SlideShare a Scribd company logo
1 of 12
Sheet1CriteriaExcellentOutstandingAcceptableNeeds
ImprovementNeeds Significant ImprovementMissing or
UnacceptableIntroduction10 points8.5 points7 points6 points4
points0 pointsProvided an excellent overview of the
cybersecurity industry as a whole. Answered the questions: (a)
Why does this industry exist? and (b) How does this industry
benefit society? Addressed sources of demand for cybersecurity
products and services. Appropriately used information from 3 or
more authoritative sources. (Reuse of narrative from Case Study
#3 is permitted).Provided an outstanding overview of the
cybersecurity industry as a whole. Answered the questions: (a)
Why does this industry exist? and (b) How does this industry
benefit society? Addressed sources of demand for cybersecurity
products and services. Appropriately used information from 2 or
more authoritative sources. (Reuse of narrative from Case Study
#3 is permitted).Provided an brief introduction to the
cybersecurity industry. Addressed why the industry exists and
how the industry benefits society. Addressed sources of demand
for cybersecurity products and services. Appropriately used
information from authoritative sources. (Reuse of narrative
from Case Study #3 is permitted).Provided an introduction to
the industry but the section lacked some required details.
Information from authoritative sources was cited and used in the
overview.Attempted to provide an introduction to the industry
but this section lacked detail and/or was not well supported by
information drawn from authoritative sources. The introduction
section was missing or did not present information about the
cybersecurity industry.Operational Risks (Suppliers)20 points18
points16 points14 points9 points0 pointsProvided an excellent
overview of the operational risks and sources of operational
risks which could affect suppliers of cybersecurity related
products and services. Addressed the potential impacts on
products & services (compromised security). Discussed the
potential impact of such compromises upon buyers and the
security of buyers' organizations (risk transfer). Appropriately
used and cited information from 3 or more authoritative
sources.Provided an outstanding overview of the operational
risks which could affect suppliers of cybersecurity related
products and services. Addressed the potential impacts on
products & services (compromised security). Discussed the
potential impact of such compromises upon buyers and the
security of buyers' organizations (risk transfer). Appropriately
used and cited information from 2 or more authoritative
sources.Discussed operational risks and sources of operational
risks which could affect suppliers of cybersecurity related
products and services. Addressed the possible impacts on
products & services and the impacts upon the security of buyers'
organizations (risk transfer).Appropriately used and cited
information from authoritative sources.Provided information
about operational risks and sources of operational risks which
could impact sellers and buyers of cybersecurity products and
services. Appropriately used and cited information from
authoritative sources.Provided a discussion of operational risk
as it applies to the cybersecurity industry. The
discussion lacked detail and/or was not well supported by
information drawn from authoritative sources.This section was
missing, off topic, or failed to provide information about
operational risks and the impacts thereof.1. Product Liability
in the Cybersecurity Industry15 points14 points13 points11
points9 points0 pointsProvided an excellent discussion of
product liability in the cybersecurity industry. Summarized the
current legal environment and discussed the potential impact
upon buyers who suffer harm or loss as a result of purchasing,
installing, and/or using cybersecurity products or services.
Appropriately used information from 3 or more authoritative
sources.Provided an outstanding discussion of product liability
in the cybersecurity industry. Summarized the current legal
environment and discussed the potential impact upon buyers
who suffer harm or loss as a result of purchasing, installing,
and/or using cybersecurity products or services. Appropriately
used information from 2 or more authoritative
sources.Discussed product liability in the cybersecurity
industry. Summarized the current legal environment and
discussed the potential impact upon buyers who suffer harm or
loss as a result of purchasing, installing, and/or using
cybersecurity products or services. The discussion was
supported by information drawn from authoritative
sources.Attempted to provide a discussion of product liability in
the cybersecurity industry. Mentioned the potential impact upon
buyers who suffer harm or loss related to the use of
cybersecurity products or services. The discussion was
supported by information drawn from authoritative
sources.Mentioned product liability but the section was lacking
in details and/or was not supported by information from
authoritative sources.This section was missing, off topic, or
failed to address product liability.Governance Frameworks15
points14 points13 points11 points9 points0 pointsProvided an
excellent discussion of the role that standards and governance
processes should play in ensuring that acquisitions and
procurements (purchases) of cybersecurity products and services
meet the buyer’s security requirements. Discussed specific
governance process examples from COBIT®,ITIL®, and
ISO/IEC 27002. Appropriately used information from 3 or more
authoritative sources. Provided an outstanding discussion of the
role that standards and governance processes should play in
ensuring that acquisitions and procurements (purchases) of
cybersecurity products and services meet the buyer’s security
requirements. Discussed specific governance process examples
from two of the three frameworks (COBIT®, ITIL®, and
ISO/IEC 27002). Appropriately used information from 2 or
more authoritative sources.Discussed the role that standards and
governance processes should play in ensuring that acquisitions
and procurements (purchases) of cybersecurity products and
services meet the buyer’s security requirements. Mentioned the
use of processes from COBIT®,ITIL®, or ISO/IEC
