You are on page 1of 3

4/17/22, 11:28 AM Project 4: The Cybersecurity Threat Landscape Team Assignment - CMIT 495 7383 Current Trends and

rends and Projects in Computer Networks and Cybersecurity (2222) - UMGC Learnin…

Project 4: The Cybersecurity Threat Landscape Team Assignment


Course: CMIT 495 7383 Current Trends and Projects in Computer Networks and Cybersecurity (2222)

Exceeds Meets Approaches Does not Meet


Evaluation Criteria 10 points 8.5 points 7.5 points 0 points
Criterion Score

1.1.3: Present ideas Presents a logical flow Presents ideas in a Attempts to present Does not present ideas / 10
of ideas that is easily clear, logical order ideas, but the logic is in a clear, logical order
in a clear, logical
identifiable and appropriate to the not clear and/or not appropriate to the
order appropriate completely appropriate task. appropriate to the task.
to the task. to the task. task.

2.1.3: Explain the Explains the Explains the Attempts to explain Does not explain the / 10
significance of the significance of the the significance of the significance of the
significance of the
issue or problem issue or problem. issue or problem, but issue or problem.
issue or problem. succinctly and the explanation is not
thoroughly. clear or is not
appropriate for the
context.

4.1.1: Establish a Establishes an Establishes a Attempts to establish Does not establish a / 10


inclusive and highly collaborative approach an approach for collaborative approach
collaborative
collaborative approach for working together working together as a for working together
approach for for working together as a team. team, but it is not fully as a team.
working together as a team. collaborative and/or
as a team. inclusive.

4.2.4: Prepare a Prepares a polished Prepares a finished Attempts to prepare a Does not prepare a / 10
and thorough finished team work product. team work product but finished team work
finished teamwork
team work product. it is not fully finished product.
product. or polished.

10.1.1: Identify the Presents a relevant IT Presents an IT problem Identifies an IT Does not identify an IT / 10
problem clearly and that requires a problem but may lack problem to be solved.
problem to be
specifically. solution. clarity and/or
solved. specificity regarding
the need to be
addressed.

https://learn.umgc.edu/d2l/lms/dropbox/user/folder_submit_files.d2l?db=1217709&grpid=0&isprv=0&bp=0&ou=631808 1/7
4/17/22, 11:28 AM Project 4: The Cybersecurity Threat Landscape Team Assignment - CMIT 495 7383 Current Trends and Projects in Computer Networks and Cybersecurity (2222) - UMGC Learnin…

Exceeds Meets Approaches Does not Meet


Evaluation Criteria 10 points 8.5 points 7.5 points 0 points
Criterion Score

12.6.1: Identify the Thoroughly explains in Identifies the controls Identifies some Does not identify the / 10
detail the controls needed for controls for controls needed for
controls needed for
needed for confidentiality. confidentiality, but confidentiality.
confidentiality. confidentiality. there are gaps in the
explanation, and/or
the explanation may
not be completely
accurate.

12.6.2: Identify the Thoroughly explains in Identifies the controls Identifies some Does not identify the / 10
detail the controls needed for integrity. controls for integrity, controls needed for
controls needed for
needed for integrity. but there are gaps in integrity.
integrity. the explanation,
and/or the explanation
may not be completely
accurate.

12.6.3: Identify the Thoroughly explains in Identifies the controls Identifies some Does not identify the / 10
detail the controls needed for availability. controls for controls needed for
controls needed for
needed for availability. availability, but there availability.
availability. are gaps in the
explanation, and/or
the explanation may
not be completely
accurate.

12.7.2: Explain the Provides detailed and Explains the process of Attempts to explain Does not explain the / 10
comprehensive analyzing IT incidents. the process of process of analyzing IT
process of
explanations about the analyzing IT incidents, incidents.
analyzing IT process of analyzing IT but some analysis is
incidents. incidents. incomplete or
inaccurate, or detail is
lacking.

14.1.1: Explain Provides detailed Explains how ethical Attempts to explain Does not explain how / 10
explanations about principles used in the how ethical principles ethical principles used
how ethical
how ethical principles information used in the in the information
principles used in used in the technology industry information technology industry
the information information apply to the welfare technology industry apply to the welfare
technology technology industry and safety of apply to the welfare and safety of
industry apply to apply to the welfare stakeholders and and safety of stakeholders and
and safety of society. stakeholders and society.
the welfare and
stakeholders and society but does not
safety of society. articulate the issues
stakeholders and clearly or thoroughly.
society.

https://learn.umgc.edu/d2l/lms/dropbox/user/folder_submit_files.d2l?db=1217709&grpid=0&isprv=0&bp=0&ou=631808 2/7
4/17/22, 11:28 AM Project 4: The Cybersecurity Threat Landscape Team Assignment - CMIT 495 7383 Current Trends and Projects in Computer Networks and Cybersecurity (2222) - UMGC Learnin…

Total / 100

Overall Score

Exceeds Meets Approaches Does not Meet


90 points minimum
80 points minimum
70 points minimum
0 points minimum

https://learn.umgc.edu/d2l/lms/dropbox/user/folder_submit_files.d2l?db=1217709&grpid=0&isprv=0&bp=0&ou=631808 3/7

You might also like