SlideShare a Scribd company logo
(IT)/Cyber Sector
As required by Presidential Policy Directive 21 (PPD-21), the
current version of the National Infrastructure Protection Plan
(NIPP 2013—also referred to as the National Plan) provides a
unifying structure to define a single program for integrating
critical infrastructure and key resources (CI/KR) protection.
PPD-21 also assigned a federal agency as the lead Sector-
Specific Agency (SAA) for each of the 16 critical
infrastructures identified in PPD-21. Each SSA is responsible
for developing and implementing an updated Sector-Specific
Plan (SSP) for its sector. The original SSPs were published in
2010 based on a Letter of Agreement in the 2009 version of the
NIPP, but were updated in 2015. The SSPs detail the application
of the NIPP concepts to the unique characteristics and
conditions of each sector.
A growing number of hacking incidents or cyber attacks in
recent years has raised concerns about the adequacy of the SSP
to address major threats or hazards in our IT sector and cyber
space. This includes major hacking into credit card records or
other IT/data systems at Lockheed Martin (a major defense
contractor), RSA the security division of a major data storage
company for financial institutions), SONY, major banking
institutions, Target Stores, and the even the U.S. State
Department. In fact, in 2010 alone, the U.S. government was
subject to over 300,000 cyber attacks on its infrastructure.
There were also suspicions that hacking into Google e-mail
(gmail) accounts for high-ranking U.S. officials could be traced
to China, and the CIA Web site was hacked. Many other
incidents have occurred since then. There are also ongoing
investigations about Russian hacking into the 2016 Presidential
election process.
The IT sector is inextricably linked with the Communications
sector, and interdependencies exist with all other CI/KR sectors.
Technological advances and rapid development or
modernization of a wide variety of systems and processes that
depend on a secure IT system, including the Internet and the
“cloud,” ensure that IT/cyber security will demand increasing
attention in the future. Ensuring IT and cybersecurity is
incredibly complex and challenging due to technological
complexities and our global interconnectedness, which make it
very difficult to detect, deter, trace, defend against, prosecute
or counter cyber attacks and hacking.
You and the members of your team should assume the role of
senior government officials representing DHS and other federal
agencies and entities with responsibilities for ensuring the
security of the U.S. IT sector and cyber space. Threats and
hazards in this vital CI/KR sector carry potentially enormous
consequences to our national economy, to national security and
defense, to privacy, and to confidence in our government.
President Trump has asked about the security of our IT sector
and cyber space and protection from intentional terrorist or
espionage attacks, criminal or malicious hackers, or from
disruptions due to technological failures or natural disasters.
Our modern industrial society and economy have become
absolutely dependent information technology, the Internet and
cyber space. It is therefore imperative that our IT sector be
protected.
Could terrorists, foreign governments or criminal hackers
exploit vulnerabilities in our IT system, the Internet or cyber
space to steal vital government or corporate records, sensitive
defense or security information, or other data that could disrupt
our society, economy and national defense? Could they
introduce “worms,” computer viruses or other spyware or
malware that could lead to devastating IT system failures and
compromise national security? Are there effective risk
assessment, risk management or mitigation measures that can
reduce the threat or the consequences of hacking and cyber
attacks? This crisis situation illustrates how our critical
infrastructures are interrelated and interdependent.
President Obama issued a Presidential Policy Directive #21 for
Critical Infrastructure Security and Resilience, and an
Executive Order for improving Critical Infrastructure
Cybersecurity in 2013, and President Trump issued an
Executive Order in 2017 on Strengthening the Cybersecurity of
Federal Networks and Critical Infrastructure. However, to
follow up and promote faster progress in this area of concern,
he has requested a study of the Federal government's role to
ensure IT security and cybersecurity. Senior DHS and national
security officials are concerned that terrorists will escalate
efforts to attack us through this sector. Your team has been
invited to participate on the Presidential Action Team, which
has an opportunity to help shape the President's agenda to
further improve the protection of this particular CI/KR sector.
Your presentation should address the roles, responsibilities,
capabilities and challenges or limitations of the Federal
government in ensuring a secure IT system and cyber space. Is
the SSP an adequate guide to prevent future major incidents,
either from natural/accidental causes or from terrorist activity?
Does the SSP need changes to account for lessons learned from
recent hacking or cyber attack incidents? Are linkages needed
between the IT SSP and the others to address the cybersecurity
issue? How does the IT SSP relate to the Executive Orders and
PPD-21? If actions are necessary beyond those in the SSP,
provide specific recommendations with supporting evidence or
logical argument for the President. Is the government organized
effectively to address the threats, risks and vulnerabilities in
this sector?
The actual output of the Project is a PowerPoint presentation for
the President.
GUIDELINES
CONTENT
Your presentation might address the following for the U.S.
Information Technology (IT) sector and cyber space:
· What is included in the U.S. IT System?
· Does the SSP limit its actions to specific or narrowly focused
elements or aspects of the IT system, such as the Internet?
· Does the SSP address potential impacts on other critical
infrastructures?
· Analysis of the IT system and cyber space using the SSP
template for protecting the critical infrastructure:
· Define the IT sector and cyber space vulnerabilities.
· Specify protective measures to address these threats.
· Discuss risk management considerations (threats vs.
vulnerabilities).
· Identify dependencies with other agencies, departments, and
other organizations.
· Identify shortfalls in the current system.
