IT 549 Scenario Assignment Module Six Guidelines and Rubric For the Module Six assignment, students will be placed into the role of an IT consultant whose task is to evaluate an existin g organization’s security protocols. Once the protocols have been analyzed, students will synthesize this knowledge to provide insight into the likelihood of certain threats occurring. The skills acquired from this exercise will prove to be beneficial during the final stages of designing the information assurance plan. Prompt: In your role as a highly paid consultant, you are given a list of potential threats to and vulnerabilities of the current communication security protocols of an organization. You are asked to provide quantitative data to measure the likelihood that any of these threats will actually occur for the information assets of the client. Conduct research and describe resources you found that might provide insight into measuring the likelihood that some of the threats would actually occur. In the explanation, include whether you see a trend in resources that might indicate a specific industry is particularly involved in gathering this kind of data. Additionally, evaluate which communication security protocols are more effective and provide an explanation. Guidelines for Submission: Your responses for the prompt must be submitted as two to three paragraphs and as a Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format.
Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
WE WRITE ESSAYS FOR STUDENTS
Tell us about your assignment and we will find the best writer for your paper.
Write My Essay For MeQuantitative Data Meets “Proficient” criteria and the quantitative data is
substantiated with research based evidence
Response provides quantitative data to measure the likelihood
that any of these threats will actually occur
Response attempts to provide quantitative data; however, the
data requires more substantial evidence to prove the likeliness of the threats occurring or not
Response does not provide any quantitative data
20
Insight Meets “Proficient” criteria and explanation uses content based
vocabulary and research based evidence to support the answer
Response explains and provides insight into measuring the
likelihood that some of the threats would actually occur
Response provides insight into measuring the likelihood that
some of the threats would actually occur but does not explain the likelihood of the
threats
Response does not provide insight into measuring the
likelihood that some of the threats would actually occur
20
Trend in Resources Meets “Proficient” criteria and
the trend that is identified is substantiated with research based evidence
Response specifies a trend in
resources that might indicate a specific industry is particularly involved in gathering this kind
of data
Response specifies a trend in
resources that might indicate a specific industry is particularly involved in gathering the data
but does not use content based vocabulary to support the conclusion
Response does not specify a
trend in resources
20
http://snhu-media.snhu.edu/files/course_repository/graduate/it/it549/it_549_list_of_possible_threats.docx
Evaluation Meets “Proficient” criteria and the evaluation uses content
based vocabulary and research based evidence to support the answer
Response evaluates which communication security
protocols are more effective and provides an explanation
Response evaluates which communication security
protocols are more effective but does not explain the evaluation
Response does not evaluate the most effective communication
security protocols
20
Articulation of
Response
Submission is free of errors
related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy-to-read
format
Submission has no major errors
related to citations, grammar, spelling, syntax, or organization
Submission has major errors
related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of
main ideas
Submission has critical errors
related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas
20
Earned Total 100%
The post IT 549 Scenario Assignment Module Six Guidelines and Rubric For the Module Six assignment, students will be placed into the role of an IT consultant whose task is to evaluate an existin g organization’s security protocols. appeared first on Versed Writers.
Let our team of professional writers take care of your essays for you! We provide quality and plagiarism free academic papers written from scratch. Sit back, relax, and leave the writing to us! Meet some of our best research paper writing experts. We obey strict privacy policies to secure every byte of information between you and us.
ORDER ORIGINAL ANSWERS WRITTEN FROM SCRATCH