27002. Appropriately used information from authoritative
sources.Provided a discussion of the role that standards and
governance processes should play during the purchase of
cybersecurity products or services.Appropriately used
information from authoritative sources.Attempted to provide a
discussion of the role that standards and governance processes
should play during the purchase of cybersecurity products or
services but the discussion was substantially lacking in
details.Section was missing, off topic, or did not mention
governance frameworks and standards.Summary and
Conclusions10 points8.5 points7 points6 points4 points0
pointsProvided an excellent summary and conclusions section
which presented a summary of findings including 3 or more
reasons why product liability (risk transfer) is a problem that
must be addressed by both suppliers and purchasers of
cybersecurity related products and services.Provided an
outstanding summary and conclusions section which presented a
summary of findings including 2 or more reasons why product
liability (risk transfer) is a problem that must be addressed by
both suppliers and purchasers of cybersecurity related products
and services.Provided a summary and conclusions section which
presented a summary of findings including the reasons why
product liability (risk transfer) is a problem that must be
addressed by both suppliers and purchasers of cybersecurity
related products and services.Summarized findings which
mentioned product liability problems in the cybersecurity
industry.Included a summary but did not mention product
liability.Summary and conclusions were missing.Addressed
security issues using standard cybersecurity terminology5
points4 points3 points2 points1 point0 pointsDemonstrated
excellence in the integration of standard cybersecurity
terminology into the case study.Provided an outstanding
integration of standard cybersecurity terminology into the case
study.Integrated standard cybersecurity terminology into the
into the case studyUsed standard cybersecurity terminology but
this usage was not well integrated with the discussion.Misused
standard cybersecurity terminology.Did not integrate standard
cybersecurity terminology into the discussion.APA Formatting
for Citations and Reference List5 points4 points3 points2
points1 point0 pointsWork contains a reference list containing
entries for all cited resources. Reference list entries and in-text
citations are correctly formatted using the appropriate APA
style for each type of resource.Work contains a reference list
containing entries for all cited resources. One or two minor
errors in APA format for in-text citations and/or reference list
entries.Work contains a reference list containing entries for all
cited resources. No more than 3 minor errors in APA format for
in-text citations and/or reference list entries.Work has no more
than three paragraphs with omissions of citations crediting
sources for facts and information. Work contains a reference list
containing entries for cited resources. Work contains no more
than 5 minor errors in APA format for in-text citations and/or
reference list entries.Work attempts to credit sources but
demonstrates a fundamental failure to understand and apply the
APA formatting standard as defined in the Publication Manual
of the American Psychological Association (6th ed.).Reference
list is missing. Work demonstrates an overall failure to
incorporate and/or credit authoritative sources for information
used in the paper.Professionalism Part I: Organization &
Appearance5 points4 points3 points2 points1 point0
pointsSubmitted work shows outstanding organization and the
use of color, fonts, titles, headings and sub-headings, etc. is
appropriate to the assignment type.Submitted work has minor
style or formatting flaws but still presents a professional
appearance. Submitted work is well organized and appropriately
uses color, fonts, and section headings (per the assignment’s
directions).Organization and/or appearance of submitted work
could be improved through better use of fonts, color, titles,
headings, etc. OR Submitted work has multiple style or
formatting errors. Professional appearance could be
improved.Submitted work has multiple style or formatting
errors. Organization and professional appearance need
substantial improvement.Submitted work meets minimum
requirements but has major style and formatting errors. Work is
disorganized and needs to be rewritten for readability and
professional appearance.Submitted work is poorly organized
and formatted. Writing and presentation are lacking in
professional style and appearance. Work does not reflect college
level writing skills.Professionalism Part II: Execution15
points14 points13 points11 points4 points0 pointsNo formatting,
grammar, spelling, or punctuation errors.Work contains minor
errors in formatting, grammar, spelling or punctuation which do
not significantly impact professional appearance.Errors in
formatting, spelling, grammar, or punctuation which detract
from professional appearance of the submitted work.Submitted
work has numerous errors in formatting, spelling, grammar, or
punctuation. Work is unprofessional in appearance.Submitted
work is difficult to read / understand and has significant errors
in formatting, spelling, grammar, punctuation, or word
usage.Submitted work is poorly executed OR does not reflect
college level work.Overall
ScoreExcellentOutstandingAcceptableNeeds ImprovementNeeds
Significant ImprovementMissing or Unacceptable90 or more80
or more70 or more56 or more36 or more0 or more
Sheet1INTROBODY 1BODY 2BODY 3BODY
4CONCLUSIONOrganizationLandSeaKolbert strong/not so
strong/1/1/2/2/3/1Writing: free of distractingFormatting: as
pererrors? Academic voice?formatting sheet?Base verb tense in
present?/12.5/12.5/1.5/1/25
&"Times New Roman,Regular"IH 852 Fall, 2015 Bill Coleman,
Instructor
Prompt / Rubric for Final Paper
In the 5th century B.C., Herodotus tells us, the king of Persia
decided to attack the Greeks. All his advisors applauded except
a certain Artabanus who pointed to 2 problems: the land and the
sea. 2500 years later, a different form of attack is taking place:
the expansion of the human species as a whole and the takeover
by our species of the surface of the Earth. This is a process
