SlideShare a Scribd company logo
1 of 7
Points: 160
Technical Paper: Risk Assessment
Criteria
Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Describe the company network, interconnection, and
communication environment.
Weight: 15%
Did not submit or incompletely described the company network,
interconnection, and communication environment.
Partially described the company network, interconnection, and
communication environment.
Satisfactorily described the company network, interconnection,
and communication environment.
Thoroughly described the company network, interconnection,
and communication environment.
2a. Defend your assumptions where pertinent information from
the scenario isn’t available.
Weight: 5%
Did not submit or incompletely defended your assumptions
where pertinent information from the scenario isn’t available.
Partially defended your assumptions where pertinent
information from the scenario isn’t available.
Satisfactorily defended your assumptions where pertinent
information from the scenario isn’t available.
Thoroughly defended your assumptions where pertinent
information from the scenario isn’t available.
2b. Ascertain apparent security vulnerabilities, and analyze at
least three (3) such vulnerabilities. Such analysis should
entertain the possibility of faulty network design. Recommend
mitigation processes and procedures for each of the identified
vulnerabilities.
Weight: 5%
Did not submit or incompletely ascertained apparent security
vulnerabilities; did not submit or incompletely analyzed at least
three (3) such vulnerabilities. Did not submit or incompletely
entertained the possibility of faulty network design. Did not
submit or incompletely recommended mitigation processes and
procedures for each of the identified vulnerabilities.
Partially ascertained apparent security vulnerabilities; partially
analyzed at least three (3) such vulnerabilities. Partially
entertained the possibility of faulty network design. Partially
recommended mitigation processes and procedures for each of
the identified vulnerabilities.
Satisfactorily ascertained apparent security vulnerabilities;
satisfactorily analyzed at least three (3) such vulnerabilities
Satisfactorily entertained the possibility of faulty network
design. Satisfactorily recommended mitigation processes and
procedures for each of the identified vulnerabilities.
Thoroughly ascertained apparent security vulnerabilities;
thoroughly analyzed at least three (3) such vulnerabilities.
Thoroughly entertained the possibility of faulty network design.
Thoroughly recommended mitigation processes and procedures
for each of the identified vulnerabilities.
2c. Justify your cryptography recommendations, based on
security concerns and requirements, data-driven decision-
making, and objective opinions.
Weight: 5%
Did not submit or incompletely justified your cryptography
recommendations, based on security concerns and requirements,
data-driven decision making, and objective opinions.
Partially justified your cryptography recommendations, based
on security concerns and requirements, data-driven decision-
making, and objective opinions.
Satisfactorily justified your cryptography recommendations,
based on security concerns and requirements, data-driven
decision-making, and objective opinions.
Thoroughly justified your cryptography recommendations,
based on security concerns and requirements, data-driven
decision-making, and objective opinions.
3. Examine whether your risk assessment methodology is
quantitative, qualitative, or a combination of these, and discuss
the main reasons why you believe that the methodology that you
utilized was the most appropriate.
Weight: 20%
Did not submit or incompletely examined whether your risk
assessment methodology is quantitative, qualitative, or a
combination of these; did not submit or incompletely discussed
the main reasons why you believe that the methodology that you
utilized was the most appropriate.
Partially examined whether your risk assessment methodology
is quantitative, qualitative, or a combination of these; partially
discussed the main reasons why you believe that the
methodology that you utilized was the most appropriate.
Satisfactorily examined whether your risk assessment
methodology is quantitative, qualitative, or a combination of
these; satisfactorily discussed the main reasons why you believe
that the methodology that you utilized was the most appropriate.
Thoroughly examined whether your risk assessment
methodology is quantitative, qualitative, or a combination of
these; thoroughly discussed the main reasons why you believe
that the methodology that you utilized was the most appropriate.
4. Explain the way in which you would present your findings
and assessment to the company’s management and thus
facilitate security buy-in and concentration.
Weight: 15%
Did not submit or incompletely explained the way in which you
would present your findings and assessment to the company’s
management and thus facilitate security buy-in and
concentration.
Partially explained the way in which you would present your
findings and assessment to the company’s management and thus
facilitate security buy-in and concentration.
Satisfactorily explained the way in which you would present
your findings and assessment to the company’s management and
thus facilitate security buy-in and concentration.
Thoroughly explained the way in which you would present your
findings and assessment to the company’s management and thus
facilitate security buy-in and concentration.
5. Using Microsoft Visio or its open source equivalent, redraw
the CFI diagram, depicted as a secure and risk-mitigating
model.
Weight: 20%
Did not submit or incompletely redrew the CFI diagram,
depicted as a secure and risk-mitigating model, using Microsoft
Visio or its open source equivalent.
Partially redrew the CFI diagram, depicted as a secure and risk-
mitigating model, using Microsoft Visio or its open source
equivalent.
Satisfactorily redrew the CFI diagram, depicted as a secure and
risk-mitigating model, using Microsoft Visio or its open source
equivalent.
Thoroughly redrew the CFI diagram, depicted as a secure and
risk-mitigating model, using Microsoft Visio or its open source
equivalent.
6. 3 references
Weight: 5%
No references provided
Does not meet the required number of references; some or all
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
7. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 6 errors present
5-6 errors present
3-4 errors present
0-2 errors present
Points 160Technical Paper Risk AssessmentCriteriaUna.docx

