Verified order
Information Security Management Models - Rubric
collapse Company Description assessment
Company Description
12 / 12
Criteria Description
To include mission statement, web applications, servers, departments, routers and switches, remote access, wireless communication, firewalls, and demilitarized zone.
5. Target
12 points
The student comprehensively describes the company, including all the assignment criteria; information and explanations are accurate and appropriate. Extensive details are provided.
4. Acceptable
10.44 points
The student provides a detailed description of the company, including most of the assignment criteria; explanations are accurate. Several supporting details and examples are provided.
3. Approaching
9.48 points
The student appropriately describes the company, including more than half of the assignment criteria; some explanations are included. Some supporting details are provided.
2. Insufficient
8.88 points
The student outlines a few components of the company, but details are lacking.
1. Unsatisfactory
0 points
The student does not adequately address the criteria and/or it is missing.
Criteria Comments
No comments.
collapse Current Information Security Risks/Threats assessment
Current Information Security Risks/Threats
15.66 / 18
Criteria Description
Current Information Security Risks/Threats
5. Target
18 points
The student comprehensively describes the current risks or threats to the company\'s information security; information and justifications are accurate and appropriate. Extensive details and examples are provided.
4. Acceptable
15.66 points
The student provides a detailed description of the current risks or threats to the company\'s information security; justifications are accurate. Several supporting details and examples are provided.
3. Approaching
14.22 points
The student appropriately describes the current risks or threats to the company\'s information security; some justifications are included. Some supporting details are provided are provided.
2. Insufficient
13.32 points
The student outlines a few components of the current risks or threats to the company\'s information security, but details are lacking.
1. Unsatisfactory
0 points
The student does not adequately address the criteria and/or it is missing.
Criteria Comments
Cite sources for arguments and statements that are not common knowledge
collapse Develop System Specific Plans for The Protection of Intellectual Property assessment
Develop System Specific Plans for The Protection of Intellectual Property
20.88 / 24
Criteria Description
Develop System Specific Plans for The Protection of Intellectual Property
5. Target
24 points
The student comprehensively develops system specific plans for the protection of intellectual property from the identified risks or threats; information and justifications are accurate and appropriate. The student comprehensively examines the critical security activities that can be tailored to the organization\'s unique needs, with extensive details and examples. Subject knowledge is excellent.
4. Acceptable
20.88 points
The student provides a detailed system specific plans for the protection of intellectual property from the identified risks or threats; justifications are accurate. The student clearly addresses the critical security activities that can be tailored to the organization\'s unique needs, with several supporting details and examples. Subject knowledge is appropriate.
3. Approaching
18.96 points
The student appropriately describes some system specific plans for the protection of intellectual property from the identified risks or threats; some element justifications are included. The student briefly addresses how the critical security activities can be tailored to the organization\'s unique needs. Some supporting details are provided. Subject knowledge is present.
2. Insufficient
17.76 points
The student outlines a few components of system specific plans for the protection of intellectual property from the identified risks or threats, but elements are lacking. The student includes little knowledge about how the critical security activities can be tailored to the organization\'s unique needs. Few details or examples are provided. Little subject knowledge is evident.
1. Unsatisfactory
0 points
The student does not adequately address the criteria and/or it is missing.
Criteria Comments
The work is unsupported. You must cite sources to support arguments and positions.
collapse Security Model/Access Control Mechanisms assessment
Security Model/Access Control Mechanisms
15.66 / 18
Criteria Description
Security Model/Access Control Mechanisms
5. Target
18 points
The student comprehensively describes how the selected security model can protect the organization from being compromised by unauthorized users, as well as determine the applicable access control mechanisms; information and justifications are accurate and appropriate. Extensive details are provided.
4. Acceptable
15.66 points
The student provides a detailed description of how the selected security model can protect the organization from being compromised by unauthorized users, as well as determine the applicable access control mechanisms; justifications are accurate. Several supporting details and examples are provided.
3. Approaching
14.22 points
The student briefly describes how the selected security model can protect the organization from being compromised by unauthorized users, as well as determine the applicable access control mechanisms; some justifications are included. Some supporting details are provided are provided.
