Using the case study and instructions provided. I need a min
You Are Eligible For 15% Discount This Month!
Using the case study and instructions provided. I need a minimum 12 slide powerpoint presentation. Use the grading rubric below. PoliciesLevel 5Level 4Level 3Level 2Level 1Current Policy10 pointsClearly describes the current IT cyber security policy.8 pointsBasically describes the current IT cyber security policy.6 pointsWeakly describes the current IT cyber security policy.3 pointsLittle description of the current IT cyber security policy. (Or, inappropriate or excessive copying from other authors’ work.)0 pointsNo description of the current IT cyber security policy.Rationale10 pointsID at least 2 IT security policies to implement based upon the case study. Clearly discusses the rationale for selection of these policies.8 pointsID at least 2 IT security policies to implement based upon the case study. Basically discusses the rationale for selection of these policies.6 pointsID at least one (1) IT security policy to implement based upon the case study. Weakly discusses the rationale for selection of the policy.3 pointsMay ID at least one (1) IT security policy to implement based upon the case study. Little discussion of the rationale for selection of the policy. (Or, inappropriate or excessive copying from other authors’ work.)0 pointsNo policies identified or discussion of the rationale for the IT security policies.New TechnologyLevel 5Level 4Level 3Level 2Level 1Functionality of Technology10 pointsClearly describes functionality of new technology selected for implementation. 8 pointsBasically describes functionality of new technology selected for implementation.6 pointsWeakly describes functionality of new technology selected for implementation.3 pointsLittle description of functionality of new technology selected for implementation. (Or, inappropriate or excessive copying from other authors’ work.)0 pointsNo description of functionality of new technology selected for implementation.Challenges10 pointsClearly describes challenges associated with the current cyber security policy based on the new technology.8 pointsBasically describes challenges associated with the current cyber security policy based on the new technology.6 pointsWeakly describes challenges associated with the current cyber security policy based on the new technology.3 pointsLittle description of challenges associated with the current cyber security policy based on the new technology. (Or, inappropriate or excessive copying from other authors’ work.)0 pointsNo description of challenges associated with the current cyber security policy based on the new technology.Cybersecurity Vulnerabilities10 pointsClearly explains the cyber security vulnerabilities that could be introduced by the new technology that may not be mitigated by technological configuration management. Must address two (2) or more IT policies.8 pointsBasically explains the cyber security vulnerabilities that could be introduced by the new technology that may not be mitigated by technological configuration management. Must address two (2) or more IT policies.6 pointsWeakly explains the cyber security vulnerabilities that could be introduced by the new technology that may not be mitigated by technological configuration management. Must address at least one (1) IT policy.3 pointsLittle explanation on the cyber security vulnerabilities that could be introduced by the new technology that may not be mitigated by technological configuration management. May address only one (1) policy. (Or, inappropriate or excessive copying from other authors’ work.)0 pointsNo explanation on the cyber security vulnerabilities that could be introduced by the new technology that may not be mitigated by technological configuration management. Doesn’t address any policies.RecommendationsLevel 5Level 4Level 3Level 2Level 1Revisions and Modifications10 pointsClearly discusses revision and modification to each IT cyber security policy to ensure new technology doesn’t compromise organization cyber security posture. Must address two (2) or more IT policies.8 pointsBasically discusses revision and modification to each IT cyber security policy to ensure new technology doesn’t compromise organization cyber security posture. Must address two (2) or more IT security policies.6 pointsWeakly discusses revision and modification to each IT cyber security policy to ensure new technology doesn’t compromise organization cyber security posture. Must address at least one (1) IT policy.3 pointsLittle discussion on revision and modification to each IT cyber security policy to ensure new technology doesn’t compromise organization cyber security posture. May address only one (1) policy. (Or, inappropriate or excessive copying from other authors’ work.)0 pointsDoesn’t discuss revision and modification any IT cyber security policy to ensure new technology doesn’t compromise organization cyber security posture. Doesn’t address any policies.Challenges and Effects10 pointsClearly addresses the inter- and intra-organization leadership, managerial and policy challenges and effects associated with the new policies.8 pointsBasically addresses the inter- and intra-organization leadership, managerial and policy challenges and effects associated with the new policies.6 pointsWeakly addresses the inter- and intra-organization leadership, managerial and policy challenges and effects associated with the new policies.3 pointsLittle address of the inter- and intra-organization leadership, managerial and policy challenges and effects associated with the new policies. (Or, inappropriate or excessive copying from other authors’ work.)0 pointsDoesn’t address the inter- and intra-organization leadership, managerial and policy challenges and effects associated with the new policies.Communication Challenges10 pointsClearly discusses challenges in communicating new policies across the organization.8 pointsBasically discusses challenges in communicating new policies across the organization.6 pointsWeakly discusses challenges in communicating new policies across the organization.3 pointsLittle discussion of the challenges in communicating new policies across the organization. (Or, inappropriate or excessive copying from other authors’ work.)0 pointsNo discussion of the challenges in communicating new policies across the organization.Finds and Applies KnowledgeLevel 5Level 4Level 3Level 2Level 1Use of Authoritative Sources5 pointsUsed at least 5 authoritative or scholarly sources in paper. One must be NIST SP 800-53. No APA style errors in sources.4 pointsUsed at least 3 authoritative or scholarly sources in paper. One must be NIST SP 800-53. No more than 1 APA errors in sources.2 pointsUsed at least 2 authoritative or scholarly sources in paper. One must be NIST SP 800-53. No more than 2 APA errors in sources.1 pointMay have used 1 authoritative or scholarly source in paper. May use NIST SP 800-53. May not have used APA style formatting.0 pointsNo authoritative or scholarly sources used in paper. NIST SP 800-53 not mentioned.Citation of Sources5 pointsAll sources cited. No errors in citing material in paper.4 pointsAll but 1 source cited. Had no more than 5 citing errors in paper. 2 pointsAll but 2 sources cited. Had no more than 10 citing errors in paper.1 pointAll but 3 sources cited. Had less than 15 APA citing errors in paper.0 pointsNo sources cited or had more than 15 APA citing errors in paper.Organization, Execution and AppearanceLevel 5Level 4Level 3Level 2Level 1Formatting8 pointsHas separate title slide with title, student name, class and date. All slides have titles; not wordy and is easy to read; no spelling or grammar errors; and no distracting material.6 pointsBasic title slide with title, student name, class and date. Slides have less than 5 errors to include: missing titles, wordy; hard to read slides; spelling or grammar errors; distracting material.4 pointsWeak title slide with title, student name, class and date. Slides have less than 10 errors to include: missing titles, wordy; hard to read slides; spelling or grammar errors; distracting material.2 pointsMissing title slide with title, student name, class and date. Slides have less than 15 errors to include: missing titles, wordy; hard to read slides; spelling or grammar errors; distracting material.0 pointsMissing title slide with title, student name, class and date. Slides have more than 15 errors to include: missing titles, wordy; hard to read slides; spelling or grammar errors; distracting material.Grammar and Punctuation2 pointsProvides at least 12 PowerPoint Slides1 pointProvides at least 10 PowerPoint Slides0 pointsProvides less than 10 PowerPoint slides0 pointsProvides less than 10 PowerPoint slides0 pointsProvides less than 10 PowerPoint slidesOverall ScoreLevel 514 or moreLevel 411 or moreLevel 38 or moreLevel 25 or moreLevel 10 or more
Leave a Reply
Want to join the discussion?Feel free to contribute!