More Related Content

Similar to Points 160Technical Paper Risk AssessmentCriteriaUna.docx

Assignment 4 Data MiningDue Week 9 and worth 75 points The .docx
Assignment 4 Data MiningDue Week 9 and worth 75 points The .docxAssignment 4 Data MiningDue Week 9 and worth 75 points The .docx
Assignment 4 Data MiningDue Week 9 and worth 75 points The .docxssuser562afc1
 
IT 549 Scenario Assignment Module Eight Guidelines and Rubri.docx
IT 549 Scenario Assignment Module Eight Guidelines and Rubri.docxIT 549 Scenario Assignment Module Eight Guidelines and Rubri.docx
IT 549 Scenario Assignment Module Eight Guidelines and Rubri.docxchristiandean12115
 
IT 549 Milestone Three Guidelines and Rubric In order .docx
IT 549 Milestone Three Guidelines and Rubric   In order .docxIT 549 Milestone Three Guidelines and Rubric   In order .docx
IT 549 Milestone Three Guidelines and Rubric In order .docxvrickens
 
Note Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docxNote Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docxIlonaThornburg83
 
Points 50Project Deliverable 1 Project Plan InceptionCriteri.docx
Points 50Project Deliverable 1 Project Plan InceptionCriteri.docxPoints 50Project Deliverable 1 Project Plan InceptionCriteri.docx
Points 50Project Deliverable 1 Project Plan InceptionCriteri.docxharrisonhoward80223
 
Points 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docxPoints 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docxLeilaniPoolsy
 
Phase 2 Communication planIn this phase, you need to communic.docx
Phase 2 Communication planIn this phase, you need to communic.docxPhase 2 Communication planIn this phase, you need to communic.docx
Phase 2 Communication planIn this phase, you need to communic.docxtemplestewart19
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxjoshua2345678
 
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docxProject Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docxbfingarjcmc
 
Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docx
Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docxAssignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docx
Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docxmurgatroydcrista
 
Points 120Case Study 1 Cyber Security in Business Organization.docx
Points 120Case Study 1 Cyber Security in Business Organization.docxPoints 120Case Study 1 Cyber Security in Business Organization.docx
Points 120Case Study 1 Cyber Security in Business Organization.docxLeilaniPoolsy
 
Sheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docx
Sheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docxSheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docx
Sheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docxlesleyryder69361
 
Rubric Name Project 7 Organization Enterprise Plan and Security P.docx
Rubric Name Project 7 Organization Enterprise Plan and Security P.docxRubric Name Project 7 Organization Enterprise Plan and Security P.docx
Rubric Name Project 7 Organization Enterprise Plan and Security P.docxSUBHI7
 
INTRODUCTION Throughout your career in cybersecurity you will be ask.docx
INTRODUCTION Throughout your career in cybersecurity you will be ask.docxINTRODUCTION Throughout your career in cybersecurity you will be ask.docx
INTRODUCTION Throughout your career in cybersecurity you will be ask.docx4934bk
 
Grading RubricECON 203GRADING RUBRIC FOR ECON 203 PAPERStudentD.docx
Grading RubricECON 203GRADING RUBRIC FOR ECON 203 PAPERStudentD.docxGrading RubricECON 203GRADING RUBRIC FOR ECON 203 PAPERStudentD.docx
Grading RubricECON 203GRADING RUBRIC FOR ECON 203 PAPERStudentD.docxwhittemorelucilla
 
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docxProject Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docxbfingarjcmc
 
