SlideShare a Scribd company logo
1 of 16
Rubric Name: White Paper Grading Rubric
Criteria
Level 4
Level 3
Level 2
Level 1
Level 0
Business Need
15 points
Clearly explains business need for InfoSec (protection
measures) even in the smallest of businesses (e.g., protect
against loss of profit, damage to company’s reputation, costs of
litigation, etc.). Uses information from NIST Small Business
Guide NISTIR 7621 and/or video from assignment (must cite
one or both).
12 points
Basically explains business need for InfoSec (protection
measures) even in the smallest of businesses (e.g., protect
against loss of profit, damage to company’s reputation, costs of
litigation, etc.). Uses information from NIST Small Business
Guide NISTIR 7621 or video from assignment (must cite one).
9 points
Weakly describes business need for InfoSec (protection
measures) even in the smallest of businesses (e.g., protect
against loss of profit, damage to company’s reputation, costs of
litigation, etc.). May use NIST Small Business Guide NISTIR
7621 or video from assignment (may have cited one).
6 points
Little or no explanation of business need for InfoSec (protection
measures) even in the smallest of businesses (e.g., protect
against loss of profit, damage to company’s reputation, costs of
litigation, etc.). May not use NIST Small Business Guide
NISTIR 7621 or video from assignment (may not cite either).
0 points
No submission
Treats and Vulnerabilities
15 points
Clearly explains InfoSec threats and vulnerabilities to non-IT
business owners. Uses common terms to explain.
12 points
Basically explains InfoSec threats and vulnerabilities to non-IT
business owners. Uses some complex terms.
9 points
Weakly explains InfoSec threats and vulnerabilities to non-IT
business owners. Uses several complex terms unknown to
business owners.
6 points
Little or no explanation of InfoSec threats and vulnerabilities to
non-IT business owners. Consistently uses complex terms
unknown to business owners.
0 points
No submission
Key Concepts
15 points
Clearly explains each of the following as part of threats and
vulnerabilities: confidentiality, integrity, availability, non-
repudiation, authentication and authorization, risk.
8 points
Basically explains the following as part of threats and
vulnerabilities: confidentiality, integrity, availability, non-
repudiation, authentication and authorization, risk. May miss
less than 2 key concepts.
6 points
Weakly explains the following as part of threats and
vulnerabilities: confidentiality, integrity, availability, non-
repudiation, authentication and authorization, risk. May miss
less than 3 key concepts.
4 points
Little or no explanation of the following as part of threats and
vulnerabilities: confidentiality, integrity, availability, non-
repudiation, authentication and authorization, risk. May miss
more than 3 key concepts.
0 points
No submission
Recommendations
15 points
Clearly describes a recommendation of the tech, processes and
policies used to solve one of the following threats: data
breach/data theft; denial of service attacks; insider theft of
intellectual property; deliberate corruption of electronic files
including virus/worm infections.
12 points
Basically describes a recommendation of thetech, processes and
policies used to solve one of the following threats: data
breach/data theft; denial of service attacks; insider theft of
intellectual property; deliberate corruption of electronic files
including virus/worm infections.
9 points
Weakly describes a recommendation of thetech, processes and
policies used to solve one of the following threats: data
breach/data theft; denial of service attacks; insider theft of
intellectual property; deliberate corruption of electronic files
including virus/worm infections.
6 points
Little or no description of a recommendation of thetech,
processes and policies used to solve one of the following
threats: data breach/data theft; denial of service attacks; insider
theft of intellectual property; deliberate corruption of electronic
files including virus/worm infections.
0 points
No submission
Impact and Results
15 points
Clearly discusses impact or results expected: costs and benefits
of effective protection measures; costs and penalties of
ineffective or nonexistent protection measures.
12 points
Basically discusses impact or results expected: costs and
benefits of effective protection measures; costs and penalties of
ineffective or nonexistent protection measures.
9 points
Weak discussion of impact or results expected: costs and
benefits of effective protection measures; costs and penalties of
ineffective or nonexistent protection measures.
6 points
Little or no discussion of impact or results expected: costs and
benefits of effective protection measures; costs and penalties of
ineffective or nonexistent protection measures.
0 points
No submission
Finds and Applies New Knowledge
10 points
Used at least 5 authoritative or scholarly sources. No APA
errors in citing material in presentation.
8 points
Used 3-5 authoritative or scholarly sources. Less than 5 APA
citing errors.
6 points
Used 1-2 authoritative or scholarly sources. Less than 10 APA
citing errors.
4 points
Used 1-2 authoritative or scholarly sources. Less than 10 APA
citing errors.
0 points
No submission
Organization, Execution & Appearance
20 points
Prepared MS Word document, used consistent formatting,
section subheadings, submitted one file, used instructor
provided template, correct coversheet and separate reference
page and meets minimum page count. No grammar, use of
first/second person, spelling or punctuation errors.
15 points
MS Word document didn’t follow at least one of the following:
used consistent formatting, section subheadings, submitted one
file, used instructor provided template, correct coversheet and
separate reference page and meets minimum page count. Less
than 5 grammar errors, use of first/second person, spelling or
punctuation errors.
10 points
MS Word document didn’t follow at least two of the following:
used consistent formatting, section subheadings, submitted one
file, used instructor provided template, correct coversheet and
separate reference page and meets minimum page count. Less
