Project Deliverable 3: Security Policy DocumentationProject Deliverable 3 is a two-part deliverable using MS Word and MS Project, or their open source equivalents. Note: You may create and / or make a
Points: 90 | Project Deliverable 3: Security Policy Documentation | |||
Criteria | Unacceptable Below 70% F | Fair 70-79% C | Proficient 80-89% B | Exemplary 90-100% A |
Section 1 | ||||
1. Analyze the strategy used to protect the large organization you researched from hackers, fraud, and theft. Weight: 15% | Did not submit or incompletely analyzed the strategy used to protect the large organization you researched from hackers, fraud, and theft. | Partially analyzedthe strategy used to protect the large organization you researched from hackers, fraud, and theft. | Satisfactorily analyzed the strategy used to protect the large organization you researched from hackers, fraud, and theft. | Thoroughly analyzed the strategy used to protect the large organization you researched from hackers, fraud, and theft. |
2. Describe how your researched large organization uses “policy as a project” in its program. | Did not submit or incompletely described how your researched large organization uses “policy as a project” in its program. | Partially describedhow your researched large organization uses “policy as a project” in its program. | Satisfactorily described how your researched large organization uses “policy as a project” in its program. | Thoroughly described how your researched large organization uses “policy as a project” in its program. |
3. Analyze the general consequences of not having a policy for cybersecurity. Justify your thoughts with real-world examples. Weight: 15% | Did not submit or incompletely analyzed the general consequences of not having a policy for cybersecurity. Did not submit or incompletely justified your thoughts with real-world examples. | Partially incompletely analyzed the general consequences of not having a policy for cybersecurity. Partially justified your thoughts with real-world examples. | Satisfactorily incompletely analyzed the general consequences of not having a policy for cybersecurity.Satisfactorilyjustified your thoughts with real-world examples. | Thoroughly incompletely analyzed the general consequences of not having a policy for cybersecurity.Thoroughly justified your thoughts with real-world examples. |
4. Cover the basic needs should there be a lack of cybersecurity policy in an organization. Decide what can be done to provide a base for security needs. Weight: 10% | Did not submit or incompletely covered the basic needs should there be a lack of cybersecurity policy in an organization. Did not submit or incompletely decided what can be done to provide a base for security needs. | Partially coveredthe basic needs should there be a lack of cybersecurity policy in an organization.Partially decided what can be done to provide a base for security needs. | Satisfactorily covered the basic needs should there be a lack of cybersecurity policy in an organization.Satisfactorilydecided what can be done to provide a base for security needs. | Thoroughly coveredthe basic needs should there be a lack of cybersecurity policy in an organization.Thoroughly decided what can be done to provide a base for security needs. |
Section 2 | ||||
5. Record all tasks, subtasks, resources, and time related to the security cycle. Weight: 15% | Did not submit or incompletely recorded all tasks, subtasks, resources, and time related to the security cycle. | Partially recordedall tasks, subtasks, resources, and time related to the security cycle. | Satisfactorily recorded all tasks, subtasks, resources, and time related to the security cycle. | Thoroughly recorded all tasks, subtasks, resources, and time related to the security cycle. |
6. Outline the organization’s business, the systems, mission, and / or risk management phases in your design. Weight: 15% | Did not submit or incompletely outlined the organization’s business, the systems, mission, and / or risk management phases in your design. | Partially outlinedthe organization’s business, the systems, mission, and / or risk management phases in your design. | Satisfactorily outlined the organization’s business, the systems, mission, and / or risk management phases in your design. | Thoroughly outlinedthe organization’s business, the systems, mission, and / or risk management phases in your design. |
7. Your milestones should show how you are reducing cybersecurity risk rather than compliance and best practices. Weight: 10% | Did not submit or incompletely showed how you are reducing cybersecurity risk rather than compliance and best practices. | Partially showedhow you are reducing cybersecurity risk rather than compliance and best practices. | Satisfactorily showed how you are reducing cybersecurity risk rather than compliance and best practices. | Thoroughly showedhow you are reducing cybersecurity risk rather than compliance and best practices. |
8. Clarity, writing mechanics, and formatting requirements Weight: 10% | More than 6 errors present | 5-6 errors present | 3-4 errors present | 0-2 errors present |