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxGAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxstarkeykellye
 

Similar to Points 160Technical Paper Risk AssessmentCriteriaUna.docx (17)

Assignment 4 Data MiningDue Week 9 and worth 75 points The .docx
Assignment 4 Data MiningDue Week 9 and worth 75 points The .docxAssignment 4 Data MiningDue Week 9 and worth 75 points The .docx
Assignment 4 Data MiningDue Week 9 and worth 75 points The .docx
 
IT 549 Scenario Assignment Module Eight Guidelines and Rubri.docx
IT 549 Scenario Assignment Module Eight Guidelines and Rubri.docxIT 549 Scenario Assignment Module Eight Guidelines and Rubri.docx
IT 549 Scenario Assignment Module Eight Guidelines and Rubri.docx
 
IT 549 Milestone Three Guidelines and Rubric In order .docx
IT 549 Milestone Three Guidelines and Rubric   In order .docxIT 549 Milestone Three Guidelines and Rubric   In order .docx
IT 549 Milestone Three Guidelines and Rubric In order .docx
 
Note Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docxNote Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docx
 
Points 50Project Deliverable 1 Project Plan InceptionCriteri.docx
Points 50Project Deliverable 1 Project Plan InceptionCriteri.docxPoints 50Project Deliverable 1 Project Plan InceptionCriteri.docx
Points 50Project Deliverable 1 Project Plan InceptionCriteri.docx
 
Points 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docxPoints 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docx
 
Phase 2 Communication planIn this phase, you need to communic.docx
Phase 2 Communication planIn this phase, you need to communic.docxPhase 2 Communication planIn this phase, you need to communic.docx
Phase 2 Communication planIn this phase, you need to communic.docx
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docx
 
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docxProject Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
 
Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docx
Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docxAssignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docx
Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docx
 
Points 120Case Study 1 Cyber Security in Business Organization.docx
Points 120Case Study 1 Cyber Security in Business Organization.docxPoints 120Case Study 1 Cyber Security in Business Organization.docx
Points 120Case Study 1 Cyber Security in Business Organization.docx
 
Sheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docx
Sheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docxSheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docx
Sheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docx
 
Rubric Name Project 7 Organization Enterprise Plan and Security P.docx
Rubric Name Project 7 Organization Enterprise Plan and Security P.docxRubric Name Project 7 Organization Enterprise Plan and Security P.docx
Rubric Name Project 7 Organization Enterprise Plan and Security P.docx
 
INTRODUCTION Throughout your career in cybersecurity you will be ask.docx
INTRODUCTION Throughout your career in cybersecurity you will be ask.docxINTRODUCTION Throughout your career in cybersecurity you will be ask.docx
INTRODUCTION Throughout your career in cybersecurity you will be ask.docx
 
Grading RubricECON 203GRADING RUBRIC FOR ECON 203 PAPERStudentD.docx
Grading RubricECON 203GRADING RUBRIC FOR ECON 203 PAPERStudentD.docxGrading RubricECON 203GRADING RUBRIC FOR ECON 203 PAPERStudentD.docx
Grading RubricECON 203GRADING RUBRIC FOR ECON 203 PAPERStudentD.docx
 
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docxProject Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
 
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxGAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
 

More from LeilaniPoolsy

Policy Research PaperResearch and write a 5 page academic .docx
Policy Research PaperResearch and write a 5 page academic .docxPolicy Research PaperResearch and write a 5 page academic .docx
Policy Research PaperResearch and write a 5 page academic .docxLeilaniPoolsy
 
POL  101  –  Political  Science  Portfolio  Projec.docx
POL  101  –  Political  Science  Portfolio  Projec.docxPOL  101  –  Political  Science  Portfolio  Projec.docx
POL  101  –  Political  Science  Portfolio  Projec.docxLeilaniPoolsy
 
POL 123 – Case Analysis 5 Fact Patterns Write an analysis for .docx
POL 123 – Case Analysis 5 Fact Patterns Write an analysis for .docxPOL 123 – Case Analysis 5 Fact Patterns Write an analysis for .docx
POL 123 – Case Analysis 5 Fact Patterns Write an analysis for .docxLeilaniPoolsy
 
Political Systems ChartCharacteristics of a BandForaging .docx
Political Systems ChartCharacteristics of a BandForaging .docxPolitical Systems ChartCharacteristics of a BandForaging .docx
Political Systems ChartCharacteristics of a BandForaging .docxLeilaniPoolsy
 
