Evolution of CyberspaceProject Deliverable 1 consists of using Microsoft Word. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.In this deliver
Points: 90 | Project Deliverable 1: Evolution of Cyberspace | |||
Criteria | Unacceptable Below 70% F | Fair 70-79% C | Proficient 80-89% B | Exemplary 90-100% A |
1. Explain the evolution of cyberspace through time. Weight: 20% | Did not submit or incompletely explained the evolution of cyberspace through time. | Partially explainedthe evolution of cyberspace through time. | Satisfactorily explained the evolution of cyberspace through time. | Thoroughly explained the evolution of cyberspace through time. |
2. Identify one (1) of the biggest developments that have changed the face of cyberspace. | Did not submit or incompletely identified one (1) of the biggest developments that have changed the face of cyberspace. | Partially identifiedone (1) of the biggest developments that have changed the face of cyberspace. | Satisfactorily identified one (1) of the biggest developments that have changed the face of cyberspace. | Thoroughly identified one (1) of the biggest developments that have changed the face of cyberspace. |
3. Examine the advent of e-Commerce and its impact on cybersecurity. Weight: 25% | Did not submit or incompletely examined the advent of | Partially examinedthe advent of | Satisfactorily examined the advent of | Thoroughly examined the advent of |
4. Determine the main challenges and the countermeasures needed to back up the security related to cyberspace. Weight: 25% | Did not submit or incompletely determined the main challenges and the countermeasures needed to back up the security related to cyberspace. | Partially determinedthe main challenges and the countermeasures needed to back up the security related to cyberspace. | Satisfactorily determined the main challenges and the countermeasures needed to back up the security related to cyberspace. | Thoroughly determined the main challenges and the countermeasures needed to back up the security related to cyberspace. |
5. Clarity, writing mechanics, and formatting requirements Weight: 10% | More than 6 errors present | 5-6 errors present | 3-4 errors present | 0-2 errors present |