SlideShare a Scribd company logo
Points: 160
Technical Paper: Risk Assessment
Criteria
Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Describe the company network, interconnection, and
communication environment.
Weight: 15%
Did not submit or incompletely described the company network,
interconnection, and communication environment.
Partially described the company network, interconnection, and
communication environment.
Satisfactorily described the company network, interconnection,
and communication environment.
Thoroughly described the company network, interconnection,
and communication environment.
2a. Defend your assumptions where pertinent information from
the scenario isn’t available.
Weight: 5%
Did not submit or incompletely defended your assumptions
where pertinent information from the scenario isn’t available.
Partially defended your assumptions where pertinent
information from the scenario isn’t available.
Satisfactorily defended your assumptions where pertinent
information from the scenario isn’t available.
Thoroughly defended your assumptions where pertinent
information from the scenario isn’t available.
2b. Ascertain apparent security vulnerabilities, and analyze at
least three (3) such vulnerabilities. Such analysis should
entertain the possibility of faulty network design. Recommend
mitigation processes and procedures for each of the identified
vulnerabilities.
Weight: 5%
Did not submit or incompletely ascertained apparent security
vulnerabilities; did not submit or incompletely analyzed at least
three (3) such vulnerabilities. Did not submit or incompletely
entertained the possibility of faulty network design. Did not
submit or incompletely recommended mitigation processes and
procedures for each of the identified vulnerabilities.
Partially ascertained apparent security vulnerabilities; partially
analyzed at least three (3) such vulnerabilities. Partially
entertained the possibility of faulty network design. Partially
recommended mitigation processes and procedures for each of
the identified vulnerabilities.
Satisfactorily ascertained apparent security vulnerabilities;
satisfactorily analyzed at least three (3) such vulnerabilities
Satisfactorily entertained the possibility of faulty network
design. Satisfactorily recommended mitigation processes and
procedures for each of the identified vulnerabilities.
Thoroughly ascertained apparent security vulnerabilities;
thoroughly analyzed at least three (3) such vulnerabilities.
Thoroughly entertained the possibility of faulty network design.
Thoroughly recommended mitigation processes and procedures
for each of the identified vulnerabilities.
2c. Justify your cryptography recommendations, based on
security concerns and requirements, data-driven decision-
making, and objective opinions.
Weight: 5%
Did not submit or incompletely justified your cryptography
recommendations, based on security concerns and requirements,
data-driven decision making, and objective opinions.
Partially justified your cryptography recommendations, based
on security concerns and requirements, data-driven decision-
making, and objective opinions.
Satisfactorily justified your cryptography recommendations,
based on security concerns and requirements, data-driven
decision-making, and objective opinions.
Thoroughly justified your cryptography recommendations,
based on security concerns and requirements, data-driven
decision-making, and objective opinions.
3. Examine whether your risk assessment methodology is
quantitative, qualitative, or a combination of these, and discuss
the main reasons why you believe that the methodology that you
utilized was the most appropriate.
Weight: 20%
Did not submit or incompletely examined whether your risk
assessment methodology is quantitative, qualitative, or a
combination of these; did not submit or incompletely discussed
the main reasons why you believe that the methodology that you
utilized was the most appropriate.
Partially examined whether your risk assessment methodology
is quantitative, qualitative, or a combination of these; partially
discussed the main reasons why you believe that the
methodology that you utilized was the most appropriate.
Satisfactorily examined whether your risk assessment
methodology is quantitative, qualitative, or a combination of
these; satisfactorily discussed the main reasons why you believe
that the methodology that you utilized was the most appropriate.
Thoroughly examined whether your risk assessment
methodology is quantitative, qualitative, or a combination of
these; thoroughly discussed the main reasons why you believe
that the methodology that you utilized was the most appropriate.
4. Explain the way in which you would present your findings
and assessment to the company’s management and thus
facilitate security buy-in and concentration.
Weight: 15%
Did not submit or incompletely explained the way in which you
would present your findings and assessment to the company’s
management and thus facilitate security buy-in and
concentration.
Partially explained the way in which you would present your
findings and assessment to the company’s management and thus
facilitate security buy-in and concentration.
Satisfactorily explained the way in which you would present
your findings and assessment to the company’s management and
thus facilitate security buy-in and concentration.
Thoroughly explained the way in which you would present your
findings and assessment to the company’s management and thus
facilitate security buy-in and concentration.
5. Using Microsoft Visio or its open source equivalent, redraw
the CFI diagram, depicted as a secure and risk-mitigating
model.
Weight: 20%
Did not submit or incompletely redrew the CFI diagram,
depicted as a secure and risk-mitigating model, using Microsoft
Visio or its open source equivalent.
Partially redrew the CFI diagram, depicted as a secure and risk-
mitigating model, using Microsoft Visio or its open source
equivalent.
Satisfactorily redrew the CFI diagram, depicted as a secure and
risk-mitigating model, using Microsoft Visio or its open source
equivalent.
Thoroughly redrew the CFI diagram, depicted as a secure and
risk-mitigating model, using Microsoft Visio or its open source
equivalent.
6. 3 references
Weight: 5%
No references provided
Does not meet the required number of references; some or all
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
7. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 6 errors present
5-6 errors present
3-4 errors present
0-2 errors present
Points 160Technical Paper Risk AssessmentCriteriaUna.docx