Polk Company builds custom fishing lures for sporting goods stores.docx
Polk Company builds custom fishing lures for sporting goods stores.docxPolk Company builds custom fishing lures for sporting goods stores.docx
Polk Company builds custom fishing lures for sporting goods stores.docxLeilaniPoolsy
 
PoliticalLegal Issues - Parth VyasI. OverviewA. Issues1. .docx
PoliticalLegal Issues - Parth VyasI. OverviewA. Issues1. .docxPoliticalLegal Issues - Parth VyasI. OverviewA. Issues1. .docx
PoliticalLegal Issues - Parth VyasI. OverviewA. Issues1. .docxLeilaniPoolsy
 
Political corruption is epidemic in Russia today. What e.docx
Political corruption is epidemic in Russia today. What e.docxPolitical corruption is epidemic in Russia today. What e.docx
Political corruption is epidemic in Russia today. What e.docxLeilaniPoolsy
 
POLA43Describe the governor’s roles in influencing the budgetary.docx
POLA43Describe the governor’s roles in influencing the budgetary.docxPOLA43Describe the governor’s roles in influencing the budgetary.docx
POLA43Describe the governor’s roles in influencing the budgetary.docxLeilaniPoolsy
 
POL 201 Week 5 DQ 2PreparePrior to beginning your reflection,.docx
POL 201 Week 5 DQ 2PreparePrior to beginning your reflection,.docxPOL 201 Week 5 DQ 2PreparePrior to beginning your reflection,.docx
POL 201 Week 5 DQ 2PreparePrior to beginning your reflection,.docxLeilaniPoolsy
 
POL110 Week 10 Scenario Script Domestic, Foreign and Military Pol.docx
POL110 Week 10 Scenario Script Domestic, Foreign and Military Pol.docxPOL110 Week 10 Scenario Script Domestic, Foreign and Military Pol.docx
POL110 Week 10 Scenario Script Domestic, Foreign and Military Pol.docxLeilaniPoolsy
 
Political Science 100 Introduction to American GovernmentCOURSE DES.docx
Political Science 100 Introduction to American GovernmentCOURSE DES.docxPolitical Science 100 Introduction to American GovernmentCOURSE DES.docx
Political Science 100 Introduction to American GovernmentCOURSE DES.docxLeilaniPoolsy
 
Policy implementation gridStakeholder Stake or inter.docx
Policy implementation gridStakeholder Stake or inter.docxPolicy implementation gridStakeholder Stake or inter.docx
Policy implementation gridStakeholder Stake or inter.docxLeilaniPoolsy
 
Political Communication, 30100–116, 2013Copyright © Taylor .docx
Political Communication, 30100–116, 2013Copyright © Taylor .docxPolitical Communication, 30100–116, 2013Copyright © Taylor .docx
Political Communication, 30100–116, 2013Copyright © Taylor .docxLeilaniPoolsy
 
POL 201Post Your IntroductionPrepare Prior to posting y.docx
POL 201Post Your IntroductionPrepare Prior to posting y.docxPOL 201Post Your IntroductionPrepare Prior to posting y.docx
POL 201Post Your IntroductionPrepare Prior to posting y.docxLeilaniPoolsy
 
POLS Terms to Be Reviewed. Agenda SettingPoli.docx
POLS  Terms to Be Reviewed.   Agenda SettingPoli.docxPOLS  Terms to Be Reviewed.   Agenda SettingPoli.docx
POLS Terms to Be Reviewed. Agenda SettingPoli.docxLeilaniPoolsy
 
Polit, D. & Beck, C. (2012). Nursing research Generating and asse.docx
Polit, D. & Beck, C. (2012). Nursing research Generating and asse.docxPolit, D. & Beck, C. (2012). Nursing research Generating and asse.docx
Polit, D. & Beck, C. (2012). Nursing research Generating and asse.docxLeilaniPoolsy
 
Policies to Assist Parents with Young ChildrenVO L . 2 1 .docx
Policies to Assist Parents with Young ChildrenVO L .  2 1 .docxPolicies to Assist Parents with Young ChildrenVO L .  2 1 .docx
Policies to Assist Parents with Young ChildrenVO L . 2 1 .docxLeilaniPoolsy
 
Policies and PerspectivesHCS455 Version 51University of P.docx
Policies and PerspectivesHCS455 Version 51University of P.docxPolicies and PerspectivesHCS455 Version 51University of P.docx
Policies and PerspectivesHCS455 Version 51University of P.docxLeilaniPoolsy
 
