The CEO and CIO for CAPITAL ONE need you and your team to create an IRP and change management plan. These plans will help the organization choose the appropriate cyber security tool. Part I: Incident


Information Asset Security Fundamentals - 25% of total grade

Exceeds Expectations - 37.5

Deliverables are insightful and exceptional in their understanding and coverage of concepts and principles of securing and protecting information assets, common terms used in information asset security, common protocol used in securing and protecting information assets, and concepts of the importance of information asset security.

Meets Expectations - 28.125

Deliverables are clear and complete in their coverage of the concepts of concepts and principles of securing and protecting information assets, common terms used in information asset security, common protocol used in securing and protecting information assets, and concepts of the importance of information asset security.

Information Assurance and Security 20% of total grade

Exceeds Expectations - 30

Deliverables are insightful and exceptional in their understanding and coverage of risk management essentials; concepts related to protecting information in an enterprise; regulations, investigations, and compliance.

Meets Expectations - 22.5

Deliverables are clear and complete in their coverage of the concepts of risk management essentials; concepts related to protecting information in an enterprise; regulations, investigations, and compliance.

Enterprise Security 25% of total grade

Exceeds Expectations - 37.5

Deliverables are insightful and exceptional in their understanding and coverage of concepts related to identifying internal, external and other threats to an enterprise; concepts of protecting data hardware and software in an enterprise; how to conduct a comprehensive evaluation of cyber security tools to monitor malicious and abnormal activities.

Meets Expectations - 28.125

Deliverables are clear and complete in their coverage of the concepts of concepts related to identifying internal, external and other threats to an enterprise; concepts of protecting data hardware and software in an enterprise; how to conduct a comprehensive evaluation of cyber security tools to monitor malicious and abnormal activities.


Information System Security 20% of total grade

Exceeds Expectations - 30

Deliverables are insightful and exceptional in their understanding and coverage of concepts related to setting access controls; risk identification, monitoring, and analysis; cryptography and encryption concepts; Network and communications security; cyber security risks and protocol; risk management during development and implementation; concepts related to understanding and setting organizational policies.

Meets Expectations - 22.5

Deliverables are clear and complete in their coverage of the concepts of concepts related to setting access controls; risk identification, monitoring, and analysis; cryptography and encryption concepts; Network and communications security; cyber security risks and protocol; risk management during development and implementation; concepts related to understanding and setting organizational policies.

Quality of written communication 5% of total grade

Exceeds Expectations – 7.5

Paper has exceptionally concise written explanation of findings. Prose is free of mechanical errors. A variety of sentence structures and effective figures of speech are used.

Meets Expectations – 5.625

Paper has a clear and logical written explanation of findings. Some mechanical errors or typos are present but are not overly distracting to the reader. Correct sentence structure and audience-appropriate language are used.


Use of APA Format/Style 5% of total grade

Exceeds Expectations – 7.5

A broad understanding of APA format and style is evident. Accurate citations presented. No APA errors are evident.

Meets Expectations - 5.625

APA formatted citations included when necessary.