very different from a military invasion but the results may be
far more devastating. Like Artabanus 2500 years ago, Elizabeth
Kolbert points to the land and the sea.
Describe Kolbert’s organization of chapters in The Sixth
Extinction. Describe the threats to creatures living on land.
Describe the threats to creatures living in the sea. What part of
The Sixth Extinction best explains to you the overall crisis
which our species is causing? Is there any way in which
Kolbert fails to make her case?
Sheet2
Sheet3
Smith 1
Mary Smith
Bill Coleman
Intellectual Heritage 852 Section xxx
February 27, 2015
The Correct Way to Format an Essay
First, select Times New Roman as the font and 12 as the font
size. Make sure the paragraph is set to double space, and that
you have checked the dialog box in “Paragraph” that says:
“Don’t add space between paragraphs of the same style.” The
heading, which includes your name, your teacher’s name, the
course name and the date the paper is due, goes in the upper left
corner of your paper. It is double-spaced like the body of the
paper. The title of your paper should be centered and in the
same font as the body of the paper. Do not use bold or
underlining. Remember to capitalize the first word and all
important words of the title.
Indent the first line of each paragraph. Do not skip an extra line
between paragraphs. Space once after each punctuation mark.
Do not space before a punctuation mark. If your essay is longer
than one page, insert the page number on the right side of the
header. To do this, open the header and use the tab key to move
the cursor to the right. Type your last name and then use the
menu bar to insert the correct page number. Remember to select
Times New Roman as your font and 12 as the font size just as
you did for the text of your paper.
If you follow the above instructions, your paper should look
like this page. Note that to quote from The Sixth Extinction,
you need merely put the passage in quotation marks followed by
the appropriate page number (Kolbert, p. 224).
Industry Profile Part 2: Supply Chain Risk in the Cybersecurity
Industry
For this paper, you will research and report upon the problem of
Supply Chain Risk as it pertains to the cybersecurity industry.
You will also investigate due diligence and other business
processes / strategies which can be used to mitigate the impacts
of supply chain risk for companies who produce and sell
cybersecurity related products and services.
Research
1. Global Supply Chain Risks affecting the Cybersecurity
Industry. Here are some suggested resources to get you started:
a. Cyber Security Risks in Industrial Supply
Chainshttp://www.securityweek.com/cyber-security-risks-
industrial-supply-chains
b. Cybersecurity in the Supply Chain
http://www.lmi.org/CMSPages/getfile.aspx?nodeguid=
adf22863-fca9-44ae-a93a-c20e21bae1e6&
AspxAutoDetectCookieSupport=1
c. Cybersecurity Risks in the Supply Chain
https://www.cert.gov.uk/wp-content/uploads/2015/02/Cyber-
security-risks-in-the-supply-chain.pdf
d. Independent contractors, outsourcing providers and supply
chain vendors: The weakest link in cybersecurity?
http://www.wiggin.com/files/30783_cybersecurity-update-
winter-2015.pdf (pp. 2-3)
2. Investigate due diligence as it applies to the purchase of
components or services from vendors. Answer the question: how
can due diligence processes help a company manage supply
chain risks? Here are some suggested resources:
a. http://www.cips.org/Documents/Knowledge/Procurement-
Topics-and-Skills/3-Risk-Mitigation/Diligent-
Procurement/Due_diligence-Procurement_Topic.pdf
b. http://blogs.wsj.com/cio/2014/03/21/going-beyond-due-
diligence-to-monitor-vendor-cybersecurity/
c. Cybersecurity: Five lessons learned the hard
wayhttp://www.lexology.com/library/detail.aspx?g=e0e6d83f-
3783-457a-8ce5-cda2ed9f3dcd
3. Research best practices and recommended strategies and
approaches for managing global supply chain risk
a. 10 Supply Chain Risk Management Best
Practiceshttp://www.bankinfosecurity.com/10-supply-chain-
risk-management-best-practices-a-5288/op-1
b. Cyber Supply Chain Security: A Crucial Step Toward U.S.
Security, Prosperity, and Freedom in
Cyberspacehttp://www.heritage.org/research/reports/2014/03/cy
ber-supply-chain-security-a-crucial-step-toward-us-security-
prosperity-and-freedom-in-cyberspace
c. Managing Risk in Global ICT Supply Chains
http://www.boozallen.com/media/file/managing-risk-in-global-
ict-supply-chains-vp.pdf
d. Supply Chain Risk Management
Awarenesshttp://www.afcea.org/committees/cyber/documents/S
upplychain.pdf
Write
1. An introduction section which provides a brief overview of
the problem of supply chain risk as it pertains to the
cybersecurity industry.
2. A supply chain risks section in which you identify and
describe 5 or more specific sources of supply chain risk which
impact cybersecurity related products and services.
3. A due diligence section in which you address the use of
diligence processes (investigating suppliers before entering into
contracts) as a supply chain risk management strategy. Include
5 or more cybersecurity related questions which should be asked
of suppliers during the due diligence process.
4. A best practices section in which you address 5 or more best
practices for managing global supply chain risks in the
cybersecurity industry. You must also provide an evaluation of
the expected benefits from implementing each of these
practices.
5. A summary and conclusions section in which you present an
overall picture of the supply chain risk problem in the
cybersecurity industry and best practices for managing supply
chain risks.
Your five to eight page paper is to be prepared using basic APA
formatting (including title page and reference list) and
submitted as an MS Word attachment to the Industry Profile
Part 2: Supply Chain Risk entry in your assignments folder. See
the sample paper and paper template provided in Course
Resources > APA Resources for formatting examples. Consult
the grading rubric for specific content and formatting
requirements for this assignment
Table 1. List of Approved Industries for Industry Profile Project
NAICS Code
Industry Name
Sheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docx
Sheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docx