than 10 grammar errors, use of first/second person, spelling or
punctuation errors.
5 points
Non MS Word document didn’t follow at least three or more of
the following: used consistent formatting, section subheadings,
submitted one file, used instructor provided template, correct
coversheet and separate reference page and meets minimum
page count. More than 10 grammar errors, use of first/second
person, spelling or punctuation errors.
0 points
No submission
Overall Score
Level 4
27 or more
Level 3
20 or more
Level 2
13 or more
Level 1
0 or more
Information Technology Security
for Small Business
(video script)
Descriptive Text for the Visually Impaired
August 11, 2009
By Joan Porter
Visual:Images related to computer and internet use and images
symbolic of information technology security and cyber crime.
Narration:
“No matter how well you protect your business your
information is still very much at risk and that puts your
business at risk.
Visual: A computer keyboard and a cell phone.
Text: The words, “Names, Emails, Phone Numbers, Account
Numbers, Files, Passwords, User Ids, Payroll, Internet
Transactions, Credit Card Numbers, Electronic Commerce and
Employee Databases” appear.
Narration:
“The dangers change and grow every day and the threats they
pose to your business – and others – can be devastating.”
Text:The words, “The best defense against these growing
attacks?”appear.
Narration:
“The best defense against these growing attacks?”
Text: The words, “Information Technology Security for Small
Business” and “It’s not just good business. It’s essential
business” appear.
Narration:
“Information Technology Security.It’s not just good business.
It’s essential business.”
Visual: Scenes of employees working at computers and
working in a variety of jobs at different kinds of small
businesses.
Narration:
“Today protecting your business’s information is just as critical
as protecting every other asset you have – your property, your
employees and your products. It doesn’t matter what kind of
business you’re in or its size – whether you have one employee
or 500. The fact is, your information is valuable and it’s at
risk.”
Visual: Matthew Scholl, Group Manager, Security Management
and Assurance
Computer Security Division, NIST on camera.
“It’s important that small businesses make IT security a top
priority in order to protect their businesses. They make other
security decisions everyday.
They lock their doors, they have alarm systems, they have
trusted employees working behind the counters. They should
exercise the same level of security and due diligence to their IT
space where they have just as much exposure.”
Visual: Richard Kissel, Information Security Analyst, Computer
Security Division, NIST on camera.
“Cyberspace is a dangerous place to be. We all are there
because we have to be there because that’s where technology
forces us to go right now. And if you don’t understand that
climate and the things that are involved there then you can get
into trouble really quickly.”
Visual: Jane Boorman, Project Manager, Office of
Entrepreneurship Education, U.S. Small Business
Administration on camera.
“There are some 26 million small businesses in this country and
they all need
to pay attention to the dangers of cyber crime. It’s one of the
greatest risks they face but many people don’t realize it. Small
businesses are “open for business!” They want their customers
to come in but they’re so open for business they sometimes
don’t take the time.They don’t really realize that their entire
business is at stake and when they are careless about their
information technology protection, they can lose the entire
business.”
Visual: Matthew Scholl on camera
“The threats that are faced by small businesses are very similar
to the threats faced by the federal government and large
businesses as a whole. The truth of the matter is they don’t care
who you are. All they care about is that they can access your
assets for their purposes.”
Visual: An image showing the globe and a computer keyboard.
Text: The words, “Who are they?” appear.
Narration:
“But who are ‘they?’ Who is responsible for this?”
Text: The words, “Hackers; Experimenters and Vandals;
Hacktivists; Cyber Criminals and Information Warriors” appear.
Narration:
“There are four main types of hackers. Experimenters and
vandals are usually amateurs who do it for the thrill or to make
a reputation for themselves. Hacktivists have a personal or
political agenda. Cyber criminals are in it for the money. Other
hackers are Information Warriors.” Visual: Digital program
code over image of Earth as seen from outer space.
Narration:
“They are professionals who work for nation-states which may
have missions to disrupt the Internet for example, or take out a
city’s electrical grid.”
Visual:Scenes of employees working at computers in a variety
of kinds of businesses.
Narration:
“But all the dangers don’t come from the ‘outside.’ Businesses
can be severely damaged - intentionally or unintentionally - by
their own employees.”
Text: The words, “Insider Threats” appear.
Visual:Scenes of employees and computers at different
businesses.
Narration:
“These ‘insider threats’ are responsible for nearly 80% of the
problems that most small businesses have. No matter where the
threat is coming from, the target is still the same −access to a
business’s systems and information.”
Visual: Richard Kissel on camera
“The reality is that there’s dangers out there in all kinds of
forms.”
Visual: Image of computer code – zeroes and ones.
Text: The words, “Theft of Data and Resources” appear.
Richard Kissel:
“You have theft of data, theft of resources, things like walking
off with a laptop.”
Visual: Richard Kissell on camera
“You have the electronic PDAs of various kinds and literally
some people run their businesses from these devices not
understanding that all that sensitive information on those
devices is vulnerable and it’s not encrypted, it’s not protected
and so if they lose the device or somebody walks off with it all
that data is gone. And may come back to haunt them later on.”
Visual: Image of a hacker typing on a laptop
Text:The words, “Denial-of-Service Attacks” appear.
Visual: Richard Kissel on camera
“You have other activities that nefarious folks can take and
