber security policy.

No description of the current IT cyber security policy.

ID at least 2 IT security policies to implement based upon the case study. Clearly discusses the rationale for selection of these policies.

ID at least 2 IT security policies to implement based upon the case study. Basically discusses the rationale for selection of these policies.

ID at least one (1) IT security policy to implement based upon the case study. Weakly discusses the rationale for selection of the policy.

May ID at least one (1) IT security policy to implement based upon the case study. Little discussion of the rationale for selection of the policy.

No policies identified or discussion of the rationale for the IT security policies.

New Technology

Clearly describes functionality of new technology selected for implementation. 

Basically describes functionality of new technology selected for implementation.

Weakly describes functionality of new technology selected for implementation.

Little description of functionality of new technology selected for implementation.

No description of functionality of new technology selected for implementation.

Clearly describes challenges associated with the current cyber security policy based on the new technology.

Basically describes challenges associated with the current cyber security policy based on the new technology.

Weakly describes challenges associated with the current cyber security policy based on the new technology.

Little description of challenges associated with the current cyber security policy based on the new technology.

No description of challenges associated with the current cyber security policy based on the new technology.

Clearly explains the cyber security vulnerabilities that could be introduced by the new technology that may not be mitigated by technological configuration management. Must address two (2) or more IT policies.

Basically explains the cyber security vulnerabilities that could be introduced by the new technology that may not be mitigated by technological configuration management. Must address two (2) or more IT policies.

Weakly explains the cyber security vulnerabilities that could be introduced by the new technology that may not be mitigated by technological configuration management. Must address at least one (1) IT policy.

Little explanation on the cyber security vulnerabilities that could be introduced by the new technology that may not be mitigated by technological configuration management. May address only one (1) policy.

No explanation on the cyber security vulnerabilities that could be introduced by the new technology that may not be mitigated by technological configuration management. Doesn’t address any policies.

Recommendations

Clearly discusses revision and modification to each IT cyber security policy to ensure new technology doesn’t compromise organization cyber security posture. Must address two (2) or more IT policies.

Basically discusses revision and modification to each IT cyber security policy to ensure new technology doesn’t compromise organization cyber security posture. Must address two (2) or more IT security policies.

Weakly discusses revision and modification to each IT cyber security policy to ensure new technology doesn’t compromise organization cyber security posture. Must address at least one (1) IT policy.

Little discussion on revision and modification to each IT cyber security policy to ensure new technology doesn’t compromise organization cyber security posture. May address only one (1) policy.

Doesn’t discuss revision and modification any IT cyber security policy to ensure new technology doesn’t compromise organization cyber security posture. Doesn’t address any policies.

Clearly addresses the inter- and intra-organization leadership, managerial and policy challenges and effects associated with the new policies.

Basically addresses the inter- and intra-organization leadership, managerial and policy challenges and effects associated with the new policies.

Weakly addresses the inter- and intra-organization leadership, managerial and policy challenges and effects associated with the new policies.

Little address of the inter- and intra-organization leadership, managerial and policy challenges and effects associated with the new policies.

Doesn’t address the inter- and intra-organization leadership, managerial and policy challenges and effects associated with the new policies.

Clearly discusses challenges in communicating new policies across the organization.

Basically discusses challenges in communicating new policies across the organization.

Weakly discusses challenges in communicating new policies across the organization.

Little discussion of the challenges in communicating new policies across the organization.

No discussion of the challenges in communicating new policies across the organization.

Finds and Applies Knowledge

Used at least 5 authoritative or scholarly sources in paper. One must be NIST SP 800-53. No APA style errors in sources.

Used at least 3 authoritative or scholarly sources in paper. One must be NIST SP 800-53. No more than 1 APA errors in sources.

Used at least 2 authoritative or scholarly sources in paper. One must be NIST SP 800-53. No more than 2 APA errors in sources.

May have used 1 authoritative or scholarly source in paper. May use NIST SP 800-53. May not have used APA style formatting.

No authoritative or scholarly sources used in paper. NIST SP 800-53 not mentioned.

All sources cited. No errors in citing material in paper.

All but 1 source cited. Had no more than 5 citing errors in paper. 

All but 2 sources cited. Had no more than 10 citing errors in paper.

All but 3 sources cited. Had less than 15 APA citing errors in paper.

No sources cited or had more than 15 APA citing errors in paper.

Organization, Execution and Appearance

Has separate title slide with title, student name, class and date. All slides have titles; not wordy and is easy to read; no spelling or grammar errors; and no distracting material.

Basic title slide with title, student name, class and date. Slides have less than 5 errors to include: missing titles, wordy; hard to read slides; spelling or grammar errors; distracting material.

Weak title slide with title, student name, class and date. Slides have less than 10 errors to include: missing titles, wordy; hard to read slides; spelling or grammar errors; distracting material.

Missing title slide with title, student name, class and date. Slides have less than 15 errors to include: missing titles, wordy; hard to read slides; spelling or grammar errors; distracting material.

Missing title slide with title, student name, class and date. Slides have more than 15 errors to include: missing titles, wordy; hard to read slides; spelling or grammar errors; distracting material.

Provides at least 12 PowerPoint Slides

Provides at least 10 PowerPoint Slides

Provides less than 10 PowerPoint slides

Provides less than 10 PowerPoint slides

Provides less than 10 PowerPoint slides

Overall Score            

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer