*MUST BE FAMILIAR WITH UNIVERSITY OF PHOENIX CURRICULUM*Analyze IT security vulnerabilities and available security and data protection technologies that can be applied to your project based on this we
Project Data Security Plan Grading Guide BIS/320 Version 3 |
Individual Assignment: Project Data Security Plan
Purpose of Assignment
The purpose of the assignment is to guide learner examination of IT Security issues and data protection and theft prevention techniques.
Resources Required
Essentials of MIS, Chapter 8
Electronic Reserve Readings for Week 4
Grading Guide
Content | Met | Partially Met | Not Met | Comments: |
Student analyzes IT security vulnerabilities and available security and data protection technologies that can be applied to their project based on Week 4 readings. |
| |||
Student describes the internal and external threats to security for their project. | ||||
Student outlines which type of security and threat prevention technology is being used for their project and how it will be implemented. The student’s goal is to protect the privacy and financial information of their company and its potential customers. | ||||
Student creates plan in Microsoft® Word. | ||||
The paper is 350 words in length. | ||||
Total Available | Total Earned | |||
3.5 | #/X | |||
Writing Guidelines | Met | Partially Met | Not Met | Comments: |
The paper—including tables and graphs, headings, title page, and reference page—is consistent with APA formatting guidelines and meets course-level requirements. | ||||
Intellectual property is recognized with in-text citations and a reference page. | ||||
Paragraph and sentence transitions are present, logical, and maintain the flow throughout the paper. | ||||
Sentences are complete, clear, and concise. | ||||
Rules of grammar and usage are followed including spelling and punctuation. | ||||
Total Available | Total Earned | |||
| 1.5 | #/X | ||
Assignment Total | # | 5 | #/X | |
Additional comments: |
Copyright © 2016 by University of Phoenix. All rights reserved.