More Related Content

Similar to Points 160Technical Paper Risk AssessmentCriteriaUna.docx

Assignment 4 Data MiningDue Week 9 and worth 75 points The .docx
Assignment 4 Data MiningDue Week 9 and worth 75 points The .docxAssignment 4 Data MiningDue Week 9 and worth 75 points The .docx
Assignment 4 Data MiningDue Week 9 and worth 75 points The .docx
ssuser562afc1
 
IT 549 Scenario Assignment Module Eight Guidelines and Rubri.docx
IT 549 Scenario Assignment Module Eight Guidelines and Rubri.docxIT 549 Scenario Assignment Module Eight Guidelines and Rubri.docx
IT 549 Scenario Assignment Module Eight Guidelines and Rubri.docx
christiandean12115
 
IT 549 Milestone Three Guidelines and Rubric In order .docx
IT 549 Milestone Three Guidelines and Rubric   In order .docxIT 549 Milestone Three Guidelines and Rubric   In order .docx
IT 549 Milestone Three Guidelines and Rubric In order .docx
vrickens
 
Note Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docxNote Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docx
IlonaThornburg83
 
Points 50Project Deliverable 1 Project Plan InceptionCriteri.docx
Points 50Project Deliverable 1 Project Plan InceptionCriteri.docxPoints 50Project Deliverable 1 Project Plan InceptionCriteri.docx
Points 50Project Deliverable 1 Project Plan InceptionCriteri.docx
harrisonhoward80223
 
Points 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docxPoints 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docx
LeilaniPoolsy
 
Phase 2 Communication planIn this phase, you need to communic.docx
Phase 2 Communication planIn this phase, you need to communic.docxPhase 2 Communication planIn this phase, you need to communic.docx
Phase 2 Communication planIn this phase, you need to communic.docx
templestewart19
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docx
joshua2345678
 
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docxProject Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
bfingarjcmc
 
Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docx
Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docxAssignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docx
Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docx
murgatroydcrista
 
Points 120Case Study 1 Cyber Security in Business Organization.docx
Points 120Case Study 1 Cyber Security in Business Organization.docxPoints 120Case Study 1 Cyber Security in Business Organization.docx
Points 120Case Study 1 Cyber Security in Business Organization.docx
LeilaniPoolsy
 
Sheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docx
Sheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docxSheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docx
Sheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docx
lesleyryder69361
 
Rubric Name Project 7 Organization Enterprise Plan and Security P.docx
Rubric Name Project 7 Organization Enterprise Plan and Security P.docxRubric Name Project 7 Organization Enterprise Plan and Security P.docx
Rubric Name Project 7 Organization Enterprise Plan and Security P.docx
SUBHI7
 
INTRODUCTION Throughout your career in cybersecurity you will be ask.docx
INTRODUCTION Throughout your career in cybersecurity you will be ask.docxINTRODUCTION Throughout your career in cybersecurity you will be ask.docx
INTRODUCTION Throughout your career in cybersecurity you will be ask.docx
4934bk
 