· Are there lessons to be learned from any major hacking or
cyber attack incidents that could drive changes to the SSP?
· Does the SSP need better linkages to the other SSPs?
· How does the IT SSP relate to President Obama’s Executive
Order and PPD-21 of 2013, or President Trump’s Executive
Order of 2017?
· Provide specific recommendations to the President for actions
to improve the security posture of the U.S. in the context of this
sector.
· Recommend any changes or elements that should be included
in the updated version of the SSP for the IT sector.
Bottom line: This is your opportunity in about 20
slides/viewgraphs to inform the President on how to improve
the security and protection of the U.S. IT sector and cyber
space. The successful project will advise the President on how
to improve the IT/cyber security using the SSP as a framework
for defining the solutions.
FORMAT
Each team will prepare a short PowerPoint (or Prezi or Google
Docs) presentation (approximately 20 slides) along with any
relevant notes – either as notes on the slides or as a separate
Word document.
DELIVERY
Each team should designate a leader/coordinator who will
assume responsibility for posting the presentation. I’ll give
further details as the due date gets closer.
Your completed Group Project is due (posted as an attachment
in the Group Project public discussion forum) March 20, the
beginning of Week 9.
GRADING
Following are the holistic grading rubrics with criteria for each
scoring level: Score Rubrics and Ratings 90- 100% Excellent.
Exceeds expectations in terms of quality of analysis and critical
thinking, with conclusions, recommendations or assertions
strongly supported by sound evidence and logical argument.
Succinctly synthesizes and applies key concepts and
demonstrates mastery of the issues from multiple perspectives.
Clearly and comprehensively addresses all the main points and
sub-questions in each overall question. Thoroughly responds to
one question from each module. Demonstrates substantive
research and sound organization of the material. Superbly
written, clear, coherent, and concise, with impeccable grammar,
spelling, punctuation and sentence structure. Response
demonstrates a high proportion of original work with limited
reliance on direct quotes and paraphrasing. All acronyms,
abbreviations or technical terms are clearly defined. Substantive
in terms of length and content. Formatting and style comply
with guidelines and instructions. Source citations consistently
use proper APA style. Submitted early, or by the due date, or by
the date indicated for an approved extension. 80-89% Good.
Generally meets expectations in terms of quality of analysis and
critical thinking, with conclusions, recommendations or
assertions generally supported by evidence and logical
argument. Synthesizes and applies key concepts and
demonstrates grasp of the issues from a balanced perspective.
Addresses most main points and sub-questions in each overall
question. Satisfactorily responds to one question from each
module. Demonstrates competent research and organization of
material. Generally clear, coherent, and concise, with a few
minor errors in grammar, spelling, punctuation or sentence
structure. Response demonstrates a reasonable proportion of
original work with some use of direct quotes or paraphrasing.
Most acronyms, abbreviations or technical terms are defined.
Sufficient in terms of length and substance. Formatting and
style generally follow course guidelines, expectations and
requirements. Source citations generally follow proper APA
style, with few minor technical errors or inconsistencies.
Submitted by the due date, or by the date indicated for an
approved extension. 5 70-79% Satisfactory. Meets some, but not
all, expectations in terms of quality of analysis and critical
thinking, with conclusions, recommendations or assertions
sometimes supported by evidence and logical argument.
Generally synthesizes and applies key concepts and
demonstrates some grasp of the issues. Addresses some, but not
all, main points and sub-questions in each overall question.
Responds to one question from each module Demonstrates
satisfactory research and organization of material. Generally
clear, coherent, and concise, but requires further editing to
correct minor errors in grammar, spelling, punctuation or
sentence structure. Response demonstrates some original work,
but with heavy reliance on direct quotes or paraphrasing. Some,
but not all, acronyms, abbreviations or technical terms are
defined. Response meets only minimum expectations in terms of
length and substance. Formatting and style comply with some,
but not all, guidelines or instructions. Source citations do not
consistently follow proper APA style. Responds to the required
number of questions. Submitted by the due date, or by the date
indicated for an approved extension. 60-69% Needs
Improvement. Meets some, but not all, minimum expectations.
Demonstrates limited analysis and critical thinking, but missing
some elements, key points, or supporting evidence. Synthesis
and application of key concepts is weak or inconsistent.
Demonstrates superficial or minimal research, or incoherent
organization of material. Not responsive to the main points and
sub-questions in each overall question. Does not respond to one
question from each module. Requires substantial editing to
correct numerous errors in grammar, word choice, sentence
structure, spelling or punctuation. Response demonstrates
overreliance on direct quotes or paraphrasing in proportion to
original work. Acronyms, abbreviations and technical terms are
misused or not defined. Overly brief or incomplete, and only
meets some of the minimum guidelines, expectations and
instructions in terms of formatting and style. Missing some
source citations, or the citations are not consistent with APA
guidelines. Submitted late without an approved extension. 0-
59% Unsatisfactory (Failure). Failed to respond to the question,
or failed to meet expectations at a minimally acceptable level
according to guidelines, instructions and requirements for this
assignment. Excessive reliance on direct quotes or paraphrasing,
with little evidence of original work. Little or no evidence of
analysis, critical thinking, synthesis or grasp of issues. Poor
written communications skills. Failed to follow instructions in
terms of formatting, style, or source attribution. Response is
very brief or demonstrates no evidence of research in
appropriate sources to support assertions and conclusions.
Evidence of plagiarism.
PAGE
2