2. Insufficient
13.32 points
The student outlines a few components for how the selected security model can protect the organization from being compromised by unauthorized users, as well as determine the applicable access control mechanisms, but details are lacking.
1. Unsatisfactory
0 points
The student does not adequately address the criteria and/or it is missing.
Criteria Comments
The work is unsupported. You must cite sources to support arguments and positions.
collapse Outline and Explain the Roles of Personnel in Planning and Managing Security assessment
Outline and Explain the Roles of Personnel in Planning and Managing Security
20.88 / 24
Criteria Description
To include Board of Directors, Senior Management, Chief Information Security Officer (CISO), IT Management (CIO, IT Director, etc.), Functional Area Management, Information Security personnel and End users.
5. Target
24 points
The student comprehensively outlines and explains each role of the personnel (within the assignment criteria) in planning and managing the security needs identified. Information and explanations are accurate and appropriate. Extensive details are provided.
4. Acceptable
20.88 points
The student provides a detailed outline and explanation of the roles of personnel (within the assignment criteria) ) in planning and managing the security needs identified; explanations are accurate. Several supporting details and examples are provided.
3. Approaching
18.96 points
The student briefly describes the roles of personnel (within the assignment criteria) in planning and managing the security needs identified; some explanations are included. Some supporting details are provided.
2. Insufficient
17.76 points
The student outlines a few of the roles of personnel in planning and managing the security needs identified, but some roles and details are lacking.
1. Unsatisfactory
0 points
The student does not adequately address the criteria and/or it is missing.
Criteria Comments
The work is unsupported. You must cite sources to support arguments and positions.
collapse Sources assessment
Sources
0 / 12
Criteria Description
Includes use of appropriate style, correct citation format in-text and in reference section.
5. Target
12 points
Sources are academic, comprehensive, current, and/or relevant. Quoted material and paraphrasing expertly support, extend, and inform ideas, but do not substitute for the writer\'s own idea development. Sources are well-synthesized to support major points.
4. Acceptable
10.44 points
Sources are academic, current, and/or relevant to support major points. Quoted material and paraphrasing are used effectively and consistently to support the major points and writer\'s idea development.
3. Approaching
9.48 points
Sources are adequate, relevant, and extend beyond assigned readings. Quoted material and paraphrasing are included to support major points and writer\'s idea development.
2. Insufficient
8.88 points
Sources are used to support major points. Important relevant sources are neglected. Quoted material and paraphrasing are overused or mostly missing.
1. Unsatisfactory
0 points
No outside academic sources are used to support major points.
Criteria Comments
There was no support used in the work. References cannot be listed unless they are used in the body of the work.
collapse Mechanics of Writing assessment
Mechanics of Writing
12 / 12
Criteria Description
Includes spelling, capitalization, punctuation, grammar, language use, sentence structure, etc.
5. Target
12 points
No mechanical errors are present. Appropriate language choice and sentence structure are used throughout.
4. Acceptable
10.44 points
Few mechanical errors are present. Suitable language choice and sentence structure are used.
3. Approaching
9.48 points
Occasional mechanical errors are present. Language choice is generally appropriate. Varied sentence structure is attempted.
2. Insufficient
8.88 points
Frequent and repetitive mechanical errors are present. Inconsistencies in language choice or sentence structure are recurrent.
1. Unsatisfactory
0 points
Errors in grammar or syntax are pervasive and impede meaning. Incorrect language choice or sentence structure errors are found throughout.
Criteria Comments
No comments.
Instructor Comments
Comment from instructor: Thank you for submitting the Information Security Management Models assignment where you included a basic description of the selected company to include the mission statement, web applications, servers, departments, routers and switches, remote access, wireless communication, firewalls, and demilitarized zone (DMZ). The description presented met the requirements. You successfully prepared a report for upper management that incorporates the critical security activities in the four steps identified. Finally, your explanation of the seven personnel roles in the planning and managing of the proposed security activities was right on point. The work is unsupported. You must cite sources to support arguments and positions. References were listed but not used. Please let me know if I may answer any questions for you.