More Related Content

Similar to Sheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docx

Database Security Assessment Transcript You are a contracting office.docx
Database Security Assessment Transcript You are a contracting office.docxDatabase Security Assessment Transcript You are a contracting office.docx
Database Security Assessment Transcript You are a contracting office.docxwhittemorelucilla
 
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docxRunning head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docxjeanettehully
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxjoshua2345678
 
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docxTechnical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docxmattinsonjanel
 
ISE 620 Final Project Guidelines and Rubric Overview .docx
ISE 620 Final Project Guidelines and Rubric  Overview .docxISE 620 Final Project Guidelines and Rubric  Overview .docx
ISE 620 Final Project Guidelines and Rubric Overview .docxchristiandean12115
 
Grading for this assignment will be based on answer quality, log.docx
Grading for this assignment will be based on answer quality, log.docxGrading for this assignment will be based on answer quality, log.docx
Grading for this assignment will be based on answer quality, log.docxwhittemorelucilla
 
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docxalinainglis
 
Week 3. Discussion .docx
Week 3.   Discussion                                            .docxWeek 3.   Discussion                                            .docx
Week 3. Discussion .docxmelbruce90096
 
CSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docx
CSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docxCSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docx
CSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docxannettsparrow
 
Case Study 2 Public Key InfrastructureSuppose you are the Infor.docx
Case Study 2 Public Key InfrastructureSuppose you are the Infor.docxCase Study 2 Public Key InfrastructureSuppose you are the Infor.docx
Case Study 2 Public Key InfrastructureSuppose you are the Infor.docxmichelljubborjudd
 
Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docx
Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docxAssignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docx
Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docxmurgatroydcrista
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docxevonnehoggarth79783
 
CMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECTCMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECTHamesKellor
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxcarlibradley31429
 
IT 549 Scenario Assignment Module Six Guidelines and Rubric .docx
IT 549 Scenario Assignment Module Six Guidelines and Rubric .docxIT 549 Scenario Assignment Module Six Guidelines and Rubric .docx
IT 549 Scenario Assignment Module Six Guidelines and Rubric .docxvrickens
 
This table lists criteria and criteria group name in the first colum
This table lists criteria and criteria group name in the first columThis table lists criteria and criteria group name in the first colum
This table lists criteria and criteria group name in the first columrochellwa9f
 
The comparison of written and mediaCompare and contrast simila.docx
The comparison of written and mediaCompare and contrast simila.docxThe comparison of written and mediaCompare and contrast simila.docx
The comparison of written and mediaCompare and contrast simila.docxmehek4
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comRobinson069
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comGeorgeDixon99
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.comBaileyaby
 

Similar to Sheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docx (20)

Database Security Assessment Transcript You are a contracting office.docx
Database Security Assessment Transcript You are a contracting office.docxDatabase Security Assessment Transcript You are a contracting office.docx
Database Security Assessment Transcript You are a contracting office.docx
 
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docxRunning head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docx
 
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docxTechnical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
 
ISE 620 Final Project Guidelines and Rubric Overview .docx
ISE 620 Final Project Guidelines and Rubric  Overview .docxISE 620 Final Project Guidelines and Rubric  Overview .docx
ISE 620 Final Project Guidelines and Rubric Overview .docx
 
Grading for this assignment will be based on answer quality, log.docx
Grading for this assignment will be based on answer quality, log.docxGrading for this assignment will be based on answer quality, log.docx
Grading for this assignment will be based on answer quality, log.docx
 
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
 
Week 3. Discussion .docx
Week 3.   Discussion                                            .docxWeek 3.   Discussion                                            .docx
Week 3. Discussion .docx
 
CSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docx
CSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docxCSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docx
CSIA 310 Cybersecurity Processes & TechnologiesCase Study #2 T.docx
 
Case Study 2 Public Key InfrastructureSuppose you are the Infor.docx
Case Study 2 Public Key InfrastructureSuppose you are the Infor.docxCase Study 2 Public Key InfrastructureSuppose you are the Infor.docx
Case Study 2 Public Key InfrastructureSuppose you are the Infor.docx
 
Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docx
Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docxAssignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docx
Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docx
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
 
CMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECTCMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECT
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
 
IT 549 Scenario Assignment Module Six Guidelines and Rubric .docx
IT 549 Scenario Assignment Module Six Guidelines and Rubric .docxIT 549 Scenario Assignment Module Six Guidelines and Rubric .docx
IT 549 Scenario Assignment Module Six Guidelines and Rubric .docx
 
This table lists criteria and criteria group name in the first colum
This table lists criteria and criteria group name in the first columThis table lists criteria and criteria group name in the first colum
This table lists criteria and criteria group name in the first colum
 
The comparison of written and mediaCompare and contrast simila.docx
The comparison of written and mediaCompare and contrast simila.docxThe comparison of written and mediaCompare and contrast simila.docx
The comparison of written and mediaCompare and contrast simila.docx
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.com
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.com
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.com
 

More from lesleyryder69361

Assignment details written in the attachmentsYou need to choose an.docx
Assignment details written in the attachmentsYou need to choose an.docxAssignment details written in the attachmentsYou need to choose an.docx
Assignment details written in the attachmentsYou need to choose an.docxlesleyryder69361
 
Assignment Details A high school girl has been caught shoplifting at.docx
Assignment Details A high school girl has been caught shoplifting at.docxAssignment Details A high school girl has been caught shoplifting at.docx
Assignment Details A high school girl has been caught shoplifting at.docxlesleyryder69361
 
Assignment Details A 12-year-old boy was caught in the act of sexual.docx
Assignment Details A 12-year-old boy was caught in the act of sexual.docxAssignment Details A 12-year-old boy was caught in the act of sexual.docx
Assignment Details A 12-year-old boy was caught in the act of sexual.docxlesleyryder69361
 
Assignment Details (350 WORDS)The last quarter of the 20th c.docx
Assignment Details (350 WORDS)The last quarter of the 20th c.docxAssignment Details (350 WORDS)The last quarter of the 20th c.docx
Assignment Details (350 WORDS)The last quarter of the 20th c.docxlesleyryder69361
 
Assignment Details (300 words and references)Collaborati.docx
Assignment Details (300 words and references)Collaborati.docxAssignment Details (300 words and references)Collaborati.docx
Assignment Details (300 words and references)Collaborati.docxlesleyryder69361
 
Assignment Details (2-3 pages) Research information about cu.docx
Assignment Details (2-3 pages) Research information about cu.docxAssignment Details (2-3 pages) Research information about cu.docx
Assignment Details (2-3 pages) Research information about cu.docxlesleyryder69361
 
Assignment Details (250 - 300 words)Now that the research .docx
Assignment Details (250 - 300 words)Now that the research .docxAssignment Details (250 - 300 words)Now that the research .docx
Assignment Details (250 - 300 words)Now that the research .docxlesleyryder69361
 