More Related Content

Similar to (IT)Cyber SectorAs required by Presidential Policy Directiv.docx

Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
rrepko
 
Cyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paperCyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paper
Microsoft
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
Laurie Mosca-Cocca
 
Administration Policy MatrixCurrent AdministrationRegulation Nam.docx
Administration Policy MatrixCurrent AdministrationRegulation Nam.docxAdministration Policy MatrixCurrent AdministrationRegulation Nam.docx
Administration Policy MatrixCurrent AdministrationRegulation Nam.docx
daniahendric
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
bagotjesusa
 
Dhs cybersecurity-roadmap
Dhs cybersecurity-roadmapDhs cybersecurity-roadmap
Dhs cybersecurity-roadmap
Ajay Ohri
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military Perspective
Government
 
IT Security Services
IT Security ServicesIT Security Services
IT Security Services
Omar Toor
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
GovCloud Network
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint Webinar
Lumension
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
stilliegeorgiana
 
FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx
FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docxFEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx
FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx
mglenn3
 
FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx
FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docxFEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx
FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx
lmelaine
 
Gill_Pat.2016.Resume.CISO.1
Gill_Pat.2016.Resume.CISO.1Gill_Pat.2016.Resume.CISO.1
Gill_Pat.2016.Resume.CISO.1
Patrick Gill, MBA, CRISC
 
Data Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALData Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINAL
Joseph White MPA CPM
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossier
Yury Chemerkin
 
CISO Survey Report 2010
CISO Survey Report 2010CISO Survey Report 2010
CISO Survey Report 2010
Scientia Groups
 
ISM and its impact on Government Project Delivery
ISM and its impact on Government Project DeliveryISM and its impact on Government Project Delivery
ISM and its impact on Government Project Delivery
Kevin Landale
 
Key elements of security threat
Key elements of security threatKey elements of security threat
Key elements of security threat
Araf Karsh Hamid
 
4182020 Originality Reporthttpsucumberlands.blackboar.docx
4182020 Originality Reporthttpsucumberlands.blackboar.docx4182020 Originality Reporthttpsucumberlands.blackboar.docx
4182020 Originality Reporthttpsucumberlands.blackboar.docx
blondellchancy
 

Similar to (IT)Cyber SectorAs required by Presidential Policy Directiv.docx (20)

Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
Cyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paperCyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paper
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Administration Policy MatrixCurrent AdministrationRegulation Nam.docx
Administration Policy MatrixCurrent AdministrationRegulation Nam.docxAdministration Policy MatrixCurrent AdministrationRegulation Nam.docx
Administration Policy MatrixCurrent AdministrationRegulation Nam.docx
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
 
Dhs cybersecurity-roadmap
Dhs cybersecurity-roadmapDhs cybersecurity-roadmap
Dhs cybersecurity-roadmap
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military Perspective
 
IT Security Services
IT Security ServicesIT Security Services
IT Security Services
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint Webinar
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
 
FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx
FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docxFEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx
FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx
 
FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx
FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docxFEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx
FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx
 
Gill_Pat.2016.Resume.CISO.1
Gill_Pat.2016.Resume.CISO.1Gill_Pat.2016.Resume.CISO.1
Gill_Pat.2016.Resume.CISO.1
 
Data Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALData Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINAL
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossier
 