that’s denial-of-service wherethey just hammer a system until it
just stops functioning and sometimes this is done to blackmail a
business. They demonstrate that they can take down the system
or the network and they say, ‘if you don’t pay us, we will take
you out,’ and they mean it.”
Text:The words, “Malicious Code” appear.
Visual: Richard Kissel on camera
“Then you have people releasing malicious code. Once it gets
on a system then it’ll do whatever it’s programmed to do.
Malicious code can include things like keystroke loggers, which
if somebody puts one on your system, it sits there and silently
watches every keystroke you make which includes little things
like bank account numbers, the passwords you use to get into
your accounts, the answers you give to the security verification
questions.”
Text:The word, “Viruses” appears.
Visual: Several computer screens
Richard Kissel:
“And viruses are a case of malicious code – and in terms of
viruses there’s about 70,000 active viruses out there right now.
The number goes up every year.”
Visual: Richard Kisselon camera
“So these are the kind of threats that we look at, we see out
there. These are general classes of things that can go wrong and
they all have the potential to damage or destroy an average
small business.”
Visual: Employees working at computers and a meeting of one
company’s employees.
Narration:
“A survey by the Computer Security Institute showed that a
third of all data breaches in just one year came at the expense of
businesses with 100 employees or less.”
Text: The words, “Computer Security Institute Survey; 42% -
Laptop Theft; 44% - Insider Abuse; 21% - Denial-of-Service
Attacks; 50% - Computer Viruses” and “20% - Systems made
into bots” appear.
Narration:
“Another survey of businesses – 23% of which were small
businesses - showed that 42% reported laptop theft, 44%
reported insider abuse, 21% reported denial-of- service attacks,
50% detected computer viruses and 20% reported systems being
made into bots.”
Visual: A variety of people in typing on computers and other
activities at different types of businesses.
Narration:
“A bot is one of many computers that cybercriminals have taken
over to make a botnet that they can use to attack other
businesses, large industrial and even governmental systems. So,
the vulnerability of one small business may not seem
significant. But with over 26 million small businesses in the
US, a threat that’s common to a large percentage of them could
pose a threat to the nation.”
Visual: A variety of employees working at different businesses
including offices, stores, restaurants and manufacturing.
Matt Scholl
“There are no silver bullets.So outsourcing is definitely an
option that a small business can taketohelp them identify their
risks and provide information security appropriatelybut it’s
important that a small business understand the basics of
information security, what their risks are and the different ways
they can mitigate those risks effectively. And that they should
not solely rely on an outsourcing solution.
Information security can be an expense and there is a significant
knowledge curve that needs to happen which is one of the
reasons why we are doing this. Because in
our belief this is essential to maintain the business and it can be
done in a cost effective manner that is also effective for the
small business owner.
We have an understanding of the small business as a part of the
critical infrastructure of the nation economically and socially
and its importance as a national asset that needs to be protected
which is why SBA, FBI and NIST have partnered together on
this work.”
Visual: Employees working at a variety of businesses with logo
representing NIST, SBA and the FBI’s collaboration.
Text: The words, “Computer Security is Good Business” appear.
Narration:
“The collaboration between NIST, the Small Business
Administration, and the FBI provides small businesses with a
wealth of information and resources at the national and local
levels including training and education, networking
opportunities and practical assistance.”
Visual: Scenes of people working and meeting at a variety of
businesses.
Text: The words, “Right Investment; Define Needs; Security
Practices; Stay Current” appear.
Narration:
“Business owners can learn how to make the right investment,
define their information security needs, establish common
security practices, and stay current. These are just a few of the
topics available to help small businesses protect their
information.”
Visual: Image of a padlock on a computer motherboard and
other images that represent information technology security.
Text: The words, “Information Technology Laboratory,
Computer Security Resource Center” and web address
“http://csrc.nist.gov/groups/SMA/sbc/index.html” appear.
Narration:
“The web site for NIST’s Computer Security Resource Center
can guide small business owners to the kind of help they need
whether they’re just getting started or staying up to date with
the latest in information technology security.”
Visual: Richard Kissel on camera
“There’s a very small set of things, actions that a small business
can do to avoid being an easy target. But they have to be done.
And they have to be done consistently. So it’s easy to avoid
being the easy mark but you do have to work at it. You can’t
just sit still. You sit still and you’re gone.”
Text: The words, “Information Technology Security for Small
Business” and “It’s not just good business. It’s essential
business” appear.
Text: The following production credits appear.
Writer
Joan Porter
Videography
Chris Sciannella
Editors
Joanna Pearson
Chris Sciannella
Technical Advisor
Magdalena Benitez
Computer Security Division, NIST
Special Thanks To
Jane Boorman
U.S. Small Business Administration
Matthew Scholl
Computer Security Division, NIST
Richard Kissel
Computer Security Division, NIST
Executive Producer
Ron E. Meininger
NIST Public and Business Affairs
Disclaimer
The display of products and services in this program is for
demonstration purposes only and does not imply an endorsement
by NIST
Produced by
Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology
U.S. Department of Commerce
July 2009
Visual: Fade to black
PAGE
1