Assignment detailed instructions Write a three-page (minimum of 7.docx
Assignment detailed instructions Write a three-page (minimum of 7.docxAssignment detailed instructions Write a three-page (minimum of 7.docx
Assignment detailed instructions Write a three-page (minimum of 7.docxlesleyryder69361
 
Assignment detailed instructions Write a three-page (minimum of 750.docx
Assignment detailed instructions Write a three-page (minimum of 750.docxAssignment detailed instructions Write a three-page (minimum of 750.docx
Assignment detailed instructions Write a three-page (minimum of 750.docxlesleyryder69361
 
Assignment Description 400 wordsOne of the more important me.docx
Assignment Description 400 wordsOne of the more important me.docxAssignment Description 400 wordsOne of the more important me.docx
Assignment Description 400 wordsOne of the more important me.docxlesleyryder69361
 
Assignment DescriptionYou work for a small community hospita.docx
Assignment DescriptionYou work for a small community hospita.docxAssignment DescriptionYou work for a small community hospita.docx
Assignment DescriptionYou work for a small community hospita.docxlesleyryder69361
 
Assignment description The tourism industry represents about .docx
Assignment description The tourism industry represents about .docxAssignment description The tourism industry represents about .docx
Assignment description The tourism industry represents about .docxlesleyryder69361
 
Assignment DescriptionYou will prepare and deliver a speech .docx
Assignment DescriptionYou will prepare and deliver a speech .docxAssignment DescriptionYou will prepare and deliver a speech .docx
Assignment DescriptionYou will prepare and deliver a speech .docxlesleyryder69361
 
Assignment DescriptionYou are to write an essay in which you .docx
Assignment DescriptionYou are to write an essay in which you .docxAssignment DescriptionYou are to write an essay in which you .docx
Assignment DescriptionYou are to write an essay in which you .docxlesleyryder69361
 
Assignment DescriptionYou are the lead human–computer intera.docx
Assignment DescriptionYou are the lead human–computer intera.docxAssignment DescriptionYou are the lead human–computer intera.docx
Assignment DescriptionYou are the lead human–computer intera.docxlesleyryder69361
 
Assignment DescriptionYou are now ready to start representin.docx
Assignment DescriptionYou are now ready to start representin.docxAssignment DescriptionYou are now ready to start representin.docx
Assignment DescriptionYou are now ready to start representin.docxlesleyryder69361
 
Assignment DescriptionManagement is worried, after consultin.docx
Assignment DescriptionManagement is worried, after consultin.docxAssignment DescriptionManagement is worried, after consultin.docx
Assignment DescriptionManagement is worried, after consultin.docxlesleyryder69361
 
Assignment DescriptionEgo Integrity PresentationImagine .docx
Assignment DescriptionEgo Integrity PresentationImagine .docxAssignment DescriptionEgo Integrity PresentationImagine .docx
Assignment DescriptionEgo Integrity PresentationImagine .docxlesleyryder69361
 
Assignment DescriptionCultural Group Exploration Assignment .docx
Assignment DescriptionCultural Group Exploration Assignment .docxAssignment DescriptionCultural Group Exploration Assignment .docx
Assignment DescriptionCultural Group Exploration Assignment .docxlesleyryder69361
 
Assignment description from the syllabusEach member of the matc.docx
Assignment description from the syllabusEach member of the matc.docxAssignment description from the syllabusEach member of the matc.docx
Assignment description from the syllabusEach member of the matc.docxlesleyryder69361
 

More from lesleyryder69361 (20)

Assignment details written in the attachmentsYou need to choose an.docx
Assignment details written in the attachmentsYou need to choose an.docxAssignment details written in the attachmentsYou need to choose an.docx
Assignment details written in the attachmentsYou need to choose an.docx
 
Assignment Details A high school girl has been caught shoplifting at.docx
Assignment Details A high school girl has been caught shoplifting at.docxAssignment Details A high school girl has been caught shoplifting at.docx
Assignment Details A high school girl has been caught shoplifting at.docx
 
Assignment Details A 12-year-old boy was caught in the act of sexual.docx
Assignment Details A 12-year-old boy was caught in the act of sexual.docxAssignment Details A 12-year-old boy was caught in the act of sexual.docx
Assignment Details A 12-year-old boy was caught in the act of sexual.docx
 
Assignment Details (350 WORDS)The last quarter of the 20th c.docx
Assignment Details (350 WORDS)The last quarter of the 20th c.docxAssignment Details (350 WORDS)The last quarter of the 20th c.docx
Assignment Details (350 WORDS)The last quarter of the 20th c.docx
 
Assignment Details (300 words and references)Collaborati.docx
Assignment Details (300 words and references)Collaborati.docxAssignment Details (300 words and references)Collaborati.docx
Assignment Details (300 words and references)Collaborati.docx
 
Assignment Details (2-3 pages) Research information about cu.docx
Assignment Details (2-3 pages) Research information about cu.docxAssignment Details (2-3 pages) Research information about cu.docx
Assignment Details (2-3 pages) Research information about cu.docx
 
Assignment Details (250 - 300 words)Now that the research .docx
Assignment Details (250 - 300 words)Now that the research .docxAssignment Details (250 - 300 words)Now that the research .docx
Assignment Details (250 - 300 words)Now that the research .docx
 
Assignment detailed instructions Write a three-page (minimum of 7.docx
Assignment detailed instructions Write a three-page (minimum of 7.docxAssignment detailed instructions Write a three-page (minimum of 7.docx
Assignment detailed instructions Write a three-page (minimum of 7.docx
 
Assignment detailed instructions Write a three-page (minimum of 750.docx
Assignment detailed instructions Write a three-page (minimum of 750.docxAssignment detailed instructions Write a three-page (minimum of 750.docx
Assignment detailed instructions Write a three-page (minimum of 750.docx
 