Policemen of the WorldThesis and Outline 1Policemen of the World.docx
Policemen of the WorldThesis and Outline 1Policemen of the World.docxPolicemen of the WorldThesis and Outline 1Policemen of the World.docx
Policemen of the WorldThesis and Outline 1Policemen of the World.docxLeilaniPoolsy
 
POL110 Week 9 Scenario Script The Bureaucracy and the Judiciary.docx
POL110 Week 9 Scenario Script The Bureaucracy and the Judiciary.docxPOL110 Week 9 Scenario Script The Bureaucracy and the Judiciary.docx
POL110 Week 9 Scenario Script The Bureaucracy and the Judiciary.docxLeilaniPoolsy
 

More from LeilaniPoolsy (20)

Policy Research PaperResearch and write a 5 page academic .docx
Policy Research PaperResearch and write a 5 page academic .docxPolicy Research PaperResearch and write a 5 page academic .docx
Policy Research PaperResearch and write a 5 page academic .docx
 
POL  101  –  Political  Science  Portfolio  Projec.docx
POL  101  –  Political  Science  Portfolio  Projec.docxPOL  101  –  Political  Science  Portfolio  Projec.docx
POL  101  –  Political  Science  Portfolio  Projec.docx
 
POL 123 – Case Analysis 5 Fact Patterns Write an analysis for .docx
POL 123 – Case Analysis 5 Fact Patterns Write an analysis for .docxPOL 123 – Case Analysis 5 Fact Patterns Write an analysis for .docx
POL 123 – Case Analysis 5 Fact Patterns Write an analysis for .docx
 
Political Systems ChartCharacteristics of a BandForaging .docx
Political Systems ChartCharacteristics of a BandForaging .docxPolitical Systems ChartCharacteristics of a BandForaging .docx
Political Systems ChartCharacteristics of a BandForaging .docx
 
Polk Company builds custom fishing lures for sporting goods stores.docx
Polk Company builds custom fishing lures for sporting goods stores.docxPolk Company builds custom fishing lures for sporting goods stores.docx
Polk Company builds custom fishing lures for sporting goods stores.docx
 
PoliticalLegal Issues - Parth VyasI. OverviewA. Issues1. .docx
PoliticalLegal Issues - Parth VyasI. OverviewA. Issues1. .docxPoliticalLegal Issues - Parth VyasI. OverviewA. Issues1. .docx
PoliticalLegal Issues - Parth VyasI. OverviewA. Issues1. .docx
 
Political corruption is epidemic in Russia today. What e.docx
Political corruption is epidemic in Russia today. What e.docxPolitical corruption is epidemic in Russia today. What e.docx
Political corruption is epidemic in Russia today. What e.docx
 
POLA43Describe the governor’s roles in influencing the budgetary.docx
POLA43Describe the governor’s roles in influencing the budgetary.docxPOLA43Describe the governor’s roles in influencing the budgetary.docx
POLA43Describe the governor’s roles in influencing the budgetary.docx
 
POL 201 Week 5 DQ 2PreparePrior to beginning your reflection,.docx
POL 201 Week 5 DQ 2PreparePrior to beginning your reflection,.docxPOL 201 Week 5 DQ 2PreparePrior to beginning your reflection,.docx
POL 201 Week 5 DQ 2PreparePrior to beginning your reflection,.docx
 
POL110 Week 10 Scenario Script Domestic, Foreign and Military Pol.docx
POL110 Week 10 Scenario Script Domestic, Foreign and Military Pol.docxPOL110 Week 10 Scenario Script Domestic, Foreign and Military Pol.docx
POL110 Week 10 Scenario Script Domestic, Foreign and Military Pol.docx
 
Political Science 100 Introduction to American GovernmentCOURSE DES.docx
Political Science 100 Introduction to American GovernmentCOURSE DES.docxPolitical Science 100 Introduction to American GovernmentCOURSE DES.docx
Political Science 100 Introduction to American GovernmentCOURSE DES.docx
 
Policy implementation gridStakeholder Stake or inter.docx
Policy implementation gridStakeholder Stake or inter.docxPolicy implementation gridStakeholder Stake or inter.docx
Policy implementation gridStakeholder Stake or inter.docx
 