More Related Content

Similar to Rubric Name White Paper Grading RubricCriteriaL.docx

BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
DeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without ItDeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without ItEmerson Exchange
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docxaryan532920
 
We use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxWe use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxsheronlewthwaite
 
We use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxWe use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxco4spmeley
 
Common Sense Security Framework
Common Sense Security FrameworkCommon Sense Security Framework
Common Sense Security FrameworkJerod Brennen
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesJack Nichelson
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.uNIX Jim
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfinfosec train
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfJustinBrown267905
 
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Peter1020
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Answer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docxAnswer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docxjustine1simpson78276
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxmccormicknadine86
 

Similar to Rubric Name White Paper Grading RubricCriteriaL.docx (20)

BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
DeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without ItDeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without It
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 
Information security for small business
Information security for small businessInformation security for small business
Information security for small business
 
Sem 003
Sem 003Sem 003
Sem 003
 
We use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxWe use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docx
 
We use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxWe use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docx
 
Common Sense Security Framework
Common Sense Security FrameworkCommon Sense Security Framework
Common Sense Security Framework
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
 
GITA March 2015 Newsletter
GITA March 2015 NewsletterGITA March 2015 Newsletter
GITA March 2015 Newsletter
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.
 
PACE-IT: IT Security Measures
PACE-IT: IT Security MeasuresPACE-IT: IT Security Measures
PACE-IT: IT Security Measures
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Answer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docxAnswer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docx
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 

More from joellemurphey

Eastern European countries appear to have become dependent on Ru.docx
Eastern European countries appear to have become dependent on Ru.docxEastern European countries appear to have become dependent on Ru.docx
Eastern European countries appear to have become dependent on Ru.docxjoellemurphey
 
EAS 209 Second Response Paper Topic Assignment Due .docx
EAS 209 Second Response Paper Topic Assignment Due .docxEAS 209 Second Response Paper Topic Assignment Due .docx
EAS 209 Second Response Paper Topic Assignment Due .docxjoellemurphey
 
Earth Science LabIn what order do materials settle in waterSo t.docx
Earth Science LabIn what order do materials settle in waterSo t.docxEarth Science LabIn what order do materials settle in waterSo t.docx
Earth Science LabIn what order do materials settle in waterSo t.docxjoellemurphey
 
EarlyIntervention Strategies Paper (15 points)The pu.docx
EarlyIntervention Strategies Paper (15 points)The pu.docxEarlyIntervention Strategies Paper (15 points)The pu.docx
EarlyIntervention Strategies Paper (15 points)The pu.docxjoellemurphey
 
Early Hominids & Australopithecus SubscribeWhat is a too.docx
Early Hominids & Australopithecus SubscribeWhat is a too.docxEarly Hominids & Australopithecus SubscribeWhat is a too.docx
Early Hominids & Australopithecus SubscribeWhat is a too.docxjoellemurphey
 
Early scholarly and philosophical manuscripts were in Greek. However.docx
Early scholarly and philosophical manuscripts were in Greek. However.docxEarly scholarly and philosophical manuscripts were in Greek. However.docx
Early scholarly and philosophical manuscripts were in Greek. However.docxjoellemurphey
 
Early Learning & Developmental Guidelines July 2017 1 .docx
Early Learning & Developmental Guidelines July 2017 1 .docxEarly Learning & Developmental Guidelines July 2017 1 .docx
Early Learning & Developmental Guidelines July 2017 1 .docxjoellemurphey
 
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docx
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docxEarly Innovations and Their Impact Today Wilbur and Orville Wrig.docx
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docxjoellemurphey
 
Early childhood professionals have an essential role in creating.docx
Early childhood professionals have an essential role in creating.docxEarly childhood professionals have an essential role in creating.docx
Early childhood professionals have an essential role in creating.docxjoellemurphey
 
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docx
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docxEarly Constitutional ControversiesIn 1788, Alexander Hamilton and .docx
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docxjoellemurphey
 
Early Civilizations MatrixUsing your readings and outside sour.docx
Early Civilizations MatrixUsing your readings and outside sour.docxEarly Civilizations MatrixUsing your readings and outside sour.docx
Early Civilizations MatrixUsing your readings and outside sour.docxjoellemurphey
 
Early childhood teachers need to stay connected to what is occurring.docx
Early childhood teachers need to stay connected to what is occurring.docxEarly childhood teachers need to stay connected to what is occurring.docx
Early childhood teachers need to stay connected to what is occurring.docxjoellemurphey
 
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docx
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docxEarly and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docx
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docxjoellemurphey
 
Earlier this semester, you participated in a class discussion about .docx
Earlier this semester, you participated in a class discussion about .docxEarlier this semester, you participated in a class discussion about .docx
Earlier this semester, you participated in a class discussion about .docxjoellemurphey
 
EAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docx
EAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docxEAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docx
EAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docxjoellemurphey
 
