Graduate Level Writing!!! Cyber/Computer Security Only!!!
Rubric Name: Common Access Card Deployment Strategy and Email Security Strategy Associated Learning Objectives | |
| 1.5.1: Demonstrate variation in sentence structure. |
Assessment Method: Score on Criteria - 1.5: Use sentence structure appropriate to the task, message and audience. | |
Required Performance: Meets Performance Requirements | |
| 1.5.2: Express ideas clearly and concisely. |
Assessment Method: Score on Criteria - 1.5: Use sentence structure appropriate to the task, message and audience. | |
Required Performance: Meets Performance Requirements | |
| 1.5.3: Eliminate sentence-level errors such as run-ons/comma splices and sentence fragments. |
Assessment Method: Score on Criteria - 1.5: Use sentence structure appropriate to the task, message and audience. | |
Required Performance: Meets Performance Requirements | |
| 1.6.1: Adhere to standard usage rules of grammar. |
Assessment Method: Score on Criteria - 1.6: Follow conventions of Standard Written English. | |
Required Performance: Meets Performance Requirements | |
| 1.6.2: Adhere to standard usage rules of word choice. |
Assessment Method: Score on Criteria - 1.6: Follow conventions of Standard Written English. | |
Required Performance: Meets Performance Requirements | |
| 1.6.3: Adhere to standard usage rules of spelling. |
Assessment Method: Score on Criteria - 1.6: Follow conventions of Standard Written English. | |
Required Performance: Meets Performance Requirements | |
| 1.7.1: Create a professional-looking and relevant presentation that delivers the desired content. |
Assessment Method: Score on Criteria - 1.7: Create neat and professional-looking documents appropriate for the project. | |
Required Performance: Meets Performance Requirements | |
| 1.7.2: Employ visual aids and multi-media tools as appropriate to enhance the presentation message. |
Assessment Method: Score on Criteria - 1.7: Create neat and professional-looking documents appropriate for the project. | |
Required Performance: Meets Performance Requirements | |
| 1.7.3: Cite sources for visual aids and multimedia supports as necessary. |
Assessment Method: Score on Criteria - 1.7: Create neat and professional-looking documents appropriate for the project. | |
Required Performance: Meets Performance Requirements | |
| 2.1.1: Summarize the issue or problem, using supporting details to enable a deeper understanding of the issue or problem. |
Assessment Method: Score on Criteria - 2.1: Identify and clearly explain the issue, question, problem under consideration. | |
Required Performance: Meets Performance Requirements | |
| 2.1.2: Identify potential underlying causes or conditions contributing to the issue or problem and consider the context. |
Assessment Method: Score on Criteria - 2.1: Identify and clearly explain the issue, question, problem under consideration. | |
Required Performance: Meets Performance Requirements | |
| 2.1.3: Pose significant questions to inform the direction of the investigation of the problem or question. |
Assessment Method: Score on Criteria - 2.1: Identify and clearly explain the issue, question, problem under consideration. | |
Required Performance: Meets Performance Requirements | |
| 2.1.4: Scan the environment for cues to inform and direct search for information relevant to the issue or problem. |
Assessment Method: Score on Criteria - 2.1: Identify and clearly explain the issue, question, problem under consideration. | |
Required Performance: Meets Performance Requirements | |
| 2.2.1: Explore information sources to increase familiarity and achieve a manageable focus. |
Assessment Method: Score on Criteria - 2.2: Locate and access sufficient information to investigate the issue or problem. | |
Required Performance: Meets Performance Requirements | |
| 2.2.2: Develop and implement a search strategy that employs search engines, databases, and inquiries to access the needed information. |
Assessment Method: Score on Criteria - 2.2: Locate and access sufficient information to investigate the issue or problem. | |
Required Performance: Meets Performance Requirements | |
| 2.2.3: Assess the search results to determine if there are remaining gaps; revisit strategy as necessary. |
Assessment Method: Score on Criteria - 2.2: Locate and access sufficient information to investigate the issue or problem. | |
Required Performance: Meets Performance Requirements | |
| 2.2.4: Identify contradictory information or inconsistent data and seek to reconcile contradictions. |
Assessment Method: Score on Criteria - 2.2: Locate and access sufficient information to investigate the issue or problem. | |
Required Performance: Meets Performance Requirements | |
| 2.3.1: Evaluate reliability, validity, accuracy, authority, timeliness, and point of view. |
Assessment Method: Score on Criteria - 2.3: Evaluate the information in logical manner to determine value and relevance. | |
Required Performance: Meets Performance Requirements | |
| 2.3.2: Evaluate the structure and logic of arguments and methods. |
Assessment Method: Score on Criteria - 2.3: Evaluate the information in logical manner to determine value and relevance. | |
Required Performance: Meets Performance Requirements | |
| 2.3.3: Select and incorporate information that provides evidence for the topic |
Assessment Method: Score on Criteria - 2.3: Evaluate the information in logical manner to determine value and relevance. | |
Required Performance: Meets Performance Requirements | |
| 2.4.1: Articulate clearly and fairly others' alternative viewpoints and the basis of reasoning. |
Assessment Method: Score on Criteria - 2.4: Consider and analyze information in context to the issue or problem. | |
Required Performance: Meets Performance Requirements | |
| 2.4.2: Identify significant, potential implications, and consequences of alternative points of view. |
Assessment Method: Score on Criteria - 2.4: Consider and analyze information in context to the issue or problem. | |
Required Performance: Meets Performance Requirements | |
| 2.4.3: Evaluate assumptions underlying other analytical viewpoints, conclusions, and/or solutions. |
Assessment Method: Score on Criteria - 2.4: Consider and analyze information in context to the issue or problem. | |
Required Performance: Meets Performance Requirements | |
| 3.2.1: Perform accurate calculations which are sufficiently comprehensive to solve the problem. |
Assessment Method: Score on Criteria - 3.2: Employ quantitative and data analysis techniques to arrive at optimal solution. | |
Required Performance: Meets Performance Requirements | |
| 3.2.2: Use appropriate and complete quantitative analysis techniques to arrive at a correct or optimal analysis. |
Assessment Method: Score on Criteria - 3.2: Employ quantitative and data analysis techniques to arrive at optimal solution. | |
Required Performance: Meets Performance Requirements | |
| 5.1.1: Explain the core concepts of cryptography and cryptanalysis |
Assessment Method: Score on Criteria - 5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards. | |
Required Performance: Meets Performance Requirements | |
| 5.1.2: Explain the concept of public key infrastructure (PKI) |
Assessment Method: Score on Criteria - 5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards. | |
Required Performance: Meets Performance Requirements | |
| 5.1.3: Describe encryption methodologies |
Assessment Method: Score on Criteria - 5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards. | |
Required Performance: Meets Performance Requirements | |
| 5.1.4: Encryption concepts, e.g., symmetric vs. asymmetric, transport and storage encryption, and digital signatures. |
Assessment Method: Score on Criteria - 5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards. | |
Required Performance: Meets Performance Requirements | |
| 5.1.5: Knowledge of encryption algorithms (e.g., IPSEC, AES, GRE, IKE, MD5, SHA, 3DES). |
Assessment Method: Score on Criteria - 5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards. | |
Required Performance: Meets Performance Requirements | |
| 5.1.6: Knowledge of cryptography and cryptographic key management concepts. |
Assessment Method: Score on Criteria - 5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards. | |
Required Performance: Meets Performance Requirements |