Assignment Description 400 wordsOne of the more important me.docx
Assignment Description 400 wordsOne of the more important me.docxAssignment Description 400 wordsOne of the more important me.docx
Assignment Description 400 wordsOne of the more important me.docx
 
Assignment DescriptionYou work for a small community hospita.docx
Assignment DescriptionYou work for a small community hospita.docxAssignment DescriptionYou work for a small community hospita.docx
Assignment DescriptionYou work for a small community hospita.docx
 
Assignment description The tourism industry represents about .docx
Assignment description The tourism industry represents about .docxAssignment description The tourism industry represents about .docx
Assignment description The tourism industry represents about .docx
 
Assignment DescriptionYou will prepare and deliver a speech .docx
Assignment DescriptionYou will prepare and deliver a speech .docxAssignment DescriptionYou will prepare and deliver a speech .docx
Assignment DescriptionYou will prepare and deliver a speech .docx
 
Assignment DescriptionYou are to write an essay in which you .docx
Assignment DescriptionYou are to write an essay in which you .docxAssignment DescriptionYou are to write an essay in which you .docx
Assignment DescriptionYou are to write an essay in which you .docx
 
Assignment DescriptionYou are the lead human–computer intera.docx
Assignment DescriptionYou are the lead human–computer intera.docxAssignment DescriptionYou are the lead human–computer intera.docx
Assignment DescriptionYou are the lead human–computer intera.docx
 
Assignment DescriptionYou are now ready to start representin.docx
Assignment DescriptionYou are now ready to start representin.docxAssignment DescriptionYou are now ready to start representin.docx
Assignment DescriptionYou are now ready to start representin.docx
 
Assignment DescriptionManagement is worried, after consultin.docx
Assignment DescriptionManagement is worried, after consultin.docxAssignment DescriptionManagement is worried, after consultin.docx
Assignment DescriptionManagement is worried, after consultin.docx
 
Assignment DescriptionEgo Integrity PresentationImagine .docx
Assignment DescriptionEgo Integrity PresentationImagine .docxAssignment DescriptionEgo Integrity PresentationImagine .docx
Assignment DescriptionEgo Integrity PresentationImagine .docx
 
Assignment DescriptionCultural Group Exploration Assignment .docx
Assignment DescriptionCultural Group Exploration Assignment .docxAssignment DescriptionCultural Group Exploration Assignment .docx
Assignment DescriptionCultural Group Exploration Assignment .docx
 
Assignment description from the syllabusEach member of the matc.docx
Assignment description from the syllabusEach member of the matc.docxAssignment description from the syllabusEach member of the matc.docx
Assignment description from the syllabusEach member of the matc.docx
 

Recently uploaded

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 

Recently uploaded (20)

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Sheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds.docx