Grading RubricECON 203GRADING RUBRIC FOR ECON 203 PAPERStudentD.docx
Grading RubricECON 203GRADING RUBRIC FOR ECON 203 PAPERStudentD.docxGrading RubricECON 203GRADING RUBRIC FOR ECON 203 PAPERStudentD.docx
Grading RubricECON 203GRADING RUBRIC FOR ECON 203 PAPERStudentD.docx
whittemorelucilla
 
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docxProject Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
bfingarjcmc
 
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxGAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
starkeykellye
 

Similar to Points 160Technical Paper Risk AssessmentCriteriaUna.docx (17)

Assignment 4 Data MiningDue Week 9 and worth 75 points The .docx
Assignment 4 Data MiningDue Week 9 and worth 75 points The .docxAssignment 4 Data MiningDue Week 9 and worth 75 points The .docx
Assignment 4 Data MiningDue Week 9 and worth 75 points The .docx
 
IT 549 Scenario Assignment Module Eight Guidelines and Rubri.docx
IT 549 Scenario Assignment Module Eight Guidelines and Rubri.docxIT 549 Scenario Assignment Module Eight Guidelines and Rubri.docx
IT 549 Scenario Assignment Module Eight Guidelines and Rubri.docx
 
IT 549 Milestone Three Guidelines and Rubric In order .docx
IT 549 Milestone Three Guidelines and Rubric   In order .docxIT 549 Milestone Three Guidelines and Rubric   In order .docx
IT 549 Milestone Three Guidelines and Rubric In order .docx
 
Note Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docxNote Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docx
 
Points 50Project Deliverable 1 Project Plan InceptionCriteri.docx
Points 50Project Deliverable 1 Project Plan InceptionCriteri.docxPoints 50Project Deliverable 1 Project Plan InceptionCriteri.docx
Points 50Project Deliverable 1 Project Plan InceptionCriteri.docx
 
Points 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docxPoints 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docx
 
Phase 2 Communication planIn this phase, you need to communic.docx
Phase 2 Communication planIn this phase, you need to communic.docxPhase 2 Communication planIn this phase, you need to communic.docx
Phase 2 Communication planIn this phase, you need to communic.docx
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docx
 
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docxProject Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
 
Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docx
Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docxAssignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docx
Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docx
 
Points 120Case Study 1 Cyber Security in Business Organization.docx
Points 120Case Study 1 Cyber Security in Business Organization.docxPoints 120Case Study 1 Cyber Security in Business Organization.docx
Points 120Case Study 1 Cyber Security in Business Organization.docx
 
Sheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docx
Sheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docxSheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docx
Sheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docx
 
Rubric Name Project 7 Organization Enterprise Plan and Security P.docx
Rubric Name Project 7 Organization Enterprise Plan and Security P.docxRubric Name Project 7 Organization Enterprise Plan and Security P.docx
Rubric Name Project 7 Organization Enterprise Plan and Security P.docx
 
INTRODUCTION Throughout your career in cybersecurity you will be ask.docx
INTRODUCTION Throughout your career in cybersecurity you will be ask.docxINTRODUCTION Throughout your career in cybersecurity you will be ask.docx
INTRODUCTION Throughout your career in cybersecurity you will be ask.docx
 
Grading RubricECON 203GRADING RUBRIC FOR ECON 203 PAPERStudentD.docx
Grading RubricECON 203GRADING RUBRIC FOR ECON 203 PAPERStudentD.docxGrading RubricECON 203GRADING RUBRIC FOR ECON 203 PAPERStudentD.docx
Grading RubricECON 203GRADING RUBRIC FOR ECON 203 PAPERStudentD.docx
 
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docxProject Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
 
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxGAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
 

More from LeilaniPoolsy

Policy Research PaperResearch and write a 5 page academic .docx
Policy Research PaperResearch and write a 5 page academic .docxPolicy Research PaperResearch and write a 5 page academic .docx
Policy Research PaperResearch and write a 5 page academic .docx
LeilaniPoolsy
 
POL  101  –  Political  Science  Portfolio  Projec.docx
POL  101  –  Political  Science  Portfolio  Projec.docxPOL  101  –  Political  Science  Portfolio  Projec.docx
POL  101  –  Political  Science  Portfolio  Projec.docx
LeilaniPoolsy
 
POL 123 – Case Analysis 5 Fact Patterns Write an analysis for .docx
POL 123 – Case Analysis 5 Fact Patterns Write an analysis for .docxPOL 123 – Case Analysis 5 Fact Patterns Write an analysis for .docx
POL 123 – Case Analysis 5 Fact Patterns Write an analysis for .docx
LeilaniPoolsy
 