CISO Survey Report 2010
CISO Survey Report 2010CISO Survey Report 2010
CISO Survey Report 2010
 
ISM and its impact on Government Project Delivery
ISM and its impact on Government Project DeliveryISM and its impact on Government Project Delivery
ISM and its impact on Government Project Delivery
 
Key elements of security threat
Key elements of security threatKey elements of security threat
Key elements of security threat
 
4182020 Originality Reporthttpsucumberlands.blackboar.docx
4182020 Originality Reporthttpsucumberlands.blackboar.docx4182020 Originality Reporthttpsucumberlands.blackboar.docx
4182020 Originality Reporthttpsucumberlands.blackboar.docx
 

More from honey725342

NRS-493 Individual Success PlanREQUIRED PRACTICE HOURS 100 Direct.docx
NRS-493 Individual Success PlanREQUIRED PRACTICE HOURS 100 Direct.docxNRS-493 Individual Success PlanREQUIRED PRACTICE HOURS 100 Direct.docx
NRS-493 Individual Success PlanREQUIRED PRACTICE HOURS 100 Direct.docx
honey725342
 
Now the Earth has had wide variations in atmospheric CO2-level throu.docx
Now the Earth has had wide variations in atmospheric CO2-level throu.docxNow the Earth has had wide variations in atmospheric CO2-level throu.docx
Now the Earth has had wide variations in atmospheric CO2-level throu.docx
honey725342
 
NR224 Fundamentals SkillsTopic Safety Goals BOOK P.docx
NR224 Fundamentals SkillsTopic Safety Goals BOOK P.docxNR224 Fundamentals SkillsTopic Safety Goals BOOK P.docx
NR224 Fundamentals SkillsTopic Safety Goals BOOK P.docx
honey725342
 
Nurse Education Today 87 (2020) 104348Contents lists avail.docx
Nurse Education Today 87 (2020) 104348Contents lists avail.docxNurse Education Today 87 (2020) 104348Contents lists avail.docx
Nurse Education Today 87 (2020) 104348Contents lists avail.docx
honey725342
 
Now that you’ve seen all of the elements contributing to the Devil’s.docx
Now that you’ve seen all of the elements contributing to the Devil’s.docxNow that you’ve seen all of the elements contributing to the Devil’s.docx
Now that you’ve seen all of the elements contributing to the Devil’s.docx
honey725342
 
NR360 We Can But Dare We.docx Revised 5 ‐ 9 .docx
NR360   We   Can   But   Dare   We.docx   Revised   5 ‐ 9 .docxNR360   We   Can   But   Dare   We.docx   Revised   5 ‐ 9 .docx
NR360 We Can But Dare We.docx Revised 5 ‐ 9 .docx
honey725342
 
Nurse Practitioner Diagnosis- Chest Pain.SOAPS-Subjective.docx
Nurse Practitioner Diagnosis- Chest Pain.SOAPS-Subjective.docxNurse Practitioner Diagnosis- Chest Pain.SOAPS-Subjective.docx
Nurse Practitioner Diagnosis- Chest Pain.SOAPS-Subjective.docx
honey725342
 
NURS 6002 Foundations of Graduate StudyAcademic and P.docx
NURS 6002 Foundations of Graduate StudyAcademic and P.docxNURS 6002 Foundations of Graduate StudyAcademic and P.docx
NURS 6002 Foundations of Graduate StudyAcademic and P.docx
honey725342
 
Nurse workforce shortage are predicted to get worse as baby boomers .docx
Nurse workforce shortage are predicted to get worse as baby boomers .docxNurse workforce shortage are predicted to get worse as baby boomers .docx
Nurse workforce shortage are predicted to get worse as baby boomers .docx
honey725342
 
Now, for the exam itself. Below are 4 questions. You need to answer .docx
Now, for the exam itself. Below are 4 questions. You need to answer .docxNow, for the exam itself. Below are 4 questions. You need to answer .docx
Now, for the exam itself. Below are 4 questions. You need to answer .docx
honey725342
 
Nur-501-AP4- Philosophical and Theoretical Evidence-Based research.docx
Nur-501-AP4- Philosophical and Theoretical Evidence-Based research.docxNur-501-AP4- Philosophical and Theoretical Evidence-Based research.docx
Nur-501-AP4- Philosophical and Theoretical Evidence-Based research.docx
honey725342
 
NU32CH19-Foltz ARI 9 July 2012 1945Population-Level Inter.docx
NU32CH19-Foltz ARI 9 July 2012 1945Population-Level Inter.docxNU32CH19-Foltz ARI 9 July 2012 1945Population-Level Inter.docx
NU32CH19-Foltz ARI 9 July 2012 1945Population-Level Inter.docx
honey725342
 