Earlean, please write these notes for me. October 01, 20181. My .docx
Earlean, please write these notes for me. October 01, 20181. My .docxEarlean, please write these notes for me. October 01, 20181. My .docx
Earlean, please write these notes for me. October 01, 20181. My .docxjoellemurphey
 
eam Assignment 4 Teaming Across Distance and Culture..docx
eam Assignment 4 Teaming Across Distance and Culture..docxeam Assignment 4 Teaming Across Distance and Culture..docx
eam Assignment 4 Teaming Across Distance and Culture..docxjoellemurphey
 
ead the following articleMother Tongue Maintenance Among North .docx
ead the following articleMother Tongue Maintenance Among North .docxead the following articleMother Tongue Maintenance Among North .docx
ead the following articleMother Tongue Maintenance Among North .docxjoellemurphey
 
eActivityGo to the United States Equal Employment Oppo.docx
eActivityGo to the United States Equal Employment Oppo.docxeActivityGo to the United States Equal Employment Oppo.docx
eActivityGo to the United States Equal Employment Oppo.docxjoellemurphey
 
Each year on or around June 15, communities and municipalities aroun.docx
Each year on or around June 15, communities and municipalities aroun.docxEach year on or around June 15, communities and municipalities aroun.docx
Each year on or around June 15, communities and municipalities aroun.docxjoellemurphey
 

More from joellemurphey (20)

Eastern European countries appear to have become dependent on Ru.docx
Eastern European countries appear to have become dependent on Ru.docxEastern European countries appear to have become dependent on Ru.docx
Eastern European countries appear to have become dependent on Ru.docx
 
EAS 209 Second Response Paper Topic Assignment Due .docx
EAS 209 Second Response Paper Topic Assignment Due .docxEAS 209 Second Response Paper Topic Assignment Due .docx
EAS 209 Second Response Paper Topic Assignment Due .docx
 
Earth Science LabIn what order do materials settle in waterSo t.docx
Earth Science LabIn what order do materials settle in waterSo t.docxEarth Science LabIn what order do materials settle in waterSo t.docx
Earth Science LabIn what order do materials settle in waterSo t.docx
 
EarlyIntervention Strategies Paper (15 points)The pu.docx
EarlyIntervention Strategies Paper (15 points)The pu.docxEarlyIntervention Strategies Paper (15 points)The pu.docx
EarlyIntervention Strategies Paper (15 points)The pu.docx
 
Early Hominids & Australopithecus SubscribeWhat is a too.docx
Early Hominids & Australopithecus SubscribeWhat is a too.docxEarly Hominids & Australopithecus SubscribeWhat is a too.docx
Early Hominids & Australopithecus SubscribeWhat is a too.docx
 
Early scholarly and philosophical manuscripts were in Greek. However.docx
Early scholarly and philosophical manuscripts were in Greek. However.docxEarly scholarly and philosophical manuscripts were in Greek. However.docx
Early scholarly and philosophical manuscripts were in Greek. However.docx
 
Early Learning & Developmental Guidelines July 2017 1 .docx
Early Learning & Developmental Guidelines July 2017 1 .docxEarly Learning & Developmental Guidelines July 2017 1 .docx
Early Learning & Developmental Guidelines July 2017 1 .docx
 
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docx
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docxEarly Innovations and Their Impact Today Wilbur and Orville Wrig.docx
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docx
 
Early childhood professionals have an essential role in creating.docx
Early childhood professionals have an essential role in creating.docxEarly childhood professionals have an essential role in creating.docx
Early childhood professionals have an essential role in creating.docx
 
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docx
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docxEarly Constitutional ControversiesIn 1788, Alexander Hamilton and .docx
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docx
 
Early Civilizations MatrixUsing your readings and outside sour.docx
Early Civilizations MatrixUsing your readings and outside sour.docxEarly Civilizations MatrixUsing your readings and outside sour.docx
Early Civilizations MatrixUsing your readings and outside sour.docx
 
Early childhood teachers need to stay connected to what is occurring.docx
Early childhood teachers need to stay connected to what is occurring.docxEarly childhood teachers need to stay connected to what is occurring.docx
Early childhood teachers need to stay connected to what is occurring.docx
 
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docx
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docxEarly and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docx
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docx
 
Earlier this semester, you participated in a class discussion about .docx
Earlier this semester, you participated in a class discussion about .docxEarlier this semester, you participated in a class discussion about .docx
Earlier this semester, you participated in a class discussion about .docx
 
EAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docx
EAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docxEAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docx
EAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docx
 
Earlean, please write these notes for me. October 01, 20181. My .docx
Earlean, please write these notes for me. October 01, 20181. My .docxEarlean, please write these notes for me. October 01, 20181. My .docx
Earlean, please write these notes for me. October 01, 20181. My .docx
 
eam Assignment 4 Teaming Across Distance and Culture..docx
eam Assignment 4 Teaming Across Distance and Culture..docxeam Assignment 4 Teaming Across Distance and Culture..docx
eam Assignment 4 Teaming Across Distance and Culture..docx
 
ead the following articleMother Tongue Maintenance Among North .docx
ead the following articleMother Tongue Maintenance Among North .docxead the following articleMother Tongue Maintenance Among North .docx
ead the following articleMother Tongue Maintenance Among North .docx
 
eActivityGo to the United States Equal Employment Oppo.docx
eActivityGo to the United States Equal Employment Oppo.docxeActivityGo to the United States Equal Employment Oppo.docx
eActivityGo to the United States Equal Employment Oppo.docx
 