Political Systems ChartCharacteristics of a BandForaging .docx
Political Systems ChartCharacteristics of a BandForaging .docxPolitical Systems ChartCharacteristics of a BandForaging .docx
Political Systems ChartCharacteristics of a BandForaging .docx
LeilaniPoolsy
 
Polk Company builds custom fishing lures for sporting goods stores.docx
Polk Company builds custom fishing lures for sporting goods stores.docxPolk Company builds custom fishing lures for sporting goods stores.docx
Polk Company builds custom fishing lures for sporting goods stores.docx
LeilaniPoolsy
 
PoliticalLegal Issues - Parth VyasI. OverviewA. Issues1. .docx
PoliticalLegal Issues - Parth VyasI. OverviewA. Issues1. .docxPoliticalLegal Issues - Parth VyasI. OverviewA. Issues1. .docx
PoliticalLegal Issues - Parth VyasI. OverviewA. Issues1. .docx
LeilaniPoolsy
 
Political corruption is epidemic in Russia today. What e.docx
Political corruption is epidemic in Russia today. What e.docxPolitical corruption is epidemic in Russia today. What e.docx
Political corruption is epidemic in Russia today. What e.docx
LeilaniPoolsy
 
POLA43Describe the governor’s roles in influencing the budgetary.docx
POLA43Describe the governor’s roles in influencing the budgetary.docxPOLA43Describe the governor’s roles in influencing the budgetary.docx
POLA43Describe the governor’s roles in influencing the budgetary.docx
LeilaniPoolsy
 
POL 201 Week 5 DQ 2PreparePrior to beginning your reflection,.docx
POL 201 Week 5 DQ 2PreparePrior to beginning your reflection,.docxPOL 201 Week 5 DQ 2PreparePrior to beginning your reflection,.docx
POL 201 Week 5 DQ 2PreparePrior to beginning your reflection,.docx
LeilaniPoolsy
 
POL110 Week 10 Scenario Script Domestic, Foreign and Military Pol.docx
POL110 Week 10 Scenario Script Domestic, Foreign and Military Pol.docxPOL110 Week 10 Scenario Script Domestic, Foreign and Military Pol.docx
POL110 Week 10 Scenario Script Domestic, Foreign and Military Pol.docx
LeilaniPoolsy
 
Political Science 100 Introduction to American GovernmentCOURSE DES.docx
Political Science 100 Introduction to American GovernmentCOURSE DES.docxPolitical Science 100 Introduction to American GovernmentCOURSE DES.docx
Political Science 100 Introduction to American GovernmentCOURSE DES.docx
LeilaniPoolsy
 
Policy implementation gridStakeholder Stake or inter.docx
Policy implementation gridStakeholder Stake or inter.docxPolicy implementation gridStakeholder Stake or inter.docx
Policy implementation gridStakeholder Stake or inter.docx
LeilaniPoolsy
 
Political Communication, 30100–116, 2013Copyright © Taylor .docx
Political Communication, 30100–116, 2013Copyright © Taylor .docxPolitical Communication, 30100–116, 2013Copyright © Taylor .docx
Political Communication, 30100–116, 2013Copyright © Taylor .docx
LeilaniPoolsy
 
POL 201Post Your IntroductionPrepare Prior to posting y.docx
POL 201Post Your IntroductionPrepare Prior to posting y.docxPOL 201Post Your IntroductionPrepare Prior to posting y.docx
POL 201Post Your IntroductionPrepare Prior to posting y.docx
LeilaniPoolsy
 
POLS Terms to Be Reviewed. Agenda SettingPoli.docx
POLS  Terms to Be Reviewed.   Agenda SettingPoli.docxPOLS  Terms to Be Reviewed.   Agenda SettingPoli.docx
POLS Terms to Be Reviewed. Agenda SettingPoli.docx
LeilaniPoolsy
 
Polit, D. & Beck, C. (2012). Nursing research Generating and asse.docx
Polit, D. & Beck, C. (2012). Nursing research Generating and asse.docxPolit, D. & Beck, C. (2012). Nursing research Generating and asse.docx
Polit, D. & Beck, C. (2012). Nursing research Generating and asse.docx
LeilaniPoolsy
 
