Project Deliverable 5: Cybersecurity Policy CatalogProject Deliverable 5 is a two-part deliverable using MS Word and MS Project, or their open source equivalents. This assignment focuses on informatio
Points: 100 | Project Deliverable 5: Cybersecurity Policy Catalog | |||
Criteria | Unacceptable Below 70% F | Fair 70-79% C | Proficient 80-89% B | Exemplary 90-100% A |
Section 1 | ||||
1. Create a cyber-security policy describing the principle, the objective, and policy statement for the law firm’s company network. Weight: 15% | Did not submit or incompletely created a cyber-security policy describing the principle, the objective, and policy statement for the law firm’s company network. | Partially created a cyber-security policy describing the principle, the objective, and policy statement for the law firm’s company network. | Satisfactorily created a cyber-security policy describing the principle, the objective, and policy statement for the law firm’s company network. | Thoroughly createda cyber-security policy describing the principle, the objective, and policy statement for the law firm’s company network. |
2. Describe the roles and responsibilities by groups (e.g., position director of network security, the network security manager, network security engineers, IT area), defining roles and responsibilities. | Did not submit or incompletely described the roles and responsibilities by groups (e.g., position director of network security, the network security manager, network security engineers, IT area), defining roles and responsibilities. | Partially describedthe roles and responsibilities by groups (e.g., position director of network security, the network security manager, network security engineers, IT area), defining roles and responsibilities. | Satisfactorily described the roles and responsibilities by groups (e.g., position director of network security, the network security manager, network security engineers, IT area), defining roles and responsibilities. | Thoroughly described the roles and responsibilities by groups (e.g., position director of network security, the network security manager, network security engineers, IT area), defining roles and responsibilities. |
3. Suggest the cyber-security policy statement, an explanation of the policy statement, and the reasons why the policy statement may be controversial. Weight: 15% | Did not submit or incompletely suggested the cyber-security policy statement, an explanation of the policy statement, and the reasons why the policy statement may be controversial. | Partially suggestedthe cyber-security policy statement, an explanation of the policy statement, and the reasons why the policy statement may be controversial. | Satisfactorily suggested the cyber-security policy statement, an explanation of the policy statement, and the reasons why the policy statement may be controversial. | Thoroughly suggested the cyber-security policy statement, an explanation of the policy statement, and the reasons why the policy statement may be controversial. |
4. Determine the security testing methodology you would use to facilitate the assessment of technical controls. Weight: 15% | Did not submit or incompletely determined the security testing methodology you would use to facilitate the assessment of technical controls. | Partially determinedthe security testing methodology you would use to facilitate the assessment of technical controls. | Satisfactorily determined the security testing methodology you would use to facilitate the assessment of technical controls. | Thoroughly determined the security testing methodology you would use to facilitate the assessment of technical controls. |
Section 2 | ||||
5a. Use Microsoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm. The project plan should include tasks, subtasks, resources, and predecessors. Weight: 10% | Did not submit or incompletely usedMicrosoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm, including tasks, subtasks, resources, and predecessors. | Partially usedMicrosoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm, including tasks, subtasks, resources, and predecessors. | Satisfactorily usedMicrosoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm, including tasks, subtasks, resources, and predecessors. | Thoroughly usedMicrosoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm, including tasks, subtasks, resources, and predecessors. |
5b. Use Microsoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm. The project plan should include an outline of the planning, analysis, design, and implementation phases. Weight: 10% | Did not submit or incompletely usedMicrosoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm, including an outline of the planning, analysis, design, and implementation phases. | Partially usedMicrosoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm, including an outline of the planning, analysis, design, and implementation phases. | Satisfactorily usedMicrosoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm, including an outline of the planning, analysis, design, and implementation phases. | Thoroughly usedMicrosoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm, including an outline of the planning, analysis, design, and implementation phases. |
5c. Use Microsoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm. The project plan should include the use of cyber-security in the information systems development life cycle. Weight: 10% | Did not submit or incompletely usedMicrosoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm, including the use of cyber-security in the information systems development life cycle. | Partially usedMicrosoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm, including the use of cyber-security in the information systems development life cycle. | Satisfactorily usedMicrosoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm, including the use of cyber-security in the information systems development life cycle. | Thoroughly usedMicrosoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm, including the use of cyber-security in the information systems development life cycle. |
6. Clarity, writing mechanics, and formatting requirements Weight: 10% | More than 6 errors present | 5-6 errors present | 3-4 errors present | 0-2 errors present |