Part A: Select an organization you wish to explore and use throughout the course. As you make your selection, keep in mind that you will explore the following roles in the organization: Cyber Securit
CMGT 400 Grading Rubric Individual – Week 1 Threats, Attacks, and Vulnerability Assessment | |||
MEETS CRITERIA? | |||
Introduction to Security and Risk Management | PTs | Grade | COMMENTS |
Content (53 points) | |||
Part A: Select an organization you wish to explore during the course. As you make your selection, keep in mind that you will explore the following roles in the organization: Cyber Security Threat Analyst, Penetration Tester, Cyber Security Engineer, Risk Management Analyst, and Software Engineer. You need sufficient knowledge of the organization you select to complete these security assignments. The organization must be of sufficient complexity to meet assignment requirements. | |||
Part B: | 45 | ||
Take on the role of a Cyber Security Threat Analyst for the organization you select. Use the Threats, Attacks, and Vulnerability Assessment Template to create a 3- to 4-page Assessment Document. Research and include the following: • Tangible assets: • Include an assessment scope. The scope must include virtualization, cloud, database, network, mobile, and information system. (10pt) • Asset descriptions: • Include a system model, A diagram and descriptions of each asset included in the assessment scope, and existing countermeasures already in place. (Microsoft® Visio® or Lucidchart®) (5pt) • Threat agents and possible attacks (5pt) • Exploitable vulnerabilities (5pt) • Threat history (5pt) • Evaluation of threats or impact of threats on the business (5pt) • A prioritized list of identified risks (5pt) • Countermeasures to reduce threat (5pt) | |||
X out of 53 | |||
Research | |||
Assignment has research depth including at least two outside relevant peer reviewed references from course material and/or the library. | |||
Organization | |||
Assignment is organized appropriately covering all required topics in a logical sequence and applies the Threats, Attack, and Vulnerability Assessment Template. Title, introduction, body, conclusion and references are included in required sequence. | |||
Quality and APA: | |||
Assignment projects professional, quality image, meets academic integrity requirements. Includes title page and reference section. References in APA format. No spelling errors - the paper has obviously been proofread. Title and reference slides/pages do not count toward the length requirement. | |||
TOTAL POINTS FOR RESEARCH, ORGANIZATION, QUALITY, AND APA REQUIREMENTS | X out of 12 | ||
TOTAL POINTS | (X out of 65 possible points) 04-28-19 rpg |