The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 4 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Individual Assignment
Objective: Evaluate the security vulnerabilities of an association's PC/system working frameworks alongside the procedures used to ensure them.
Â
Abilities: Critical considering
Â
Directions: In 11-15 double-spaced pages talk about the relative favorable circumstances and weaknesses of no less than three distinct measures used to ensure working frameworks. The simplicity of usage and the related security administration issues ought to likewise be tended to. At long last, the paper ought to incorporate a positioning of the measures from best to most exceedingly awful with supporting reason.
Prepare your paper in Word. Include a minimum of 5 sources. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines. The assignment is due at the end of the session week.
Before you submit your paper, you will need to run your assignment through Turnitin.com and receive an originality report. DO NOT WAIT TO THE LAST MINUTE TO DO THIS. It might take several hours to do this. Resubmissions can take a day or more.
For instructions, go to the "Turnitin Instructions" conference and review the posting entitled "Basic Turnitin Instructions." Note: Assignment = "Paper 1".
After it meets all of the stated criteria in the posting, attach the paper AND the originality report in your Assignments Folder.
Grading Criteria
This assignment is worth 10 percent of your total grade.
|
Criteria |
Excellent A (90+) |
Satisfactory B (80-89) |
Needs Improvement (below 80) |
|
Content (80%) |
 |
||
|
Clarity of OS security threats |
The vulnerabilities addressed are thoroughly developed and clearly stated. |
The vulnerabilies addressed are adequately developed and clearly stated. |
One or more of the vulnerabilities addressed are neither adequately developed or clearly stated. |
|
Clarity of mitigation |
The mitigation approach presented is thorough and complete. |
The mitigation approach presented is complete. |
The mitigation approach presented is incomplete. |
|
Clarity of organizational impact of vulnerability |
The impact on organizations and organizational response to chosen vulnerability is thoroughly developed and logically presented. |
The impact on organizations and organizational response to chosen vulnerability is sufficiently developed and logically presented. |
The impact on organizations and organizational response to chosen vulnerability is not sufficiently developed and/or not logically presented. |
|
Quality of documented support |
The discussion in the paper is based on a thorough review of the literature. |
The discussion in the paper is based on an adequate review of the literature. |
The literature review presented in the paper is inadequate. |
|
Form (20%) |
 |
||
|
Organization |
The content is well organized with clear transitions among major subtopics. |
The content is generally well organized with some improvement possible in transitioning among subtopics. |
The organization of the content is confusing without clear transitions among subtopics. |
|
Writing style |
Graduate level writing is reflected throughout the paper, including accurate spelling, punctuation, grammar, and sentence structure. |
Writing is acceptable, a few errors in spelling, punctuation, grammar, and/or sentence structure. |
Writing does not meet graduate standards. Unacceptable number of errors in spelling, punctuation, grammar, sentence structure, and/or citation format. |
|
Use of proper APA formatting |
In-text citations are presented in proper APA format and all sources are identified in the reference list and cited in proper APA format. |
Minor errors in citation identification and/or APA format. |
Unacceptable number of errors in citation identification and/or APA format. |
Â
SCORING FORM (Completed by Instructor)
|
Criteria |
Points (0-100) |
Comments |
|
Content (80%) |
 |
|
|
Clarity of cybersecurity threat |
 |
 |
|
Clarity of mitigation |
 |
 |
|
Clarity of organizational impact of vulnerability |
 |
 |
|
Quality of documented support |
 |
 |
|
Subtotal: Content |
 |
 |
|
Average: Content (Divide SC by 4) |
 |
 |
|
Form (20%) |
 |
|
|
Organization |
 |
 |
|
Writing style |
 |
 |
|
Use of proper APA formatting |
 |
 |
|
Subtotal: Form |
 |
 |
|
Average: Form (Divide SF by 3) |
 |
 |
Â
Â
Grade Calculation:
Â
[(Average:Content) x 0.80] + [(Average:Form) x 0.20] = _____
-----------