Policies to Assist Parents with Young ChildrenVO L . 2 1 .docx
Policies to Assist Parents with Young ChildrenVO L .  2 1 .docxPolicies to Assist Parents with Young ChildrenVO L .  2 1 .docx
Policies to Assist Parents with Young ChildrenVO L . 2 1 .docx
LeilaniPoolsy
 
Policies and PerspectivesHCS455 Version 51University of P.docx
Policies and PerspectivesHCS455 Version 51University of P.docxPolicies and PerspectivesHCS455 Version 51University of P.docx
Policies and PerspectivesHCS455 Version 51University of P.docx
LeilaniPoolsy
 
Policemen of the WorldThesis and Outline 1Policemen of the World.docx
Policemen of the WorldThesis and Outline 1Policemen of the World.docxPolicemen of the WorldThesis and Outline 1Policemen of the World.docx
Policemen of the WorldThesis and Outline 1Policemen of the World.docx
LeilaniPoolsy
 
POL110 Week 9 Scenario Script The Bureaucracy and the Judiciary.docx
POL110 Week 9 Scenario Script The Bureaucracy and the Judiciary.docxPOL110 Week 9 Scenario Script The Bureaucracy and the Judiciary.docx
POL110 Week 9 Scenario Script The Bureaucracy and the Judiciary.docx
LeilaniPoolsy
 

More from LeilaniPoolsy (20)

Policy Research PaperResearch and write a 5 page academic .docx
Policy Research PaperResearch and write a 5 page academic .docxPolicy Research PaperResearch and write a 5 page academic .docx
Policy Research PaperResearch and write a 5 page academic .docx
 
POL  101  –  Political  Science  Portfolio  Projec.docx
POL  101  –  Political  Science  Portfolio  Projec.docxPOL  101  –  Political  Science  Portfolio  Projec.docx
POL  101  –  Political  Science  Portfolio  Projec.docx
 
POL 123 – Case Analysis 5 Fact Patterns Write an analysis for .docx
POL 123 – Case Analysis 5 Fact Patterns Write an analysis for .docxPOL 123 – Case Analysis 5 Fact Patterns Write an analysis for .docx
POL 123 – Case Analysis 5 Fact Patterns Write an analysis for .docx
 
Political Systems ChartCharacteristics of a BandForaging .docx
Political Systems ChartCharacteristics of a BandForaging .docxPolitical Systems ChartCharacteristics of a BandForaging .docx
Political Systems ChartCharacteristics of a BandForaging .docx
 
Polk Company builds custom fishing lures for sporting goods stores.docx
Polk Company builds custom fishing lures for sporting goods stores.docxPolk Company builds custom fishing lures for sporting goods stores.docx
Polk Company builds custom fishing lures for sporting goods stores.docx
 
PoliticalLegal Issues - Parth VyasI. OverviewA. Issues1. .docx
PoliticalLegal Issues - Parth VyasI. OverviewA. Issues1. .docxPoliticalLegal Issues - Parth VyasI. OverviewA. Issues1. .docx
PoliticalLegal Issues - Parth VyasI. OverviewA. Issues1. .docx
 
Political corruption is epidemic in Russia today. What e.docx
Political corruption is epidemic in Russia today. What e.docxPolitical corruption is epidemic in Russia today. What e.docx
Political corruption is epidemic in Russia today. What e.docx
 
POLA43Describe the governor’s roles in influencing the budgetary.docx
POLA43Describe the governor’s roles in influencing the budgetary.docxPOLA43Describe the governor’s roles in influencing the budgetary.docx
POLA43Describe the governor’s roles in influencing the budgetary.docx
 
POL 201 Week 5 DQ 2PreparePrior to beginning your reflection,.docx
POL 201 Week 5 DQ 2PreparePrior to beginning your reflection,.docxPOL 201 Week 5 DQ 2PreparePrior to beginning your reflection,.docx
POL 201 Week 5 DQ 2PreparePrior to beginning your reflection,.docx
 
POL110 Week 10 Scenario Script Domestic, Foreign and Military Pol.docx
POL110 Week 10 Scenario Script Domestic, Foreign and Military Pol.docxPOL110 Week 10 Scenario Script Domestic, Foreign and Military Pol.docx
POL110 Week 10 Scenario Script Domestic, Foreign and Military Pol.docx
 