Nurse Working in the CommunityDescribe the community nurses.docx
Nurse Working in the CommunityDescribe the community nurses.docxNurse Working in the CommunityDescribe the community nurses.docx
Nurse Working in the CommunityDescribe the community nurses.docx
honey725342
 
nursing diagnosis1. Decreased Cardiac Output  related to Alter.docx
nursing diagnosis1. Decreased Cardiac Output  related to Alter.docxnursing diagnosis1. Decreased Cardiac Output  related to Alter.docx
nursing diagnosis1. Decreased Cardiac Output  related to Alter.docx
honey725342
 
Nursing Documentation Is it valuable Discuss the value of nursin.docx
Nursing Documentation Is it valuable Discuss the value of nursin.docxNursing Documentation Is it valuable Discuss the value of nursin.docx
Nursing Documentation Is it valuable Discuss the value of nursin.docx
honey725342
 
NR631 Concluding Graduate Experience - Scope Project Managemen.docx
NR631 Concluding Graduate Experience - Scope  Project Managemen.docxNR631 Concluding Graduate Experience - Scope  Project Managemen.docx
NR631 Concluding Graduate Experience - Scope Project Managemen.docx
honey725342
 
Number 11. Describe at least five populations who are vulner.docx
Number 11. Describe at least five populations who are vulner.docxNumber 11. Describe at least five populations who are vulner.docx
Number 11. Describe at least five populations who are vulner.docx
honey725342
 
ntertainment, the media, and sometimes public leaders can perpetuate.docx
ntertainment, the media, and sometimes public leaders can perpetuate.docxntertainment, the media, and sometimes public leaders can perpetuate.docx
ntertainment, the media, and sometimes public leaders can perpetuate.docx
honey725342
 
Now that you have  completed Lesson 23 & 24 and have thought a.docx
Now that you have  completed Lesson 23 & 24 and have thought a.docxNow that you have  completed Lesson 23 & 24 and have thought a.docx
Now that you have  completed Lesson 23 & 24 and have thought a.docx
honey725342
 
nothing wrong with the paper, my professor just wants it to be in an.docx
nothing wrong with the paper, my professor just wants it to be in an.docxnothing wrong with the paper, my professor just wants it to be in an.docx
nothing wrong with the paper, my professor just wants it to be in an.docx
honey725342
 

More from honey725342 (20)

NRS-493 Individual Success PlanREQUIRED PRACTICE HOURS 100 Direct.docx
NRS-493 Individual Success PlanREQUIRED PRACTICE HOURS 100 Direct.docxNRS-493 Individual Success PlanREQUIRED PRACTICE HOURS 100 Direct.docx
NRS-493 Individual Success PlanREQUIRED PRACTICE HOURS 100 Direct.docx
 
Now the Earth has had wide variations in atmospheric CO2-level throu.docx
Now the Earth has had wide variations in atmospheric CO2-level throu.docxNow the Earth has had wide variations in atmospheric CO2-level throu.docx
Now the Earth has had wide variations in atmospheric CO2-level throu.docx
 
NR224 Fundamentals SkillsTopic Safety Goals BOOK P.docx
NR224 Fundamentals SkillsTopic Safety Goals BOOK P.docxNR224 Fundamentals SkillsTopic Safety Goals BOOK P.docx
NR224 Fundamentals SkillsTopic Safety Goals BOOK P.docx
 
Nurse Education Today 87 (2020) 104348Contents lists avail.docx
Nurse Education Today 87 (2020) 104348Contents lists avail.docxNurse Education Today 87 (2020) 104348Contents lists avail.docx
Nurse Education Today 87 (2020) 104348Contents lists avail.docx
 
Now that you’ve seen all of the elements contributing to the Devil’s.docx
Now that you’ve seen all of the elements contributing to the Devil’s.docxNow that you’ve seen all of the elements contributing to the Devil’s.docx
Now that you’ve seen all of the elements contributing to the Devil’s.docx
 
NR360 We Can But Dare We.docx Revised 5 ‐ 9 .docx
NR360   We   Can   But   Dare   We.docx   Revised   5 ‐ 9 .docxNR360   We   Can   But   Dare   We.docx   Revised   5 ‐ 9 .docx
NR360 We Can But Dare We.docx Revised 5 ‐ 9 .docx
 
Nurse Practitioner Diagnosis- Chest Pain.SOAPS-Subjective.docx
Nurse Practitioner Diagnosis- Chest Pain.SOAPS-Subjective.docxNurse Practitioner Diagnosis- Chest Pain.SOAPS-Subjective.docx
Nurse Practitioner Diagnosis- Chest Pain.SOAPS-Subjective.docx
 