Political Communication, 30100–116, 2013Copyright © Taylor .docx
Political Communication, 30100–116, 2013Copyright © Taylor .docxPolitical Communication, 30100–116, 2013Copyright © Taylor .docx
Political Communication, 30100–116, 2013Copyright © Taylor .docx
 
POL 201Post Your IntroductionPrepare Prior to posting y.docx
POL 201Post Your IntroductionPrepare Prior to posting y.docxPOL 201Post Your IntroductionPrepare Prior to posting y.docx
POL 201Post Your IntroductionPrepare Prior to posting y.docx
 
POLS Terms to Be Reviewed. Agenda SettingPoli.docx
POLS  Terms to Be Reviewed.   Agenda SettingPoli.docxPOLS  Terms to Be Reviewed.   Agenda SettingPoli.docx
POLS Terms to Be Reviewed. Agenda SettingPoli.docx
 
Polit, D. & Beck, C. (2012). Nursing research Generating and asse.docx
Polit, D. & Beck, C. (2012). Nursing research Generating and asse.docxPolit, D. & Beck, C. (2012). Nursing research Generating and asse.docx
Polit, D. & Beck, C. (2012). Nursing research Generating and asse.docx
 
Policies to Assist Parents with Young ChildrenVO L . 2 1 .docx
Policies to Assist Parents with Young ChildrenVO L .  2 1 .docxPolicies to Assist Parents with Young ChildrenVO L .  2 1 .docx
Policies to Assist Parents with Young ChildrenVO L . 2 1 .docx
 
Policies and PerspectivesHCS455 Version 51University of P.docx
Policies and PerspectivesHCS455 Version 51University of P.docxPolicies and PerspectivesHCS455 Version 51University of P.docx
Policies and PerspectivesHCS455 Version 51University of P.docx
 
Policemen of the WorldThesis and Outline 1Policemen of the World.docx
Policemen of the WorldThesis and Outline 1Policemen of the World.docxPolicemen of the WorldThesis and Outline 1Policemen of the World.docx
Policemen of the WorldThesis and Outline 1Policemen of the World.docx
 
POL110 Week 9 Scenario Script The Bureaucracy and the Judiciary.docx
POL110 Week 9 Scenario Script The Bureaucracy and the Judiciary.docxPOL110 Week 9 Scenario Script The Bureaucracy and the Judiciary.docx
POL110 Week 9 Scenario Script The Bureaucracy and the Judiciary.docx
 

Recently uploaded

UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppCeline George
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital ManagementMBA Assignment Experts
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesPooky Knightsmith
 
Scopus Indexed Journals 2024 - ISCOPUS Publications
Scopus Indexed Journals 2024 - ISCOPUS PublicationsScopus Indexed Journals 2024 - ISCOPUS Publications
Scopus Indexed Journals 2024 - ISCOPUS PublicationsISCOPE Publication
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17Celine George
 
Climbers and Creepers used in landscaping
Climbers and Creepers used in landscapingClimbers and Creepers used in landscaping
Climbers and Creepers used in landscapingDr. M. Kumaresan Hort.
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptxVishal Singh
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportDenish Jangid
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxMarlene Maheu
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhleson0603
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxMohamed Rizk Khodair
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesAmanpreetKaur157993
 

Recently uploaded (20)

UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
Scopus Indexed Journals 2024 - ISCOPUS Publications
Scopus Indexed Journals 2024 - ISCOPUS PublicationsScopus Indexed Journals 2024 - ISCOPUS Publications
Scopus Indexed Journals 2024 - ISCOPUS Publications
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Climbers and Creepers used in landscaping
Climbers and Creepers used in landscapingClimbers and Creepers used in landscaping
Climbers and Creepers used in landscaping
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 