Political Science 100 Introduction to American GovernmentCOURSE DES.docx
Political Science 100 Introduction to American GovernmentCOURSE DES.docxPolitical Science 100 Introduction to American GovernmentCOURSE DES.docx
Political Science 100 Introduction to American GovernmentCOURSE DES.docx
 
Policy implementation gridStakeholder Stake or inter.docx
Policy implementation gridStakeholder Stake or inter.docxPolicy implementation gridStakeholder Stake or inter.docx
Policy implementation gridStakeholder Stake or inter.docx
 
Political Communication, 30100–116, 2013Copyright © Taylor .docx
Political Communication, 30100–116, 2013Copyright © Taylor .docxPolitical Communication, 30100–116, 2013Copyright © Taylor .docx
Political Communication, 30100–116, 2013Copyright © Taylor .docx
 
POL 201Post Your IntroductionPrepare Prior to posting y.docx
POL 201Post Your IntroductionPrepare Prior to posting y.docxPOL 201Post Your IntroductionPrepare Prior to posting y.docx
POL 201Post Your IntroductionPrepare Prior to posting y.docx
 
POLS Terms to Be Reviewed. Agenda SettingPoli.docx
POLS  Terms to Be Reviewed.   Agenda SettingPoli.docxPOLS  Terms to Be Reviewed.   Agenda SettingPoli.docx
POLS Terms to Be Reviewed. Agenda SettingPoli.docx
 
Polit, D. & Beck, C. (2012). Nursing research Generating and asse.docx
Polit, D. & Beck, C. (2012). Nursing research Generating and asse.docxPolit, D. & Beck, C. (2012). Nursing research Generating and asse.docx
Polit, D. & Beck, C. (2012). Nursing research Generating and asse.docx
 
Policies to Assist Parents with Young ChildrenVO L . 2 1 .docx
Policies to Assist Parents with Young ChildrenVO L .  2 1 .docxPolicies to Assist Parents with Young ChildrenVO L .  2 1 .docx
Policies to Assist Parents with Young ChildrenVO L . 2 1 .docx
 
Policies and PerspectivesHCS455 Version 51University of P.docx
Policies and PerspectivesHCS455 Version 51University of P.docxPolicies and PerspectivesHCS455 Version 51University of P.docx
Policies and PerspectivesHCS455 Version 51University of P.docx
 
Policemen of the WorldThesis and Outline 1Policemen of the World.docx
Policemen of the WorldThesis and Outline 1Policemen of the World.docxPolicemen of the WorldThesis and Outline 1Policemen of the World.docx
Policemen of the WorldThesis and Outline 1Policemen of the World.docx
 
POL110 Week 9 Scenario Script The Bureaucracy and the Judiciary.docx
POL110 Week 9 Scenario Script The Bureaucracy and the Judiciary.docxPOL110 Week 9 Scenario Script The Bureaucracy and the Judiciary.docx
POL110 Week 9 Scenario Script The Bureaucracy and the Judiciary.docx
 

Recently uploaded

বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Leena Ghag-Sakpal
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
ZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptxZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptx
dot55audits
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
ZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptxZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptx
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 

