The document provides guidelines for an assignment where students assume the role of a lead network security administrator. They must provide instruction to new network security technicians on identifying vulnerabilities in current security countermeasures. Specifically, students must address prevalent web security threats, the hazards they present, how threats are exploiting vulnerabilities, steps to prevent exploits, and the pros and cons of security measures like firewalls and access control. The report submission must be 2-3 paragraphs and cite at least 3 sources using APA format. Instructors will provide feedback using a rubric evaluating students' treatment of these critical elements.
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
IT 549 Scenario Assignment Module Eight Guidelines and Rubri.docx
1. IT 549 Scenario Assignment Module Eight Guidelines and
Rubric
For the Module Eight assignment, students will assume the role
of lead network security administrator within an organization.
Students will then be required to
provide instruction pertaining to identifying holes in security
countermeasures to newly hired network security technicians.
This provides students with
experience in not only evaluating vulnerabilities in a network,
but also conveying this knowledge to subordinates. These are
valuable skills that will be needed in
order to design an information assurance plan and ultimately
explain its intent to members of the organization.
Prompt: Assume that you are the lead network security expert in
your organization. Because of the recent rise in web security
issues and the development of the
global marketplace, your organization has decided to hire
additional network security technicians. Once hired, you are to
give a report to these individuals
designed to illustrate holes in current security countermeasures,
along with ways in which these holes can be filled. In your
report, ensure you address the areas
mentioned below:
prevalent, the hazards they present, and how these threats are
exploiting holes in current security
countermeasures
2. existing web security countermeasures from being exploited
choosing to implement
measures such as firewalls, access control measures, and
cryptographic systems
Guidelines for Submission: Your responses for each prompt
must be submitted as two to three paragraphs and as a Microsoft
Word document with double
spacing, 12-point T imes New Roman font, one-inch margins,
and at least three sources cited in APA format.
Instructor Feedback: This activity uses an integrated rubric in
Blackboard. Students can view instructor feedback in the Grade
Center. For more information,
review these instructions.
Critical Elements Exemplary (100%) Proficient (85%) Needs
Improvement (55%) Not Evident (0%) Value
Threats Meets “Proficient” criteria and
the threat described uses
content based vocabulary and
research based evidence to
support the answer
Identifies which web security
threats are most prevalent
Submission identifies web
security threats but not the
most prevalent, or the
submission is not supported by
3. scholarly evidence
Submission does not identify or
explain prevalent web security
threats
20
Hazards Meets “Proficient” criteria and
the explanation of the hazards
uses research based evidence to
support what security threats
the hazards present
Explains the hazards that web
security threats present
Submission suggests the hazards
that web security presents to a
network, but does not explain
the hazards
Submission does not explain the
hazards that web security
threats present to a network
15
http://snhu-
media.snhu.edu/files/production_documentation/formatting/rubr
ic_feedback_instructions_student.pdf
Exploitations Meets “Proficient” criteria and
the explanation of how threats
4. are exploiting holes in current
security countermeasures is
substantiated by research based
evidence to support the answer
Explains how the identified
threats are presently exploiting
holes in current security
countermeasures
Submission explains how the
identified threats are exploiting
holes in current security
countermeasures but does not
use content based vocabulary to
do so
Submission does not explain
how the identified threats are
exploiting holes in security
countermeasures
20
Preventative Actions Meets “Proficient” criteria and
the description of the steps that
should be taken to prevent web
security countermeasures from
being exploited uses content
based vocabulary and research
based evidence to support the
answer
Explains the steps that should
be taken to prevent existing
web security countermeasures
5. from being exploited
Submission does not use
research based evidence to
support the steps that need to
be taken to prevent existing
web security countermeasures
from being exploited
Submission does not explain the
steps that should be taken to
prevent existing web security
countermeasures from being
exploited
15
Pros and Cons Meets “Proficient” criteria and
the explanation of both the pros
and the cons is supported by
content based vocabulary and
research based evidence to
support the answer
Assesses the pros and cons of
choosing to implement
measures such as firewalls,
access control measures, and
cryptographic systems
Submission addresses either the
pros or the cons of choosing to
implement measures such as
firewalls, but does not explain
or assess both
6. Submission addresses neither
the pros nor the cons of
choosing to implement
measures such as firewalls,
access control measures, and
cryptographic systems
20
Articulation of
Response
Submission is free of errors
related to citations, grammar,
spelling, syntax, and
organization and is presented in
a professional and easy-to-read
format
Submission has no major errors
related to citations, grammar,
spelling, syntax, or organization
Submission has major errors
related to citations, grammar,
spelling, syntax, or organization
that negatively impact
readability and articulation of
main ideas
Submission has critical errors
related to citations, grammar,
spelling, syntax, or organization
that prevent understanding of
ideas