Professional Documents
Culture Documents
rends and Projects in Computer Networks and Cybersecurity (2222) - UMGC Learnin…
1.1.3: Present ideas Presents a logical flow Presents ideas in a Attempts to present Does not present ideas / 10
of ideas that is easily clear, logical order ideas, but the logic is in a clear, logical order
in a clear, logical
identifiable and appropriate to the not clear and/or not appropriate to the
order appropriate completely appropriate task. appropriate to the task.
to the task. to the task. task.
2.1.3: Explain the Explains the Explains the Attempts to explain Does not explain the / 10
significance of the significance of the the significance of the significance of the
significance of the
issue or problem issue or problem. issue or problem, but issue or problem.
issue or problem. succinctly and the explanation is not
thoroughly. clear or is not
appropriate for the
context.
4.2.4: Prepare a Prepares a polished Prepares a finished Attempts to prepare a Does not prepare a / 10
and thorough finished team work product. team work product but finished team work
finished teamwork
team work product. it is not fully finished product.
product. or polished.
10.1.1: Identify the Presents a relevant IT Presents an IT problem Identifies an IT Does not identify an IT / 10
problem clearly and that requires a problem but may lack problem to be solved.
problem to be
specifically. solution. clarity and/or
solved. specificity regarding
the need to be
addressed.
https://learn.umgc.edu/d2l/lms/dropbox/user/folder_submit_files.d2l?db=1217709&grpid=0&isprv=0&bp=0&ou=631808 1/7
4/17/22, 11:28 AM Project 4: The Cybersecurity Threat Landscape Team Assignment - CMIT 495 7383 Current Trends and Projects in Computer Networks and Cybersecurity (2222) - UMGC Learnin…
12.6.1: Identify the Thoroughly explains in Identifies the controls Identifies some Does not identify the / 10
detail the controls needed for controls for controls needed for
controls needed for
needed for confidentiality. confidentiality, but confidentiality.
confidentiality. confidentiality. there are gaps in the
explanation, and/or
the explanation may
not be completely
accurate.
12.6.2: Identify the Thoroughly explains in Identifies the controls Identifies some Does not identify the / 10
detail the controls needed for integrity. controls for integrity, controls needed for
controls needed for
needed for integrity. but there are gaps in integrity.
integrity. the explanation,
and/or the explanation
may not be completely
accurate.
12.6.3: Identify the Thoroughly explains in Identifies the controls Identifies some Does not identify the / 10
detail the controls needed for availability. controls for controls needed for
controls needed for
needed for availability. availability, but there availability.
availability. are gaps in the
explanation, and/or
the explanation may
not be completely
accurate.
12.7.2: Explain the Provides detailed and Explains the process of Attempts to explain Does not explain the / 10
comprehensive analyzing IT incidents. the process of process of analyzing IT
process of
explanations about the analyzing IT incidents, incidents.
analyzing IT process of analyzing IT but some analysis is
incidents. incidents. incomplete or
inaccurate, or detail is
lacking.
14.1.1: Explain Provides detailed Explains how ethical Attempts to explain Does not explain how / 10
explanations about principles used in the how ethical principles ethical principles used
how ethical
how ethical principles information used in the in the information
principles used in used in the technology industry information technology industry
the information information apply to the welfare technology industry apply to the welfare
technology technology industry and safety of apply to the welfare and safety of
industry apply to apply to the welfare stakeholders and and safety of stakeholders and
and safety of society. stakeholders and society.
the welfare and
stakeholders and society but does not
safety of society. articulate the issues
stakeholders and clearly or thoroughly.
society.
https://learn.umgc.edu/d2l/lms/dropbox/user/folder_submit_files.d2l?db=1217709&grpid=0&isprv=0&bp=0&ou=631808 2/7
4/17/22, 11:28 AM Project 4: The Cybersecurity Threat Landscape Team Assignment - CMIT 495 7383 Current Trends and Projects in Computer Networks and Cybersecurity (2222) - UMGC Learnin…
Total / 100
Overall Score
https://learn.umgc.edu/d2l/lms/dropbox/user/folder_submit_files.d2l?db=1217709&grpid=0&isprv=0&bp=0&ou=631808 3/7