Points 160Technical Paper Risk AssessmentCriteriaUna.docx

  • 1. Points: 160 Technical Paper: Risk Assessment Criteria Unacceptable Below 70% F Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Describe the company network, interconnection, and communication environment. Weight: 15% Did not submit or incompletely described the company network, interconnection, and communication environment. Partially described the company network, interconnection, and communication environment. Satisfactorily described the company network, interconnection,
  • 2. and communication environment. Thoroughly described the company network, interconnection, and communication environment. 2a. Defend your assumptions where pertinent information from the scenario isn’t available. Weight: 5% Did not submit or incompletely defended your assumptions where pertinent information from the scenario isn’t available. Partially defended your assumptions where pertinent information from the scenario isn’t available. Satisfactorily defended your assumptions where pertinent information from the scenario isn’t available. Thoroughly defended your assumptions where pertinent information from the scenario isn’t available. 2b. Ascertain apparent security vulnerabilities, and analyze at least three (3) such vulnerabilities. Such analysis should entertain the possibility of faulty network design. Recommend mitigation processes and procedures for each of the identified vulnerabilities. Weight: 5% Did not submit or incompletely ascertained apparent security vulnerabilities; did not submit or incompletely analyzed at least three (3) such vulnerabilities. Did not submit or incompletely entertained the possibility of faulty network design. Did not submit or incompletely recommended mitigation processes and procedures for each of the identified vulnerabilities.
  • 3. Partially ascertained apparent security vulnerabilities; partially analyzed at least three (3) such vulnerabilities. Partially entertained the possibility of faulty network design. Partially recommended mitigation processes and procedures for each of the identified vulnerabilities. Satisfactorily ascertained apparent security vulnerabilities; satisfactorily analyzed at least three (3) such vulnerabilities Satisfactorily entertained the possibility of faulty network design. Satisfactorily recommended mitigation processes and procedures for each of the identified vulnerabilities. Thoroughly ascertained apparent security vulnerabilities; thoroughly analyzed at least three (3) such vulnerabilities. Thoroughly entertained the possibility of faulty network design. Thoroughly recommended mitigation processes and procedures for each of the identified vulnerabilities. 2c. Justify your cryptography recommendations, based on security concerns and requirements, data-driven decision- making, and objective opinions. Weight: 5% Did not submit or incompletely justified your cryptography recommendations, based on security concerns and requirements, data-driven decision making, and objective opinions. Partially justified your cryptography recommendations, based on security concerns and requirements, data-driven decision- making, and objective opinions. Satisfactorily justified your cryptography recommendations, based on security concerns and requirements, data-driven decision-making, and objective opinions.
  • 4. Thoroughly justified your cryptography recommendations, based on security concerns and requirements, data-driven decision-making, and objective opinions. 3. Examine whether your risk assessment methodology is quantitative, qualitative, or a combination of these, and discuss the main reasons why you believe that the methodology that you utilized was the most appropriate. Weight: 20% Did not submit or incompletely examined whether your risk assessment methodology is quantitative, qualitative, or a combination of these; did not submit or incompletely discussed the main reasons why you believe that the methodology that you utilized was the most appropriate. Partially examined whether your risk assessment methodology is quantitative, qualitative, or a combination of these; partially discussed the main reasons why you believe that the methodology that you utilized was the most appropriate. Satisfactorily examined whether your risk assessment methodology is quantitative, qualitative, or a combination of these; satisfactorily discussed the main reasons why you believe that the methodology that you utilized was the most appropriate. Thoroughly examined whether your risk assessment methodology is quantitative, qualitative, or a combination of these; thoroughly discussed the main reasons why you believe that the methodology that you utilized was the most appropriate. 4. Explain the way in which you would present your findings and assessment to the company’s management and thus facilitate security buy-in and concentration.
  • 5. Weight: 15% Did not submit or incompletely explained the way in which you would present your findings and assessment to the company’s management and thus facilitate security buy-in and concentration. Partially explained the way in which you would present your findings and assessment to the company’s management and thus facilitate security buy-in and concentration. Satisfactorily explained the way in which you would present your findings and assessment to the company’s management and thus facilitate security buy-in and concentration. Thoroughly explained the way in which you would present your findings and assessment to the company’s management and thus facilitate security buy-in and concentration. 5. Using Microsoft Visio or its open source equivalent, redraw the CFI diagram, depicted as a secure and risk-mitigating model. Weight: 20% Did not submit or incompletely redrew the CFI diagram, depicted as a secure and risk-mitigating model, using Microsoft Visio or its open source equivalent. Partially redrew the CFI diagram, depicted as a secure and risk- mitigating model, using Microsoft Visio or its open source equivalent. Satisfactorily redrew the CFI diagram, depicted as a secure and risk-mitigating model, using Microsoft Visio or its open source equivalent.
  • 6. Thoroughly redrew the CFI diagram, depicted as a secure and risk-mitigating model, using Microsoft Visio or its open source equivalent. 6. 3 references Weight: 5% No references provided Does not meet the required number of references; some or all references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. 7. Clarity, writing mechanics, and formatting requirements Weight: 10% More than 6 errors present 5-6 errors present 3-4 errors present 0-2 errors present