NURS 6002 Foundations of Graduate StudyAcademic and P.docx
NURS 6002 Foundations of Graduate StudyAcademic and P.docxNURS 6002 Foundations of Graduate StudyAcademic and P.docx
NURS 6002 Foundations of Graduate StudyAcademic and P.docx
 
Nurse workforce shortage are predicted to get worse as baby boomers .docx
Nurse workforce shortage are predicted to get worse as baby boomers .docxNurse workforce shortage are predicted to get worse as baby boomers .docx
Nurse workforce shortage are predicted to get worse as baby boomers .docx
 
Now, for the exam itself. Below are 4 questions. You need to answer .docx
Now, for the exam itself. Below are 4 questions. You need to answer .docxNow, for the exam itself. Below are 4 questions. You need to answer .docx
Now, for the exam itself. Below are 4 questions. You need to answer .docx
 
Nur-501-AP4- Philosophical and Theoretical Evidence-Based research.docx
Nur-501-AP4- Philosophical and Theoretical Evidence-Based research.docxNur-501-AP4- Philosophical and Theoretical Evidence-Based research.docx
Nur-501-AP4- Philosophical and Theoretical Evidence-Based research.docx
 
NU32CH19-Foltz ARI 9 July 2012 1945Population-Level Inter.docx
NU32CH19-Foltz ARI 9 July 2012 1945Population-Level Inter.docxNU32CH19-Foltz ARI 9 July 2012 1945Population-Level Inter.docx
NU32CH19-Foltz ARI 9 July 2012 1945Population-Level Inter.docx
 
Nurse Working in the CommunityDescribe the community nurses.docx
Nurse Working in the CommunityDescribe the community nurses.docxNurse Working in the CommunityDescribe the community nurses.docx
Nurse Working in the CommunityDescribe the community nurses.docx
 
nursing diagnosis1. Decreased Cardiac Output  related to Alter.docx
nursing diagnosis1. Decreased Cardiac Output  related to Alter.docxnursing diagnosis1. Decreased Cardiac Output  related to Alter.docx
nursing diagnosis1. Decreased Cardiac Output  related to Alter.docx
 
Nursing Documentation Is it valuable Discuss the value of nursin.docx
Nursing Documentation Is it valuable Discuss the value of nursin.docxNursing Documentation Is it valuable Discuss the value of nursin.docx
Nursing Documentation Is it valuable Discuss the value of nursin.docx
 
NR631 Concluding Graduate Experience - Scope Project Managemen.docx
NR631 Concluding Graduate Experience - Scope  Project Managemen.docxNR631 Concluding Graduate Experience - Scope  Project Managemen.docx
NR631 Concluding Graduate Experience - Scope Project Managemen.docx
 
Number 11. Describe at least five populations who are vulner.docx
Number 11. Describe at least five populations who are vulner.docxNumber 11. Describe at least five populations who are vulner.docx
Number 11. Describe at least five populations who are vulner.docx
 
ntertainment, the media, and sometimes public leaders can perpetuate.docx
ntertainment, the media, and sometimes public leaders can perpetuate.docxntertainment, the media, and sometimes public leaders can perpetuate.docx
ntertainment, the media, and sometimes public leaders can perpetuate.docx
 
Now that you have  completed Lesson 23 & 24 and have thought a.docx
Now that you have  completed Lesson 23 & 24 and have thought a.docxNow that you have  completed Lesson 23 & 24 and have thought a.docx
Now that you have  completed Lesson 23 & 24 and have thought a.docx
 
nothing wrong with the paper, my professor just wants it to be in an.docx
nothing wrong with the paper, my professor just wants it to be in an.docxnothing wrong with the paper, my professor just wants it to be in an.docx
nothing wrong with the paper, my professor just wants it to be in an.docx
 

Recently uploaded

Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
Celine George
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 

Recently uploaded (20)

Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 

(IT)Cyber SectorAs required by Presidential Policy Directiv.docx

  • 1. (IT)/Cyber Sector As required by Presidential Policy Directive 21 (PPD-21), the current version of the National Infrastructure Protection Plan (NIPP 2013—also referred to as the National Plan) provides a unifying structure to define a single program for integrating critical infrastructure and key resources (CI/KR) protection. PPD-21 also assigned a federal agency as the lead Sector- Specific Agency (SAA) for each of the 16 critical infrastructures identified in PPD-21. Each SSA is responsible for developing and implementing an updated Sector-Specific Plan (SSP) for its sector. The original SSPs were published in 2010 based on a Letter of Agreement in the 2009 version of the NIPP, but were updated in 2015. The SSPs detail the application of the NIPP concepts to the unique characteristics and conditions of each sector. A growing number of hacking incidents or cyber attacks in recent years has raised concerns about the adequacy of the SSP to address major threats or hazards in our IT sector and cyber space. This includes major hacking into credit card records or other IT/data systems at Lockheed Martin (a major defense contractor), RSA the security division of a major data storage company for financial institutions), SONY, major banking institutions, Target Stores, and the even the U.S. State Department. In fact, in 2010 alone, the U.S. government was subject to over 300,000 cyber attacks on its infrastructure. There were also suspicions that hacking into Google e-mail (gmail) accounts for high-ranking U.S. officials could be traced to China, and the CIA Web site was hacked. Many other incidents have occurred since then. There are also ongoing investigations about Russian hacking into the 2016 Presidential election process.
  • 2. The IT sector is inextricably linked with the Communications sector, and interdependencies exist with all other CI/KR sectors. Technological advances and rapid development or modernization of a wide variety of systems and processes that depend on a secure IT system, including the Internet and the “cloud,” ensure that IT/cyber security will demand increasing attention in the future. Ensuring IT and cybersecurity is incredibly complex and challenging due to technological complexities and our global interconnectedness, which make it very difficult to detect, deter, trace, defend against, prosecute or counter cyber attacks and hacking. You and the members of your team should assume the role of senior government officials representing DHS and other federal agencies and entities with responsibilities for ensuring the security of the U.S. IT sector and cyber space. Threats and hazards in this vital CI/KR sector carry potentially enormous consequences to our national economy, to national security and defense, to privacy, and to confidence in our government. President Trump has asked about the security of our IT sector and cyber space and protection from intentional terrorist or espionage attacks, criminal or malicious hackers, or from disruptions due to technological failures or natural disasters. Our modern industrial society and economy have become absolutely dependent information technology, the Internet and cyber space. It is therefore imperative that our IT sector be protected. Could terrorists, foreign governments or criminal hackers exploit vulnerabilities in our IT system, the Internet or cyber space to steal vital government or corporate records, sensitive defense or security information, or other data that could disrupt our society, economy and national defense? Could they introduce “worms,” computer viruses or other spyware or malware that could lead to devastating IT system failures and compromise national security? Are there effective risk
  • 3. assessment, risk management or mitigation measures that can reduce the threat or the consequences of hacking and cyber attacks? This crisis situation illustrates how our critical infrastructures are interrelated and interdependent. President Obama issued a Presidential Policy Directive #21 for Critical Infrastructure Security and Resilience, and an Executive Order for improving Critical Infrastructure Cybersecurity in 2013, and President Trump issued an Executive Order in 2017 on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. However, to follow up and promote faster progress in this area of concern, he has requested a study of the Federal government's role to ensure IT security and cybersecurity. Senior DHS and national security officials are concerned that terrorists will escalate efforts to attack us through this sector. Your team has been invited to participate on the Presidential Action Team, which has an opportunity to help shape the President's agenda to further improve the protection of this particular CI/KR sector. Your presentation should address the roles, responsibilities, capabilities and challenges or limitations of the Federal government in ensuring a secure IT system and cyber space. Is the SSP an adequate guide to prevent future major incidents, either from natural/accidental causes or from terrorist activity? Does the SSP need changes to account for lessons learned from recent hacking or cyber attack incidents? Are linkages needed between the IT SSP and the others to address the cybersecurity issue? How does the IT SSP relate to the Executive Orders and PPD-21? If actions are necessary beyond those in the SSP, provide specific recommendations with supporting evidence or logical argument for the President. Is the government organized effectively to address the threats, risks and vulnerabilities in this sector? The actual output of the Project is a PowerPoint presentation for the President.
  • 4. GUIDELINES CONTENT Your presentation might address the following for the U.S. Information Technology (IT) sector and cyber space: · What is included in the U.S. IT System? · Does the SSP limit its actions to specific or narrowly focused elements or aspects of the IT system, such as the Internet? · Does the SSP address potential impacts on other critical infrastructures? · Analysis of the IT system and cyber space using the SSP template for protecting the critical infrastructure: · Define the IT sector and cyber space vulnerabilities. · Specify protective measures to address these threats. · Discuss risk management considerations (threats vs. vulnerabilities). · Identify dependencies with other agencies, departments, and other organizations. · Identify shortfalls in the current system. · Are there lessons to be learned from any major hacking or cyber attack incidents that could drive changes to the SSP? · Does the SSP need better linkages to the other SSPs?