  • 1. Sheet1CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds Significant ImprovementMissing or UnacceptableIntroduction10 points8.5 points7 points6 points4 points0 pointsProvided an excellent overview of the cybersecurity industry as a whole. Answered the questions: (a) Why does this industry exist? and (b) How does this industry benefit society? Addressed sources of demand for cybersecurity products and services. Appropriately used information from 3 or more authoritative sources. (Reuse of narrative from Case Study #3 is permitted).Provided an outstanding overview of the cybersecurity industry as a whole. Answered the questions: (a) Why does this industry exist? and (b) How does this industry benefit society? Addressed sources of demand for cybersecurity products and services. Appropriately used information from 2 or more authoritative sources. (Reuse of narrative from Case Study #3 is permitted).Provided an brief introduction to the cybersecurity industry. Addressed why the industry exists and how the industry benefits society. Addressed sources of demand for cybersecurity products and services. Appropriately used information from authoritative sources. (Reuse of narrative from Case Study #3 is permitted).Provided an introduction to the industry but the section lacked some required details. Information from authoritative sources was cited and used in the overview.Attempted to provide an introduction to the industry but this section lacked detail and/or was not well supported by information drawn from authoritative sources. The introduction section was missing or did not present information about the cybersecurity industry.Operational Risks (Suppliers)20 points18 points16 points14 points9 points0 pointsProvided an excellent overview of the operational risks and sources of operational risks which could affect suppliers of cybersecurity related products and services. Addressed the potential impacts on products & services (compromised security). Discussed the potential impact of such compromises upon buyers and the
  • 2. security of buyers' organizations (risk transfer). Appropriately used and cited information from 3 or more authoritative sources.Provided an outstanding overview of the operational risks which could affect suppliers of cybersecurity related products and services. Addressed the potential impacts on products & services (compromised security). Discussed the potential impact of such compromises upon buyers and the security of buyers' organizations (risk transfer). Appropriately used and cited information from 2 or more authoritative sources.Discussed operational risks and sources of operational risks which could affect suppliers of cybersecurity related products and services. Addressed the possible impacts on products & services and the impacts upon the security of buyers' organizations (risk transfer).Appropriately used and cited information from authoritative sources.Provided information about operational risks and sources of operational risks which could impact sellers and buyers of cybersecurity products and services. Appropriately used and cited information from authoritative sources.Provided a discussion of operational risk as it applies to the cybersecurity industry. The discussion lacked detail and/or was not well supported by information drawn from authoritative sources.This section was missing, off topic, or failed to provide information about operational risks and the impacts thereof.1. Product Liability in the Cybersecurity Industry15 points14 points13 points11 points9 points0 pointsProvided an excellent discussion of product liability in the cybersecurity industry. Summarized the current legal environment and discussed the potential impact upon buyers who suffer harm or loss as a result of purchasing, installing, and/or using cybersecurity products or services. Appropriately used information from 3 or more authoritative sources.Provided an outstanding discussion of product liability in the cybersecurity industry. Summarized the current legal environment and discussed the potential impact upon buyers who suffer harm or loss as a result of purchasing, installing, and/or using cybersecurity products or services. Appropriately
  • 3. used information from 2 or more authoritative sources.Discussed product liability in the cybersecurity industry. Summarized the current legal environment and discussed the potential impact upon buyers who suffer harm or loss as a result of purchasing, installing, and/or using cybersecurity products or services. The discussion was supported by information drawn from authoritative sources.Attempted to provide a discussion of product liability in the cybersecurity industry. Mentioned the potential impact upon buyers who suffer harm or loss related to the use of cybersecurity products or services. The discussion was supported by information drawn from authoritative sources.Mentioned product liability but the section was lacking in details and/or was not supported by information from authoritative sources.This section was missing, off topic, or failed to address product liability.Governance Frameworks15 points14 points13 points11 points9 points0 pointsProvided an excellent discussion of the role that standards and governance processes should play in ensuring that acquisitions and procurements (purchases) of cybersecurity products and services meet the buyer’s security requirements. Discussed specific governance process examples from COBIT®,ITIL®, and ISO/IEC 27002. Appropriately used information from 3 or more authoritative sources. Provided an outstanding discussion of the role that standards and governance processes should play in ensuring that acquisitions and procurements (purchases) of cybersecurity products and services meet the buyer’s security requirements. Discussed specific governance process examples from two of the three frameworks (COBIT®, ITIL®, and ISO/IEC 27002). Appropriately used information from 2 or more authoritative sources.Discussed the role that standards and governance processes should play in ensuring that acquisitions and procurements (purchases) of cybersecurity products and services meet the buyer’s security requirements. Mentioned the use of processes from COBIT®,ITIL®, or ISO/IEC 27002. Appropriately used information from authoritative
  • 4. sources.Provided a discussion of the role that standards and governance processes should play during the purchase of cybersecurity products or services.Appropriately used information from authoritative sources.Attempted to provide a discussion of the role that standards and governance processes should play during the purchase of cybersecurity products or services but the discussion was substantially lacking in details.Section was missing, off topic, or did not mention governance frameworks and standards.Summary and Conclusions10 points8.5 points7 points6 points4 points0 pointsProvided an excellent summary and conclusions section which presented a summary of findings including 3 or more reasons why product liability (risk transfer) is a problem that must be addressed by both suppliers and purchasers of cybersecurity related products and services.Provided an outstanding summary and conclusions section which presented a summary of findings including 2 or more reasons why product liability (risk transfer) is a problem that must be addressed by both suppliers and purchasers of cybersecurity related products and services.Provided a summary and conclusions section which presented a summary of findings including the reasons why product liability (risk transfer) is a problem that must be addressed by both suppliers and purchasers of cybersecurity related products and services.Summarized findings which mentioned product liability problems in the cybersecurity industry.Included a summary but did not mention product liability.Summary and conclusions were missing.Addressed security issues using standard cybersecurity terminology5 points4 points3 points2 points1 point0 pointsDemonstrated excellence in the integration of standard cybersecurity terminology into the case study.Provided an outstanding integration of standard cybersecurity terminology into the case study.Integrated standard cybersecurity terminology into the into the case studyUsed standard cybersecurity terminology but this usage was not well integrated with the discussion.Misused standard cybersecurity terminology.Did not integrate standard
