Organizations need to clearly identify risks before they become relative issues. Therefore, it is important for security professionals to comprehend what must be done to construct strategies that are
CYB- 650 Organizational Objectives and Priorities Scoring Guide
Performance Level Ratings
Meets Expectations | Performance consistently met expectations in all essential areas of the assignment criteria, at times possibly exceeding expectations, and the quality of work overall was very good. The most critical goals were met. |
Near Expectations | Performance did not consistently meet expectations. Performance failed to meet expectations in one or more essential areas of the assignment criteria, one or more of the most critical goals were not met. |
Below Expectations | Performance was consistently below expectations in most essential areas of the assignment criteria, reasonable progress toward critical goals was not made. Significant improvement is needed in one or more important areas. |
Criteria | Below Expectations | Near Expectations | Meets Expectations | Earned |
The student comprehensively presents a business profile to include: | ||||
The organization's mission, objectives, stakeholders, and how it fits into the industry | 0 pts – 2 pts | 3 pts – 4 pts | 5 pts | |
The organization's main product, service offerings, and consumer base | 0 pts – 6 pts | 7 pts – 9 pts | 10 pts | |
The organization's main departments and their roles, including all major stakeholders | 0 pts – 2 pts | 3 pts – 4 pts | 5 pts | |
The organization's information technology infrastructure | 0 pts – 6 pts | 7 pts – 9 pts | 10 pts | |
The organization's common flow of information and decisions | 0 pts – 6 pts | 7 pts – 9 pts | 10 pts | |
The student accurately implements a cybersecurity framework to: | ||||
Align the business to the NIST Cybersecurity Framework. | 0 pts – 2 pts | 3 pts – 4 pts | 5 pts | |
Prioritize organizational efforts and business needs. | 0 pts – 6 pts | 7 pts – 9 pts | 10 pts | |
Identify individual elements of cybersecurity risk (threats to and vulnerabilities of) and how to manage them. | 0 pts – 6 pts | 7 pts – 9 pts | 10 pts | |
Describe how the organization incorporates privacy principles in relation to data collection, disclosure, and retention. | 0 pts – 6 pts | 7 pts – 9 pts | 10 pts | |
Prose is largely free of mechanical errors. The writer uses a variety of effective sentence structures, figures of speech, and industry terminology. | 0 pts – 2 pts | 3 pts – 4 pts | 5 pts | |
TOTAL | /80 | |||
Instructor Feedback |