  • 5. · How does the IT SSP relate to President Obama’s Executive Order and PPD-21 of 2013, or President Trump’s Executive Order of 2017? · Provide specific recommendations to the President for actions to improve the security posture of the U.S. in the context of this sector. · Recommend any changes or elements that should be included in the updated version of the SSP for the IT sector. Bottom line: This is your opportunity in about 20 slides/viewgraphs to inform the President on how to improve the security and protection of the U.S. IT sector and cyber space. The successful project will advise the President on how to improve the IT/cyber security using the SSP as a framework for defining the solutions. FORMAT Each team will prepare a short PowerPoint (or Prezi or Google Docs) presentation (approximately 20 slides) along with any relevant notes – either as notes on the slides or as a separate Word document. DELIVERY Each team should designate a leader/coordinator who will assume responsibility for posting the presentation. I’ll give further details as the due date gets closer. Your completed Group Project is due (posted as an attachment in the Group Project public discussion forum) March 20, the beginning of Week 9. GRADING Following are the holistic grading rubrics with criteria for each
  • 6. scoring level: Score Rubrics and Ratings 90- 100% Excellent. Exceeds expectations in terms of quality of analysis and critical thinking, with conclusions, recommendations or assertions strongly supported by sound evidence and logical argument. Succinctly synthesizes and applies key concepts and demonstrates mastery of the issues from multiple perspectives. Clearly and comprehensively addresses all the main points and sub-questions in each overall question. Thoroughly responds to one question from each module. Demonstrates substantive research and sound organization of the material. Superbly written, clear, coherent, and concise, with impeccable grammar, spelling, punctuation and sentence structure. Response demonstrates a high proportion of original work with limited reliance on direct quotes and paraphrasing. All acronyms, abbreviations or technical terms are clearly defined. Substantive in terms of length and content. Formatting and style comply with guidelines and instructions. Source citations consistently use proper APA style. Submitted early, or by the due date, or by the date indicated for an approved extension. 80-89% Good. Generally meets expectations in terms of quality of analysis and critical thinking, with conclusions, recommendations or assertions generally supported by evidence and logical argument. Synthesizes and applies key concepts and demonstrates grasp of the issues from a balanced perspective. Addresses most main points and sub-questions in each overall question. Satisfactorily responds to one question from each module. Demonstrates competent research and organization of material. Generally clear, coherent, and concise, with a few minor errors in grammar, spelling, punctuation or sentence structure. Response demonstrates a reasonable proportion of original work with some use of direct quotes or paraphrasing. Most acronyms, abbreviations or technical terms are defined. Sufficient in terms of length and substance. Formatting and style generally follow course guidelines, expectations and requirements. Source citations generally follow proper APA style, with few minor technical errors or inconsistencies.
  • 7. Submitted by the due date, or by the date indicated for an approved extension. 5 70-79% Satisfactory. Meets some, but not all, expectations in terms of quality of analysis and critical thinking, with conclusions, recommendations or assertions sometimes supported by evidence and logical argument. Generally synthesizes and applies key concepts and demonstrates some grasp of the issues. Addresses some, but not all, main points and sub-questions in each overall question. Responds to one question from each module Demonstrates satisfactory research and organization of material. Generally clear, coherent, and concise, but requires further editing to correct minor errors in grammar, spelling, punctuation or sentence structure. Response demonstrates some original work, but with heavy reliance on direct quotes or paraphrasing. Some, but not all, acronyms, abbreviations or technical terms are defined. Response meets only minimum expectations in terms of length and substance. Formatting and style comply with some, but not all, guidelines or instructions. Source citations do not consistently follow proper APA style. Responds to the required number of questions. Submitted by the due date, or by the date indicated for an approved extension. 60-69% Needs Improvement. Meets some, but not all, minimum expectations. Demonstrates limited analysis and critical thinking, but missing some elements, key points, or supporting evidence. Synthesis and application of key concepts is weak or inconsistent. Demonstrates superficial or minimal research, or incoherent organization of material. Not responsive to the main points and sub-questions in each overall question. Does not respond to one question from each module. Requires substantial editing to correct numerous errors in grammar, word choice, sentence structure, spelling or punctuation. Response demonstrates overreliance on direct quotes or paraphrasing in proportion to original work. Acronyms, abbreviations and technical terms are misused or not defined. Overly brief or incomplete, and only meets some of the minimum guidelines, expectations and instructions in terms of formatting and style. Missing some
  • 8. source citations, or the citations are not consistent with APA guidelines. Submitted late without an approved extension. 0- 59% Unsatisfactory (Failure). Failed to respond to the question, or failed to meet expectations at a minimally acceptable level according to guidelines, instructions and requirements for this assignment. Excessive reliance on direct quotes or paraphrasing, with little evidence of original work. Little or no evidence of analysis, critical thinking, synthesis or grasp of issues. Poor written communications skills. Failed to follow instructions in terms of formatting, style, or source attribution. Response is very brief or demonstrates no evidence of research in appropriate sources to support assertions and conclusions. Evidence of plagiarism. PAGE 2