Points 160Technical Paper Risk AssessmentCriteriaUna.docx

  • 1. Points: 160 Technical Paper: Risk Assessment Criteria Unacceptable Below 70% F Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Describe the company network, interconnection, and communication environment. Weight: 15% Did not submit or incompletely described the company network, interconnection, and communication environment. Partially described the company network, interconnection, and communication environment. Satisfactorily described the company network, interconnection,
  • 2. and communication environment. Thoroughly described the company network, interconnection, and communication environment. 2a. Defend your assumptions where pertinent information from the scenario isn’t available. Weight: 5% Did not submit or incompletely defended your assumptions where pertinent information from the scenario isn’t available. Partially defended your assumptions where pertinent information from the scenario isn’t available. Satisfactorily defended your assumptions where pertinent information from the scenario isn’t available. Thoroughly defended your assumptions where pertinent information from the scenario isn’t available. 2b. Ascertain apparent security vulnerabilities, and analyze at least three (3) such vulnerabilities. Such analysis should entertain the possibility of faulty network design. Recommend mitigation processes and procedures for each of the identified vulnerabilities. Weight: 5% Did not submit or incompletely ascertained apparent security vulnerabilities; did not submit or incompletely analyzed at least three (3) such vulnerabilities. Did not submit or incompletely entertained the possibility of faulty network design. Did not submit or incompletely recommended mitigation processes and procedures for each of the identified vulnerabilities.
  • 3. Partially ascertained apparent security vulnerabilities; partially analyzed at least three (3) such vulnerabilities. Partially entertained the possibility of faulty network design. Partially recommended mitigation processes and procedures for each of the identified vulnerabilities. Satisfactorily ascertained apparent security vulnerabilities; satisfactorily analyzed at least three (3) such vulnerabilities Satisfactorily entertained the possibility of faulty network design. Satisfactorily recommended mitigation processes and procedures for each of the identified vulnerabilities. Thoroughly ascertained apparent security vulnerabilities; thoroughly analyzed at least three (3) such vulnerabilities. Thoroughly entertained the possibility of faulty network design. Thoroughly recommended mitigation processes and procedures for each of the identified vulnerabilities. 2c. Justify your cryptography recommendations, based on security concerns and requirements, data-driven decision- making, and objective opinions. Weight: 5% Did not submit or incompletely justified your cryptography recommendations, based on security concerns and requirements, data-driven decision making, and objective opinions. Partially justified your cryptography recommendations, based on security concerns and requirements, data-driven decision- making, and objective opinions. Satisfactorily justified your cryptography recommendations, based on security concerns and requirements, data-driven decision-making, and objective opinions.
  • 4. Thoroughly justified your cryptography recommendations, based on security concerns and requirements, data-driven decision-making, and objective opinions. 3. Examine whether your risk assessment methodology is quantitative, qualitative, or a combination of these, and discuss the main reasons why you believe that the methodology that you utilized was the most appropriate. Weight: 20% Did not submit or incompletely examined whether your risk assessment methodology is quantitative, qualitative, or a combination of these; did not submit or incompletely discussed the main reasons why you believe that the methodology that you utilized was the most appropriate. Partially examined whether your risk assessment methodology is quantitative, qualitative, or a combination of these; partially discussed the main reasons why you believe that the methodology that you utilized was the most appropriate. Satisfactorily examined whether your risk assessment methodology is quantitative, qualitative, or a combination of these; satisfactorily discussed the main reasons why you believe that the methodology that you utilized was the most appropriate. Thoroughly examined whether your risk assessment methodology is quantitative, qualitative, or a combination of these; thoroughly discussed the main reasons why you believe that the methodology that you utilized was the most appropriate. 4. Explain the way in which you would present your findings and assessment to the company’s management and thus facilitate security buy-in and concentration.
  • 5. Weight: 15% Did not submit or incompletely explained the way in which you would present your findings and assessment to the company’s management and thus facilitate security buy-in and concentration. Partially explained the way in which you would present your findings and assessment to the company’s management and thus facilitate security buy-in and concentration. Satisfactorily explained the way in which you would present your findings and assessment to the company’s management and thus facilitate security buy-in and concentration. Thoroughly explained the way in which you would present your findings and assessment to the company’s management and thus facilitate security buy-in and concentration. 5. Using Microsoft Visio or its open source equivalent, redraw the CFI diagram, depicted as a secure and risk-mitigating model. Weight: 20% Did not submit or incompletely redrew the CFI diagram, depicted as a secure and risk-mitigating model, using Microsoft Visio or its open source equivalent. Partially redrew the CFI diagram, depicted as a secure and risk- mitigating model, using Microsoft Visio or its open source equivalent. Satisfactorily redrew the CFI diagram, depicted as a secure and risk-mitigating model, using Microsoft Visio or its open source equivalent.
  • 6. Thoroughly redrew the CFI diagram, depicted as a secure and risk-mitigating model, using Microsoft Visio or its open source equivalent. 6. 3 references Weight: 5% No references provided Does not meet the required number of references; some or all references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. 7. Clarity, writing mechanics, and formatting requirements Weight: 10% More than 6 errors present 5-6 errors present 3-4 errors present 0-2 errors present