Each year on or around June 15, communities and municipalities aroun.docx
Each year on or around June 15, communities and municipalities aroun.docxEach year on or around June 15, communities and municipalities aroun.docx
Each year on or around June 15, communities and municipalities aroun.docx
 

Recently uploaded

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 

Recently uploaded (20)

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 

Rubric Name White Paper Grading RubricCriteriaL.docx

  • 1. Rubric Name: White Paper Grading Rubric Criteria Level 4 Level 3 Level 2 Level 1 Level 0 Business Need 15 points Clearly explains business need for InfoSec (protection measures) even in the smallest of businesses (e.g., protect against loss of profit, damage to company’s reputation, costs of litigation, etc.). Uses information from NIST Small Business Guide NISTIR 7621 and/or video from assignment (must cite one or both). 12 points Basically explains business need for InfoSec (protection measures) even in the smallest of businesses (e.g., protect against loss of profit, damage to company’s reputation, costs of litigation, etc.). Uses information from NIST Small Business Guide NISTIR 7621 or video from assignment (must cite one). 9 points Weakly describes business need for InfoSec (protection measures) even in the smallest of businesses (e.g., protect
  • 2. against loss of profit, damage to company’s reputation, costs of litigation, etc.). May use NIST Small Business Guide NISTIR 7621 or video from assignment (may have cited one). 6 points Little or no explanation of business need for InfoSec (protection measures) even in the smallest of businesses (e.g., protect against loss of profit, damage to company’s reputation, costs of litigation, etc.). May not use NIST Small Business Guide NISTIR 7621 or video from assignment (may not cite either). 0 points No submission Treats and Vulnerabilities 15 points Clearly explains InfoSec threats and vulnerabilities to non-IT business owners. Uses common terms to explain. 12 points Basically explains InfoSec threats and vulnerabilities to non-IT business owners. Uses some complex terms. 9 points Weakly explains InfoSec threats and vulnerabilities to non-IT business owners. Uses several complex terms unknown to business owners. 6 points Little or no explanation of InfoSec threats and vulnerabilities to non-IT business owners. Consistently uses complex terms unknown to business owners. 0 points No submission Key Concepts
  • 3. 15 points Clearly explains each of the following as part of threats and vulnerabilities: confidentiality, integrity, availability, non- repudiation, authentication and authorization, risk. 8 points Basically explains the following as part of threats and vulnerabilities: confidentiality, integrity, availability, non- repudiation, authentication and authorization, risk. May miss less than 2 key concepts. 6 points Weakly explains the following as part of threats and vulnerabilities: confidentiality, integrity, availability, non- repudiation, authentication and authorization, risk. May miss less than 3 key concepts. 4 points Little or no explanation of the following as part of threats and vulnerabilities: confidentiality, integrity, availability, non- repudiation, authentication and authorization, risk. May miss more than 3 key concepts. 0 points No submission Recommendations 15 points Clearly describes a recommendation of the tech, processes and policies used to solve one of the following threats: data breach/data theft; denial of service attacks; insider theft of intellectual property; deliberate corruption of electronic files including virus/worm infections. 12 points
  • 4. Basically describes a recommendation of thetech, processes and policies used to solve one of the following threats: data breach/data theft; denial of service attacks; insider theft of intellectual property; deliberate corruption of electronic files including virus/worm infections. 9 points Weakly describes a recommendation of thetech, processes and policies used to solve one of the following threats: data breach/data theft; denial of service attacks; insider theft of intellectual property; deliberate corruption of electronic files including virus/worm infections. 6 points Little or no description of a recommendation of thetech, processes and policies used to solve one of the following threats: data breach/data theft; denial of service attacks; insider theft of intellectual property; deliberate corruption of electronic files including virus/worm infections. 0 points No submission Impact and Results 15 points Clearly discusses impact or results expected: costs and benefits of effective protection measures; costs and penalties of ineffective or nonexistent protection measures. 12 points Basically discusses impact or results expected: costs and benefits of effective protection measures; costs and penalties of ineffective or nonexistent protection measures. 9 points Weak discussion of impact or results expected: costs and
  • 5. benefits of effective protection measures; costs and penalties of ineffective or nonexistent protection measures. 6 points Little or no discussion of impact or results expected: costs and benefits of effective protection measures; costs and penalties of ineffective or nonexistent protection measures. 0 points No submission Finds and Applies New Knowledge 10 points Used at least 5 authoritative or scholarly sources. No APA errors in citing material in presentation. 8 points Used 3-5 authoritative or scholarly sources. Less than 5 APA citing errors. 6 points Used 1-2 authoritative or scholarly sources. Less than 10 APA citing errors. 4 points Used 1-2 authoritative or scholarly sources. Less than 10 APA citing errors. 0 points No submission Organization, Execution & Appearance 20 points Prepared MS Word document, used consistent formatting, section subheadings, submitted one file, used instructor provided template, correct coversheet and separate reference
