IT 549 Scenario Assignment Module Six Guidelines and Rubric For the Module Six assignment, students will be placed into the role of an IT consultant whose task is to evaluate an existin g organization’s security protocols.

IT 549 Scenario Assignment Module Six Guidelines and Rubric For the Module Six assignment, students will be placed into the role of an IT consultant whose task is to evaluate an existin g organization’s security protocols. Once the protocols have been analyzed, students will synthesize this knowledge to provide insight into the likelihood of certain threats occurring. The skills acquired from this exercise will prove to be beneficial during the final stages of designing the information assurance plan. Prompt: In your role as a highly paid consultant, you are given a list of potential threats to and vulnerabilities of the current communication security protocols of an organization. You are asked to provide quantitative data to measure the likelihood that any of these threats will actually occur for the information assets of the client. Conduct research and describe resources you found that might provide insight into measuring the likelihood that some of the threats would actually occur. In the explanation, include whether you see a trend in resources that might indicate a specific industry is particularly involved in gathering this kind of data. Additionally, evaluate which communication security protocols are more effective and provide an explanation. Guidelines for Submission: Your responses for the prompt must be submitted as two to three paragraphs and as a Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format.

Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value

WE WRITE ESSAYS FOR STUDENTS

Tell us about your assignment and we will find the best writer for your paper.

Write My Essay For Me

Quantitative Data Meets “Proficient” criteria and the quantitative data is

substantiated with research based evidence

Response provides quantitative data to measure the likelihood

that any of these threats will actually occur

Response attempts to provide quantitative data; however, the

data requires more substantial evidence to prove the likeliness of the threats occurring or not

Response does not provide any quantitative data

20

Insight Meets “Proficient” criteria and explanation uses content based

vocabulary and research based evidence to support the answer

Response explains and provides insight into measuring the

likelihood that some of the threats would actually occur

Response provides insight into measuring the likelihood that

some of the threats would actually occur but does not explain the likelihood of the

threats

Response does not provide insight into measuring the

likelihood that some of the threats would actually occur

20

Trend in Resources Meets “Proficient” criteria and

the trend that is identified is substantiated with research based evidence

Response specifies a trend in

resources that might indicate a specific industry is particularly involved in gathering this kind

of data

Response specifies a trend in

resources that might indicate a specific industry is particularly involved in gathering the data

but does not use content based vocabulary to support the conclusion

Response does not specify a

trend in resources

20

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it549/it_549_list_of_possible_threats.docx
Evaluation Meets “Proficient” criteria and the evaluation uses content

based vocabulary and research based evidence to support the answer

Response evaluates which communication security

protocols are more effective and provides an explanation

Response evaluates which communication security

protocols are more effective but does not explain the evaluation

Response does not evaluate the most effective communication

security protocols

20

Articulation of

Response

Submission is free of errors

related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy-to-read

format

Submission has no major errors

related to citations, grammar, spelling, syntax, or organization

Submission has major errors

related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of

main ideas

Submission has critical errors

related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas

20

Earned Total 100%

The post IT 549 Scenario Assignment Module Six Guidelines and Rubric For the Module Six assignment, students will be placed into the role of an IT consultant whose task is to evaluate an existin g organization’s security protocols. appeared first on Versed Writers.

Let our team of professional writers take care of your essays for you! We provide quality and plagiarism free academic papers written from scratch. Sit back, relax, and leave the writing to us! Meet some of our best research paper writing experts. We obey strict privacy policies to secure every byte of information between you and us.

ORDER ORIGINAL ANSWERS WRITTEN FROM SCRATCH

PLACE YOUR ORDER