Graduate Level Writing!!! Cyber/Computer Security Only!!!

Rubric Name: Common Access Card Deployment Strategy and Email Security Strategy

Associated Learning Objectives

1.5.1: Demonstrate variation in sentence structure.

Assessment Method:  Score on Criteria - 1.5: Use sentence structure appropriate to the task, message and audience.

Required Performance:  Meets Performance Requirements

1.5.2: Express ideas clearly and concisely.

Assessment Method:  Score on Criteria - 1.5: Use sentence structure appropriate to the task, message and audience.

Required Performance:  Meets Performance Requirements

1.5.3: Eliminate sentence-level errors such as run-ons/comma splices and sentence fragments.

Assessment Method:  Score on Criteria - 1.5: Use sentence structure appropriate to the task, message and audience.

Required Performance:  Meets Performance Requirements

1.6.1: Adhere to standard usage rules of grammar.

Assessment Method:  Score on Criteria - 1.6: Follow conventions of Standard Written English.

Required Performance:  Meets Performance Requirements

1.6.2: Adhere to standard usage rules of word choice.

Assessment Method:  Score on Criteria - 1.6: Follow conventions of Standard Written English.

Required Performance:  Meets Performance Requirements

1.6.3: Adhere to standard usage rules of spelling.

Assessment Method:  Score on Criteria - 1.6: Follow conventions of Standard Written English.

Required Performance:  Meets Performance Requirements

1.7.1: Create a professional-looking and relevant presentation that delivers the desired content.

Assessment Method:  Score on Criteria - 1.7: Create neat and professional-looking documents appropriate for the project.

Required Performance:  Meets Performance Requirements

1.7.2: Employ visual aids and multi-media tools as appropriate to enhance the presentation message.

Assessment Method:  Score on Criteria - 1.7: Create neat and professional-looking documents appropriate for the project.

Required Performance:  Meets Performance Requirements

1.7.3: Cite sources for visual aids and multimedia supports as necessary.

Assessment Method:  Score on Criteria - 1.7: Create neat and professional-looking documents appropriate for the project.

Required Performance:  Meets Performance Requirements

2.1.1: Summarize the issue or problem, using supporting details to enable a deeper understanding of the issue or problem.

Assessment Method:  Score on Criteria - 2.1: Identify and clearly explain the issue, question, problem under consideration.

Required Performance:  Meets Performance Requirements

2.1.2: Identify potential underlying causes or conditions contributing to the issue or problem and consider the context.

Assessment Method:  Score on Criteria - 2.1: Identify and clearly explain the issue, question, problem under consideration.

Required Performance:  Meets Performance Requirements

2.1.3: Pose significant questions to inform the direction of the investigation of the problem or question.

Assessment Method:  Score on Criteria - 2.1: Identify and clearly explain the issue, question, problem under consideration.

Required Performance:  Meets Performance Requirements

2.1.4: Scan the environment for cues to inform and direct search for information relevant to the issue or problem.

Assessment Method:  Score on Criteria - 2.1: Identify and clearly explain the issue, question, problem under consideration.

Required Performance:  Meets Performance Requirements

2.2.1: Explore information sources to increase familiarity and achieve a manageable focus.

Assessment Method:  Score on Criteria - 2.2: Locate and access sufficient information to investigate the issue or problem.

Required Performance:  Meets Performance Requirements

2.2.2: Develop and implement a search strategy that employs search engines, databases, and inquiries to access the needed information.

Assessment Method:  Score on Criteria - 2.2: Locate and access sufficient information to investigate the issue or problem.

Required Performance:  Meets Performance Requirements

2.2.3: Assess the search results to determine if there are remaining gaps; revisit strategy as necessary.

Assessment Method:  Score on Criteria - 2.2: Locate and access sufficient information to investigate the issue or problem.

Required Performance:  Meets Performance Requirements

2.2.4: Identify contradictory information or inconsistent data and seek to reconcile contradictions.

Assessment Method:  Score on Criteria - 2.2: Locate and access sufficient information to investigate the issue or problem.

Required Performance:  Meets Performance Requirements

2.3.1: Evaluate reliability, validity, accuracy, authority, timeliness, and point of view.

Assessment Method:  Score on Criteria - 2.3: Evaluate the information in logical manner to determine value and relevance.

Required Performance:  Meets Performance Requirements

2.3.2: Evaluate the structure and logic of arguments and methods.

Assessment Method:  Score on Criteria - 2.3: Evaluate the information in logical manner to determine value and relevance.

Required Performance:  Meets Performance Requirements

2.3.3: Select and incorporate information that provides evidence for the topic

Assessment Method:  Score on Criteria - 2.3: Evaluate the information in logical manner to determine value and relevance.

Required Performance:  Meets Performance Requirements

2.4.1: Articulate clearly and fairly others' alternative viewpoints and the basis of reasoning.

Assessment Method:  Score on Criteria - 2.4: Consider and analyze information in context to the issue or problem.

Required Performance:  Meets Performance Requirements

2.4.2: Identify significant, potential implications, and consequences of alternative points of view.

Assessment Method:  Score on Criteria - 2.4: Consider and analyze information in context to the issue or problem.

Required Performance:  Meets Performance Requirements

2.4.3: Evaluate assumptions underlying other analytical viewpoints, conclusions, and/or solutions.

Assessment Method:  Score on Criteria - 2.4: Consider and analyze information in context to the issue or problem.

Required Performance:  Meets Performance Requirements

3.2.1: Perform accurate calculations which are sufficiently comprehensive to solve the problem.

Assessment Method:  Score on Criteria - 3.2: Employ quantitative and data analysis techniques to arrive at optimal solution.

Required Performance:  Meets Performance Requirements

3.2.2: Use appropriate and complete quantitative analysis techniques to arrive at a correct or optimal analysis.

Assessment Method:  Score on Criteria - 3.2: Employ quantitative and data analysis techniques to arrive at optimal solution.

Required Performance:  Meets Performance Requirements

5.1.1: Explain the core concepts of cryptography and cryptanalysis

Assessment Method:  Score on Criteria - 5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards.

Required Performance:  Meets Performance Requirements

5.1.2: Explain the concept of public key infrastructure (PKI)

Assessment Method:  Score on Criteria - 5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards.

Required Performance:  Meets Performance Requirements

5.1.3: Describe encryption methodologies

Assessment Method:  Score on Criteria - 5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards.

Required Performance:  Meets Performance Requirements

5.1.4: Encryption concepts, e.g., symmetric vs. asymmetric, transport and storage encryption, and digital signatures.

Assessment Method:  Score on Criteria - 5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards.

Required Performance:  Meets Performance Requirements

5.1.5: Knowledge of encryption algorithms (e.g., IPSEC, AES, GRE, IKE, MD5, SHA, 3DES).

Assessment Method:  Score on Criteria - 5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards.

Required Performance:  Meets Performance Requirements

5.1.6: Knowledge of cryptography and cryptographic key management concepts.

Assessment Method:  Score on Criteria - 5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards.

Required Performance:  Meets Performance Requirements