VM scanner evaluation background report. Please read the assignment before.

Project 2: VM Scanner Evaluation Background Report

Top of Form

Hide Assignment Information

Turnitin™

This assignment will be submitted to Turnitin™.

Instructions

This week, you will submit the second project, VM Scanner Background Report, based on the Nessus Report. As you are writing your report, you may want to refer back to the CEO’s video in Week 1 to make sure your analysis and recommendations align with the CEO’s prioritiess and concerns.

This project should be four to six pages in length and include a title/cover page. Include in-text citations and a reference page with three quality sources in a citation style of your choice.

You should link your analysis to the kinds of organizational functions and data associated with a transportation company (e.g., protecting order data, customer lists, sales leads, Payment Card Industry (PCI) compliance for processing credit, proprietary software, etc.) and provide your recommendation if Mercury USA should purchase the Nessus tool. This report should be four to six pages in length and include a title/cover page. Include in-text citations and a reference page with three quality sources in a citation style of your choice.

How Will My Work Be Evaluated?

For this assignment, you are asked to provide your supervisor, Judy, with a technical evaluation of a vulnerability scanner. By documenting your results in an effective background report, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.3.1: Identify potential sources of information that can be used to develop and support ideas.

  • 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.

  • 10.1.1: Identify the problem to be solved.

  • 12.2.1: Identify systems for the risk assessment.

  • 12.3.1: Select controls.

  • 13.2.1: Evaluate vendor recommendations in the context of organization requirements.

If you haven’t already downloaded it last week, download the VM Scanner Background Report Template now and follow the instructions in the document.

Delete the instructional text from the template before you submit.

When you are finished, click “add a file” to upload your work, then click the Submit button.

Due on Jul 16, 2024 11:59 PM

Hide Rubrics

Rubric Name: Project 2: VM Scanner Evaluation Background Report

Print

Evaluation Criteria

Exceeds Performance Requirements 100%

Meets Performance Requirements 85%

Approaches Performance Requirements 75%

Does Not Meet Performance Requirements 0%

Criterion Score

1.3.1: Identify potential sources of information that can be used to develop and support ideas.

12 points

Identifies potential sources of information in a thorough and accurate manner to develop and support ideas

10.2 points

Identifies potential sources of information to develop and support ideas.

9 points

Attempts to identify potential sources of information to develop and support ideas.

0 points

Does not identify potential sources of information to develop and support ideas.

Score of 1.3.1: Identify potential sources of information that can be used to develop and support ideas.,

/ 12

1.4.1: Produce grammatically correct material in standard academic English that supports the communication.

12 points

Produces grammatically correct material in flawless standard academic English that fully supports the communication.

10.2 points

Produces grammatically correct material in standard academic English that supports the communication.

9 points

Attempts to produce grammatically correct material in standard academic English, but mistakes in some areas affect the credibility of the communication.

0 points

Does not produce grammatically correct material, and the mistakes hamper the communication.

Score of 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.,

/ 12

10.1.1: Identify the problem to be solved.

19 points

Presents a relevant IT problem clearly and specifically.

16.15 points

Presents an IT problem that requires a solution.

14.25 points

Identifies an IT problem but may lack clarity and/or specificity regarding the need to be addressed.

0 points

Does not identify an IT problem to be solved.

Score of 10.1.1: Identify the problem to be solved.,

/ 19

12.2.1: Identify systems for the risk assessment.

19 points

Clearly identifies the most critical vulnerabilities with the system and accurately describes the security issues that need to be addressed.

16.15 points

Identifies most of the vulnerabilities with the system and describes most of the security issues that need to be addressed.

14.25 points

Identifies some of the vulnerabilities with the system and describes some of the security issues that need to be addressed.

0 points

Does not address the vulnerabilities with the system and does not describe the security issues that need to be addressed.

Score of 12.2.1: Identify systems for the risk assessment.,

/ 19

12.3.1: Select controls.

19 points

Selects highly effective controls.

16.15 points

Selects appropriate controls.

14.25 points

Selects some appropriate controls.

0 points

Does not select appropriate controls.

Score of 12.3.1: Select controls.,

/ 19

13.2.1: Evaluate vendor recommendations in the context of organization requirements.

19 points

Evaluate and provides detailed justification for vendor recommendations in the context of organization requirements.

16.15 points

Explains how ethical principles used in the information technology industry apply to the welfare and safety of stakeholders and society.

14.25 points

Attempts to explain how ethical principles used in the information technology industry apply to the welfare and safety of stakeholders and society but does not articulate the issues clearly or thoroughly.

0 points

Does not explain how ethical principles used in the information technology industry apply to the welfare and safety of stakeholders and society.

Score of 13.2.1: Evaluate vendor recommendations in the context of organization requirements.,

/ 19

Total

Score of Project 2: VM Scanner Evaluation Background Report,

/ 100

Overall Score

Level 4

90 points minimum

Level 3

80 points minimum

Level 2

70 points minimum

Level 1

0 points minimum

Associated Learning Objectives

1.3.1: Identify potential sources of information that can be used to develop and support ideas.

Assessment Method:  Score on Criteria - 1.3.1: Identify potential sources of information that can be used to develop and support ideas.

Required Performance:  Meets Performance Requirements 85%

1.4.1: Produce grammatically correct material in standard academic English that supports the communication.

Assessment Method:  Score on Criteria - 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.

Required Performance:  Meets Performance Requirements 85%

10.1.1: Identify the problem to be solved.

Assessment Method:  Score on Criteria - 10.1.1: Identify the problem to be solved.

Required Performance:  Meets Performance Requirements 85%

12.2.1: Identify systems for the risk assessment.

Assessment Method:  Score on Criteria - 12.2.1: Identify systems for the risk assessment.

Required Performance:  Meets Performance Requirements 85%

12.3.1: Select controls.

Assessment Method:  Score on Criteria - 12.3.1: Select controls.

Required Performance:  Meets Performance Requirements 85%

13.2.1: Evaluate vendor recommendations in the context of organization requirements.

Assessment Method:  Score on Criteria - 13.2.1: Evaluate vendor recommendations in the context of organization requirements.

Required Performance:  Meets Performance Requirements 85%

Bottom of Form