  • 6. page and meets minimum page count. No grammar, use of first/second person, spelling or punctuation errors. 15 points MS Word document didn’t follow at least one of the following: used consistent formatting, section subheadings, submitted one file, used instructor provided template, correct coversheet and separate reference page and meets minimum page count. Less than 5 grammar errors, use of first/second person, spelling or punctuation errors. 10 points MS Word document didn’t follow at least two of the following: used consistent formatting, section subheadings, submitted one file, used instructor provided template, correct coversheet and separate reference page and meets minimum page count. Less than 10 grammar errors, use of first/second person, spelling or punctuation errors. 5 points Non MS Word document didn’t follow at least three or more of the following: used consistent formatting, section subheadings, submitted one file, used instructor provided template, correct coversheet and separate reference page and meets minimum page count. More than 10 grammar errors, use of first/second person, spelling or punctuation errors. 0 points No submission Overall Score Level 4 27 or more Level 3 20 or more Level 2 13 or more
  • 7. Level 1 0 or more Information Technology Security for Small Business (video script) Descriptive Text for the Visually Impaired August 11, 2009 By Joan Porter Visual:Images related to computer and internet use and images symbolic of information technology security and cyber crime. Narration: “No matter how well you protect your business your information is still very much at risk and that puts your business at risk. Visual: A computer keyboard and a cell phone. Text: The words, “Names, Emails, Phone Numbers, Account Numbers, Files, Passwords, User Ids, Payroll, Internet Transactions, Credit Card Numbers, Electronic Commerce and Employee Databases” appear. Narration: “The dangers change and grow every day and the threats they pose to your business – and others – can be devastating.”
  • 8. Text:The words, “The best defense against these growing attacks?”appear. Narration: “The best defense against these growing attacks?” Text: The words, “Information Technology Security for Small Business” and “It’s not just good business. It’s essential business” appear. Narration: “Information Technology Security.It’s not just good business. It’s essential business.” Visual: Scenes of employees working at computers and working in a variety of jobs at different kinds of small businesses. Narration: “Today protecting your business’s information is just as critical as protecting every other asset you have – your property, your employees and your products. It doesn’t matter what kind of business you’re in or its size – whether you have one employee or 500. The fact is, your information is valuable and it’s at risk.” Visual: Matthew Scholl, Group Manager, Security Management and Assurance Computer Security Division, NIST on camera. “It’s important that small businesses make IT security a top priority in order to protect their businesses. They make other security decisions everyday. They lock their doors, they have alarm systems, they have trusted employees working behind the counters. They should exercise the same level of security and due diligence to their IT space where they have just as much exposure.” Visual: Richard Kissel, Information Security Analyst, Computer Security Division, NIST on camera.
  • 9. “Cyberspace is a dangerous place to be. We all are there because we have to be there because that’s where technology forces us to go right now. And if you don’t understand that climate and the things that are involved there then you can get into trouble really quickly.” Visual: Jane Boorman, Project Manager, Office of Entrepreneurship Education, U.S. Small Business Administration on camera. “There are some 26 million small businesses in this country and they all need to pay attention to the dangers of cyber crime. It’s one of the greatest risks they face but many people don’t realize it. Small businesses are “open for business!” They want their customers to come in but they’re so open for business they sometimes don’t take the time.They don’t really realize that their entire business is at stake and when they are careless about their information technology protection, they can lose the entire business.” Visual: Matthew Scholl on camera “The threats that are faced by small businesses are very similar to the threats faced by the federal government and large businesses as a whole. The truth of the matter is they don’t care who you are. All they care about is that they can access your assets for their purposes.” Visual: An image showing the globe and a computer keyboard. Text: The words, “Who are they?” appear. Narration: “But who are ‘they?’ Who is responsible for this?” Text: The words, “Hackers; Experimenters and Vandals; Hacktivists; Cyber Criminals and Information Warriors” appear. Narration: “There are four main types of hackers. Experimenters and vandals are usually amateurs who do it for the thrill or to make a reputation for themselves. Hacktivists have a personal or
  • 10. political agenda. Cyber criminals are in it for the money. Other hackers are Information Warriors.” Visual: Digital program code over image of Earth as seen from outer space. Narration: “They are professionals who work for nation-states which may have missions to disrupt the Internet for example, or take out a city’s electrical grid.” Visual:Scenes of employees working at computers in a variety of kinds of businesses. Narration: “But all the dangers don’t come from the ‘outside.’ Businesses can be severely damaged - intentionally or unintentionally - by their own employees.” Text: The words, “Insider Threats” appear. Visual:Scenes of employees and computers at different businesses. Narration: “These ‘insider threats’ are responsible for nearly 80% of the problems that most small businesses have. No matter where the threat is coming from, the target is still the same −access to a business’s systems and information.” Visual: Richard Kissel on camera “The reality is that there’s dangers out there in all kinds of forms.” Visual: Image of computer code – zeroes and ones. Text: The words, “Theft of Data and Resources” appear. Richard Kissel: “You have theft of data, theft of resources, things like walking off with a laptop.” Visual: Richard Kissell on camera
