Project Deliverable 3: Security Policy DocumentationProject Deliverable 3 is a two-part deliverable using MS Word and MS Project, or their open source equivalents. Note: You may create and / or make a

Points: 90

Project Deliverable 3: Security Policy Documentation

Criteria

Unacceptable

Below 70% F

Fair

70-79% C

Proficient

80-89% B

Exemplary

90-100% A

Section 1

1. Analyze the strategy used to protect the large organization you researched from hackers, fraud, and theft.

Weight: 15%

Did not submit or incompletely analyzed the strategy used to protect the large organization you researched from hackers, fraud, and theft.

Partially analyzedthe strategy used to protect the large organization you researched from hackers, fraud, and theft.

Satisfactorily analyzed the strategy used to protect the large organization you researched from hackers, fraud, and theft.

Thoroughly analyzed the strategy used to protect the large organization you researched from hackers, fraud, and theft.

2. Describe how your researched large organization uses “policy as a project” in its program.
Weight: 10%

Did not submit or incompletely described how your researched large organization uses “policy as a project” in its program.

Partially describedhow your researched large organization uses “policy as a project” in its program.

Satisfactorily described how your researched large organization uses “policy as a project” in its program.

Thoroughly described how your researched large organization uses “policy as a project” in its program.

3. Analyze the general consequences of not having a policy for cybersecurity. Justify your thoughts with real-world examples.

Weight: 15%

Did not submit or incompletely analyzed the general consequences of not having a policy for cybersecurity. Did not submit or incompletely justified your thoughts with real-world examples.

Partially incompletely analyzed the general consequences of not having a policy for cybersecurity. Partially justified your thoughts with real-world examples.

Satisfactorily incompletely analyzed the general consequences of not having a policy for cybersecurity.Satisfactorilyjustified your thoughts with real-world examples.

Thoroughly incompletely analyzed the general consequences of not having a policy for cybersecurity.Thoroughly justified your thoughts with real-world examples.

4. Cover the basic needs should there be a lack of cybersecurity policy in an organization. Decide what can be done to provide a base for security needs.

Weight: 10%

Did not submit or incompletely covered the basic needs should there be a lack of cybersecurity policy in an organization. Did not submit or incompletely decided what can be done to provide a base for security needs.

Partially coveredthe basic needs should there be a lack of cybersecurity policy in an organization.Partially decided what can be done to provide a base for security needs.

Satisfactorily covered the basic needs should there be a lack of cybersecurity policy in an organization.Satisfactorilydecided what can be done to provide a base for security needs.

Thoroughly coveredthe basic needs should there be a lack of cybersecurity policy in an organization.Thoroughly decided what can be done to provide a base for security needs.

Section 2

5. Record all tasks, subtasks, resources, and time related to the security cycle.

Weight: 15%

Did not submit or incompletely recorded all tasks, subtasks, resources, and time related to the security cycle.

Partially recordedall tasks, subtasks, resources, and time related to the security cycle.

Satisfactorily recorded all tasks, subtasks, resources, and time related to the security cycle.

Thoroughly recorded all tasks, subtasks, resources, and time related to the security cycle.

6. Outline the organization’s business, the systems, mission, and / or risk management phases in your design.

Weight: 15%

Did not submit or incompletely outlined the organization’s business, the systems, mission, and / or risk management phases in your design.

Partially outlinedthe organization’s business, the systems, mission, and / or risk management phases in your design.

Satisfactorily outlined the organization’s business, the systems, mission, and / or risk management phases in your design.

Thoroughly outlinedthe organization’s business, the systems, mission, and / or risk management phases in your design.

7. Your milestones should show how you are reducing cybersecurity risk rather than compliance and best practices.

Weight: 10%

Did not submit or incompletely showed how you are reducing cybersecurity risk rather than compliance and best practices.

Partially showedhow you are reducing cybersecurity risk rather than compliance and best practices.

Satisfactorily showed how you are reducing cybersecurity risk rather than compliance and best practices.

Thoroughly showedhow you are reducing cybersecurity risk rather than compliance and best practices.

8. Clarity, writing mechanics, and formatting requirements

Weight: 10%

More than 6 errors present

5-6 errors present

3-4 errors present

0-2 errors present