Security Assessment Graded Assignment #4-recognize threats to information and information-

Security Assessment
Graded Assignment #4
Guidelines & Grading Rubric
The purpose of this assignment is to
- recognize threats to information and information-system security;
- identify safeguards to protect information and information-system security; and
- develop strategies to increase safeguards to protect information and information-system security.
Due Date: Submit to the Dropbox basket by Sunday 11:59 p.m. MT at the end of Week 7.
Total Points: 125
Select a software application, preferably an information system that you currently use in your work setting, to assess security threats. You may personally test the application as well as observe the practices of other users.
- Identify system threats.
- Examine the organization’s information-system policies for threat management, noting strengths as well as potential problem areas, with rationales.
- Propose an evidence-based solution to each threat identified. In the event that you identify more than seven threats, prioritize the top seven and propose a solution for the three threats that you deem greatest.
If you do not currently have access to an automated system, then speak with your instructor to determine a mutually agreeable alternative.
- Required texts may be used as additional references.
- APA 6th edition is the expected format.
- The slide presentation (excluding the title and reference slides ) should not be longer than 20 slides.
- Ideas and information from professional sources must be cited correctly.
- Grammar, spelling, punctuation, and citations are consistent with formal academic writing.
- A minimum of 3 scholarly references is required.
Category |
Points |
% |
Description |
Introduction |
20 |
15 |
Introduction presents the topic of security assessment and identifies the sections of the paper. |
Threat identification |
33 |
26.4 |
Provides detailed information on the information system assessed for security, threats identified, and potential impact of each threat. |
|
|
|
|
Evidence-based recommendations |
33 |
26.4 |
Provides evidence-based recommendations to resolve each threat identified. |
Conclusions |
21 |
17.4 |
Concluding statements summarize insights gained during the assignment. |
APA format/Speaker Notes |
6 |
4.8 |
Text, title page, and reference page(s) are consistent with APA format. Presentation shows speaker notes for each slide that would permit another presenter to take over |
References and citations |
6 |
4.8 |
Ideas and information from other sources are cited correctly. |
Mechanics of writing/Presentation quality |
7 |
5 |
Rules of grammar, spelling, word usage, and punctuation are consistent with formal written work. Maximum of 25 slides excluding title and reference slides. |
|
125 |
100 |
A quality assignment will meet or exceed all of the above requirements. |
|
|
|
|
Security Assessment: Graded Assignment #4: Grading Rubric
Assignment Criteria |
Exceptional (100%) Outstanding or highest level of performance |
Exceeds (88%) Very good or high level of performance |
Meets (80%) Competent or satisfactory level of performance |
Needs Improvement (38%) Poor or failing level of performance |
Developing (0) Unsatisfactory level of performance |
|
Content Possible Points = 106 Points |
|
|
|
|
|
|
Introduction |
20 Points |
18 Points |
16 Points |
8 Points |
0 Points |
|
Introduction presents the topic of security assessment in information systems and names the key sections of the paper. |
Introduction presents the topic of security assessment in information systems and names some key sections of the paper. |
Introduction does not present the topic of security assessment in information systems OR does not name the key sections of the paper. |
Introduction does not present the topic of security assessment in information systems AND does not name the key sections of the paper.
|
No introduction present
|
||
Threat identification |
33 Points |
29 Points |
26 Points |
12 Points |
0 Points |
|
Clearly identifies threats along with potential impact of each. |
Identifies threats and potential impact of each. |
Identifies several threats but is not consistent in identifying potential impact associated with each. |
Fails to clearly identify threats AND does not identify associated threat impact. |
Does not identify threats. |
||
|
|
|
|
|
|
|
|
|
|
|
|
||
Evidence-based recommendations |
33 Points |
29 Points |
26 Points |
12 Points |
0 Points |
|
Evidence-based recommendations to resolve each problem are presented clearly and discussed in detail. |
Evidence-based recommendations to resolve each problem are presented and discussed. |
Evidence-based recommendations to resolve each problem are presented but not discussed. |
Recommendations to resolve each problem are present but evidence is not clearly presented or may be of poor quality and there is no discussion |
No recommendations, evidence, or discussion are presented. |
||
Conclusions |
21 Points |
19 Points |
17 Points |
8 Points |
0 Points |
|
Concluding statements clearly summarize insights gained during the assignment. |
Concluding statements summarize insights gained during the assignment. |
Concluding statements include a partial summary of the insights gained during the assignment. |
Concluding statements do not summarize insights gained during the assignment. |
Conclusion is not present. |
||
Content Subtotal |
|
|
_____of 106 Points |
|||
Format Possible Points = 19 Points |
|
|
|
|
|
|
APA format/Speaker notes |
6 Points |
5 Points |
4 Points |
2 Points |
0 Points |
|
0–3 errors in use of APA format in title page, body of the paper, references, or appendix. Detailed speaker notes present on each slide |
4–6 errors in use of APA format in title page, body of the paper, references, or appendix. Detailed speaker notes present on most slides. |
7–8 errors in use of APA format in title page, body of the paper, references, or appendix. Speaker notes, when present, are inadequate to convey key information. |
9 errors in use of APA format in title page, body of the paper, references, or appendix. Speaker notes, largely missing and are inadequate to convey key information. |
10 or more errors in use of APA format in title page, body of the paper, references, or appendix and no speaker notes |
||
References and citation |
6 Points |
5 Points |
4 Points |
2 Points |
0 Points |
|
At least 3 scholarly references are provided. Texts may be used as additional references AND Ideas and information from other sources are cited correctly. |
Only 2 scholarly references are provided AND ideas and information from other sources are cited correctly. |
Only 1 scholarly reference is provided AND there are errors in the citation of ideas and information from other sources. |
There are multiple errors in the citation of ideas and information from other sources.
|
No scholarly references are provided.
|
||
Mechanics of writing/Presentation quality |
6 Points |
5 Points |
4 Points |
2 Points |
0 Points |
|
0–3 errors in spelling, grammar, punctuation, and other aspects of formal academic writing. Slide total within maximum allowable number using graphics and space well. |
4–6 errors in spelling, grammar, punctuation, and other aspects of formal academic writing. Meets slide restriction.
Most, not all, slides use space, key words, and graphics well. |
7–8 errors in spelling, grammar, punctuation, and other aspects of formal academic writing. OR Does not meet slide restriction.
OR
Many slides use space, key words, graphics poorly. |
9 errors in spelling, grammar, punctuation, and other aspects of formal academic writing. AND Does not meet slide restriction AND Poor use of space, key words, and graphics on most/all slides |
10 or more errors in spelling, grammar, punctuation, and other aspects of formal academic writing. AND Does not meet slide restriction And slides poorly done or missing important content
|
||
Format Subtotal |
|
_____of 19 Points |
||||
Total Points |
|
|
_____of 125 Points |
|||

-
Rating:
5/
Solution: Security Assessment Graded Assignment #4-recognize threats to information and information-
Solution: Security Assessment Graded Assignment #4-recognize threats to information and information-