  • 11. “You have the electronic PDAs of various kinds and literally some people run their businesses from these devices not understanding that all that sensitive information on those devices is vulnerable and it’s not encrypted, it’s not protected and so if they lose the device or somebody walks off with it all that data is gone. And may come back to haunt them later on.” Visual: Image of a hacker typing on a laptop Text:The words, “Denial-of-Service Attacks” appear. Visual: Richard Kissel on camera “You have other activities that nefarious folks can take and that’s denial-of-service wherethey just hammer a system until it just stops functioning and sometimes this is done to blackmail a business. They demonstrate that they can take down the system or the network and they say, ‘if you don’t pay us, we will take you out,’ and they mean it.” Text:The words, “Malicious Code” appear. Visual: Richard Kissel on camera “Then you have people releasing malicious code. Once it gets on a system then it’ll do whatever it’s programmed to do. Malicious code can include things like keystroke loggers, which if somebody puts one on your system, it sits there and silently watches every keystroke you make which includes little things like bank account numbers, the passwords you use to get into your accounts, the answers you give to the security verification questions.” Text:The word, “Viruses” appears. Visual: Several computer screens Richard Kissel: “And viruses are a case of malicious code – and in terms of viruses there’s about 70,000 active viruses out there right now. The number goes up every year.” Visual: Richard Kisselon camera “So these are the kind of threats that we look at, we see out there. These are general classes of things that can go wrong and they all have the potential to damage or destroy an average
  • 12. small business.” Visual: Employees working at computers and a meeting of one company’s employees. Narration: “A survey by the Computer Security Institute showed that a third of all data breaches in just one year came at the expense of businesses with 100 employees or less.” Text: The words, “Computer Security Institute Survey; 42% - Laptop Theft; 44% - Insider Abuse; 21% - Denial-of-Service Attacks; 50% - Computer Viruses” and “20% - Systems made into bots” appear. Narration: “Another survey of businesses – 23% of which were small businesses - showed that 42% reported laptop theft, 44% reported insider abuse, 21% reported denial-of- service attacks, 50% detected computer viruses and 20% reported systems being made into bots.” Visual: A variety of people in typing on computers and other activities at different types of businesses. Narration: “A bot is one of many computers that cybercriminals have taken over to make a botnet that they can use to attack other businesses, large industrial and even governmental systems. So, the vulnerability of one small business may not seem significant. But with over 26 million small businesses in the US, a threat that’s common to a large percentage of them could pose a threat to the nation.” Visual: A variety of employees working at different businesses including offices, stores, restaurants and manufacturing. Matt Scholl “There are no silver bullets.So outsourcing is definitely an
  • 13. option that a small business can taketohelp them identify their risks and provide information security appropriatelybut it’s important that a small business understand the basics of information security, what their risks are and the different ways they can mitigate those risks effectively. And that they should not solely rely on an outsourcing solution. Information security can be an expense and there is a significant knowledge curve that needs to happen which is one of the reasons why we are doing this. Because in our belief this is essential to maintain the business and it can be done in a cost effective manner that is also effective for the small business owner. We have an understanding of the small business as a part of the critical infrastructure of the nation economically and socially and its importance as a national asset that needs to be protected which is why SBA, FBI and NIST have partnered together on this work.” Visual: Employees working at a variety of businesses with logo representing NIST, SBA and the FBI’s collaboration. Text: The words, “Computer Security is Good Business” appear. Narration: “The collaboration between NIST, the Small Business Administration, and the FBI provides small businesses with a wealth of information and resources at the national and local levels including training and education, networking opportunities and practical assistance.” Visual: Scenes of people working and meeting at a variety of businesses. Text: The words, “Right Investment; Define Needs; Security Practices; Stay Current” appear. Narration: “Business owners can learn how to make the right investment,
  • 14. define their information security needs, establish common security practices, and stay current. These are just a few of the topics available to help small businesses protect their information.” Visual: Image of a padlock on a computer motherboard and other images that represent information technology security. Text: The words, “Information Technology Laboratory, Computer Security Resource Center” and web address “http://csrc.nist.gov/groups/SMA/sbc/index.html” appear. Narration: “The web site for NIST’s Computer Security Resource Center can guide small business owners to the kind of help they need whether they’re just getting started or staying up to date with the latest in information technology security.” Visual: Richard Kissel on camera “There’s a very small set of things, actions that a small business can do to avoid being an easy target. But they have to be done. And they have to be done consistently. So it’s easy to avoid being the easy mark but you do have to work at it. You can’t just sit still. You sit still and you’re gone.” Text: The words, “Information Technology Security for Small Business” and “It’s not just good business. It’s essential business” appear. Text: The following production credits appear. Writer Joan Porter Videography Chris Sciannella Editors
  • 15. Joanna Pearson Chris Sciannella Technical Advisor Magdalena Benitez Computer Security Division, NIST Special Thanks To Jane Boorman U.S. Small Business Administration Matthew Scholl Computer Security Division, NIST Richard Kissel Computer Security Division, NIST Executive Producer Ron E. Meininger NIST Public and Business Affairs Disclaimer The display of products and services in this program is for demonstration purposes only and does not imply an endorsement by NIST Produced by Computer Security Division Information Technology Laboratory National Institute of Standards and Technology
  • 16. U.S. Department of Commerce July 2009 Visual: Fade to black PAGE 1