Project Deliverable 4: Infrastructure and SecurityProject Deliverable 4 is a two-part deliverable using MS Word and MS Visio, or their open source equivalents. You are the Chief Security Officer (CSO)

Points: 90

Project Deliverable 4: Infrastructure and Security

Criteria

Unacceptable

Below 70% F

Fair

70-79% C

Proficient

80-89% B

Exemplary

90-100% A

Section 1

1. Explain the major cyber governance issues in an organization and, because of those issues, examine how organizations develop communication protocols.

Weight: 20%

Did not submit or incompletely explained the major cyber governance issues in an organization; did not submit or incompletely examined how organizations develop communication protocols because of those issues.

Partially explainedthe major cyber governance issues in an organization; partially examined how organizations develop communication protocols because of those issues.

Satisfactorily explained the major cyber governance issues in an organization; satisfactorily examined how organizations develop communication protocols because of those issues.

Thoroughly explained the major cyber governance issues in an organization; thoroughly examined how organizations develop communication protocols because of those issues.

2. Describe the security issues found on a network, and arrange them from highest to lowest, mapping out security loopholes to justify your answer.
Weight: 20%

Did not submit or incompletely described the security issues found on a network; did not submit or incompletely arranged them from highest to lowest, mapping out security loopholes to justify your answer.

Partially describedthe security issues found on a network; partially arranged them from highest to lowest, mapping out security loopholes to justify your answer.

Satisfactorily described the security issues found on a network; satisfactorily arranged them from highest to lowest, mapping out security loopholes to justify your answer.

Thoroughly described the security issues found on a network; thoroughly arranged them from highest to lowest, mapping out security loopholes to justify your answer.

3. Differentiate between intellectual property theft and cyber espionage. Determine how you, as the CSO of an organization, would deal with both cases and what standard operating procedures you would follow.

Weight: 25%

Did not submit or incompletely differentiatedbetween intellectual property theft and cyber espionage. Did not submit or incompletely determined how you, as the CSO of an organization, would deal with both cases and what standard operating procedures you would follow.

Partially differentiatedbetween intellectual property theft and cyber espionage.Partially determined how you, as the CSO of an organization, would deal with both cases and what standard operating procedures you would follow.

Satisfactorily differentiatedbetween intellectual property theft and cyber espionage.Satisfactorilydetermined how you, as the CSO of an organization, would deal with both cases and what standard operating procedures you would follow.

Thoroughly differentiatedbetween intellectual property theft and cyber espionage.Thoroughlydetermined how you, as the CSO of an organization, would deal with both cases and what standard operating procedures you would follow.

Section 2

4. Using Microsoft Visio, or an open source alternative such as Dia, illustrate the flow of data for both input and output information in an infrastructure. The diagram must map any issues in terms of a cyber-infrastructure.

Weight: 25%

Did not submit or incompletely illustrated the flow of data for both input and output information in an infrastructure, usingMicrosoft Visio, or an open source alternative such as Dia. Did not submit or incompletely mapped any issues in terms of a cyber-infrastructure.

Partially illustratedthe flow of data for both input and output information in an infrastructure, using Microsoft Visio, or an open source alternative such as Dia.Partially mapped any issues in terms of a cyber-infrastructure.

Satisfactorily illustrated the flow of data for both input and output information in an infrastructure, usingMicrosoft Visio, or an open source alternative such as Dia. Satisfactorilymapped any issues in terms of a cyber-infrastructure.

Thoroughly illustrated the flow of data for both input and output information in an infrastructure, usingMicrosoft Visio, or an open source alternative such as Dia. Thoroughlymapped any issues in terms of a cyber-infrastructure.

5. Clarity, writing mechanics, and formatting requirements

Weight: 10%

More than 6 errors present

5-6 errors present

3-4 errors present

0-2 errors present