3-1 Video Game: Agent Surefire: InfoSec

ISE 510 Video Game Assignment Guidelines and Rubric Prompt : In Module Three, you will p lay the Agent Surefire : InfoS ec game, which is an extension of the risk assessment project (final project ) scenario . You will complete your final project based on the information you discover about physical vulnerabilities here. You should discover, assess, and document at least seven security vulnerabilities within the virtual environment. Correctly categorize each vulnerability based on the methods specifi ed in th e game. The virtual environment should be viewed as part of the system described in your final project. Detailed instruction s will be provided once you access the game. This activity can be expected to take about 45 minutes to an hour. You are not required to play the game to its conclusion (although you might want to!). The purpose of this game play is to discover physical vulnerabiliti es that you can use for your final project. Access the game on the Jones & Bartlett Learning website here . Guidelines for Submission : Submit your documented security vulnerabilities to your instructor in Blackboard via the submission link for this assignment. Instructor Feedback : This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more in formation, review these instructions . Critical Elements Exemplary (100%) Proficient (90 %) Needs Improvement (70 %) Not Evident (0%) Value Discover, Assess, and Document at Least Seven Security Vulnerabilities Meets “Proficient” criteria and expertly discovers, assesses, and documents a minimum of seven security vulnerabilities Discovers, assesses, and correctly documents five or six security vulnerabilities Discovers, assesses, and correctly documents three or four security vulnerabilities Two or fewer security vulnerabilities are correctly discovered, assessed, and documented 60 Categorize Each Vulnerability Meets “Proficient” criteria and correctly categorizes a minimum of seven security vulnerabilities Correctly categorizes five or six security vulnerabilities Correctly categorizes three or four security vulnerabilities Two or fewer security vulnerabilities are correctly identified 30 Articulation of Response Submission is free of errors related to grammar, spelling, syntax, and organization and is presented in a professional and easy -to-read format Submission has no major errors related to grammar, spelling, syntax, or organization Submission has major errors related to grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to grammar, spelling, syntax, or organization that prevent understanding of ideas 10 Total 100%