  • 5. cybersecurity terminology into the discussion.APA Formatting for Citations and Reference List5 points4 points3 points2 points1 point0 pointsWork contains a reference list containing entries for all cited resources. Reference list entries and in-text citations are correctly formatted using the appropriate APA style for each type of resource.Work contains a reference list containing entries for all cited resources. One or two minor errors in APA format for in-text citations and/or reference list entries.Work contains a reference list containing entries for all cited resources. No more than 3 minor errors in APA format for in-text citations and/or reference list entries.Work has no more than three paragraphs with omissions of citations crediting sources for facts and information. Work contains a reference list containing entries for cited resources. Work contains no more than 5 minor errors in APA format for in-text citations and/or reference list entries.Work attempts to credit sources but demonstrates a fundamental failure to understand and apply the APA formatting standard as defined in the Publication Manual of the American Psychological Association (6th ed.).Reference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper.Professionalism Part I: Organization & Appearance5 points4 points3 points2 points1 point0 pointsSubmitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.Submitted work has minor style or formatting flaws but still presents a professional appearance. Submitted work is well organized and appropriately uses color, fonts, and section headings (per the assignment’s directions).Organization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved.Submitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement.Submitted work meets minimum
  • 6. requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance.Submitted work is poorly organized and formatted. Writing and presentation are lacking in professional style and appearance. Work does not reflect college level writing skills.Professionalism Part II: Execution15 points14 points13 points11 points4 points0 pointsNo formatting, grammar, spelling, or punctuation errors.Work contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance.Errors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work.Submitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance.Submitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage.Submitted work is poorly executed OR does not reflect college level work.Overall ScoreExcellentOutstandingAcceptableNeeds ImprovementNeeds Significant ImprovementMissing or Unacceptable90 or more80 or more70 or more56 or more36 or more0 or more Sheet1INTROBODY 1BODY 2BODY 3BODY 4CONCLUSIONOrganizationLandSeaKolbert strong/not so strong/1/1/2/2/3/1Writing: free of distractingFormatting: as pererrors? Academic voice?formatting sheet?Base verb tense in present?/12.5/12.5/1.5/1/25 &"Times New Roman,Regular"IH 852 Fall, 2015 Bill Coleman, Instructor Prompt / Rubric for Final Paper In the 5th century B.C., Herodotus tells us, the king of Persia decided to attack the Greeks. All his advisors applauded except a certain Artabanus who pointed to 2 problems: the land and the sea. 2500 years later, a different form of attack is taking place: the expansion of the human species as a whole and the takeover
  • 7. by our species of the surface of the Earth. This is a process very different from a military invasion but the results may be far more devastating. Like Artabanus 2500 years ago, Elizabeth Kolbert points to the land and the sea. Describe Kolbert’s organization of chapters in The Sixth Extinction. Describe the threats to creatures living on land. Describe the threats to creatures living in the sea. What part of The Sixth Extinction best explains to you the overall crisis which our species is causing? Is there any way in which Kolbert fails to make her case? Sheet2 Sheet3 Smith 1 Mary Smith Bill Coleman Intellectual Heritage 852 Section xxx February 27, 2015 The Correct Way to Format an Essay First, select Times New Roman as the font and 12 as the font size. Make sure the paragraph is set to double space, and that you have checked the dialog box in “Paragraph” that says: “Don’t add space between paragraphs of the same style.” The heading, which includes your name, your teacher’s name, the course name and the date the paper is due, goes in the upper left corner of your paper. It is double-spaced like the body of the paper. The title of your paper should be centered and in the same font as the body of the paper. Do not use bold or underlining. Remember to capitalize the first word and all important words of the title.
  • 8. Indent the first line of each paragraph. Do not skip an extra line between paragraphs. Space once after each punctuation mark. Do not space before a punctuation mark. If your essay is longer than one page, insert the page number on the right side of the header. To do this, open the header and use the tab key to move the cursor to the right. Type your last name and then use the menu bar to insert the correct page number. Remember to select Times New Roman as your font and 12 as the font size just as you did for the text of your paper. If you follow the above instructions, your paper should look like this page. Note that to quote from The Sixth Extinction, you need merely put the passage in quotation marks followed by the appropriate page number (Kolbert, p. 224). Industry Profile Part 2: Supply Chain Risk in the Cybersecurity Industry For this paper, you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry. You will also investigate due diligence and other business processes / strategies which can be used to mitigate the impacts of supply chain risk for companies who produce and sell cybersecurity related products and services. Research 1. Global Supply Chain Risks affecting the Cybersecurity Industry. Here are some suggested resources to get you started: a. Cyber Security Risks in Industrial Supply Chainshttp://www.securityweek.com/cyber-security-risks- industrial-supply-chains b. Cybersecurity in the Supply Chain http://www.lmi.org/CMSPages/getfile.aspx?nodeguid= adf22863-fca9-44ae-a93a-c20e21bae1e6& AspxAutoDetectCookieSupport=1 c. Cybersecurity Risks in the Supply Chain
  • 9. https://www.cert.gov.uk/wp-content/uploads/2015/02/Cyber- security-risks-in-the-supply-chain.pdf d. Independent contractors, outsourcing providers and supply chain vendors: The weakest link in cybersecurity? http://www.wiggin.com/files/30783_cybersecurity-update- winter-2015.pdf (pp. 2-3) 2. Investigate due diligence as it applies to the purchase of components or services from vendors. Answer the question: how can due diligence processes help a company manage supply chain risks? Here are some suggested resources: a. http://www.cips.org/Documents/Knowledge/Procurement- Topics-and-Skills/3-Risk-Mitigation/Diligent- Procurement/Due_diligence-Procurement_Topic.pdf b. http://blogs.wsj.com/cio/2014/03/21/going-beyond-due- diligence-to-monitor-vendor-cybersecurity/ c. Cybersecurity: Five lessons learned the hard wayhttp://www.lexology.com/library/detail.aspx?g=e0e6d83f- 3783-457a-8ce5-cda2ed9f3dcd 3. Research best practices and recommended strategies and approaches for managing global supply chain risk a. 10 Supply Chain Risk Management Best Practiceshttp://www.bankinfosecurity.com/10-supply-chain- risk-management-best-practices-a-5288/op-1 b. Cyber Supply Chain Security: A Crucial Step Toward U.S. Security, Prosperity, and Freedom in Cyberspacehttp://www.heritage.org/research/reports/2014/03/cy ber-supply-chain-security-a-crucial-step-toward-us-security- prosperity-and-freedom-in-cyberspace c. Managing Risk in Global ICT Supply Chains http://www.boozallen.com/media/file/managing-risk-in-global- ict-supply-chains-vp.pdf d. Supply Chain Risk Management Awarenesshttp://www.afcea.org/committees/cyber/documents/S upplychain.pdf Write
  • 10. 1. An introduction section which provides a brief overview of the problem of supply chain risk as it pertains to the cybersecurity industry. 2. A supply chain risks section in which you identify and describe 5 or more specific sources of supply chain risk which impact cybersecurity related products and services. 3. A due diligence section in which you address the use of diligence processes (investigating suppliers before entering into contracts) as a supply chain risk management strategy. Include 5 or more cybersecurity related questions which should be asked of suppliers during the due diligence process. 4. A best practices section in which you address 5 or more best practices for managing global supply chain risks in the cybersecurity industry. You must also provide an evaluation of the expected benefits from implementing each of these practices. 5. A summary and conclusions section in which you present an overall picture of the supply chain risk problem in the cybersecurity industry and best practices for managing supply chain risks. Your five to eight page paper is to be prepared using basic APA formatting (including title page and reference list) and submitted as an MS Word attachment to the Industry Profile Part 2: Supply Chain Risk entry in your assignments folder. See the sample paper and paper template provided in Course Resources > APA Resources for formatting examples. Consult the grading rubric for specific content and formatting requirements for this assignment Table 1. List of Approved Industries for Industry Profile Project NAICS Code Industry Name