Monday, 7 September 2020

Six Case Study Analysis Guidelines and Rubric

 





IT 380 Module Six Case Study Analysis Guidelines and Rubric 

 

Overview: This case study will help you analyze a cyber security scenario and identify which tenets were violated. Each skill in this paper is an essential part of the final project and accompanying milestones in this course. 

 

Prompt: Choose either the Home Depot security breach or Target security breach from the articles below. Use the information provided to analyze the cyber security occurrence, determine which principles were violated, and recommend appropriate policies to prevent recurrence. Review the Module Six resources to complete this assignment. 

 

After reviewing the details surrounding these two major breaches and the information from Test Out from this module, answer the following questions. Select either the Home Depot breach or Target breach as your exemplar. 

 

 Which tenets of cyber security were violated in the breach? How were those attacks executed to bypass network defenses?  What elements of network defense would have helped mitigate or prevent the breach?  What elements of data defense would have helped mitigate or prevent the breach?  What best practices would you recommend going forward to better secure the organization—both for overall defense and also to provide better detection? 

 

Based on the Test Out sections from this module and the additional module resource articles that you reviewed, your paper should address the following critical elements: 

 

 Identification of cyber security tenets that were violated and rationale of cause  Analysis of data defense that would have helped mitigate or prevent this breach  Recommendation of best practices to secure organization going forward 

 

  


 

 

Rubric 

 

Guidelines for Submission: Your paper should be submitted as a 2‐ to 3‐page (in addition to the cover and reference pages) Microsoft Word document with double spacing, 12‐point Times New Roman font, and one‐inch margins. All sources must be cited in APA format. 

 

Critical Elements Exemplary (100%) Proficient (90%) Needs Improvement (70%) Not Evident (0%) Value Identification of Violated Cybersecurity Tenets Meets “Proficient” criteria and correctly identifies which tenets were violated, with empirical supporting examples Correctly identifies which tenets were violated with supporting examples Identifies which tenets were violated but supporting examples have gaps Does not identify which tenets were violated 30 Analysis of Data Defense Meets “Proficient” criteria and analysis demonstrates keen insight of data defense and prevention methods Analysis demonstrates accurate knowledge of data defense and prevention methods Analysis demonstrates knowledge of data defense methods but needs additional information to support prevention ideas Does not analyze the data defense and prevention methods 30 Best Practices Recommendation Meets “Proficient” criteria and recommendation demonstrates understanding of industry best practices that would remedy the situation appropriately Recommends industry best practices to ensure proper resolution of scenario Recommends a single best practice to remedy situation but recommendation has gaps in strategic implementation Does not recommend any industry best practices 30 Proper Use of Writing, Mechanics, and Grammar Paper is free of errors in organization and grammar with applicable sources cited Paper is mostly free of errors of organization and grammar; errors are marginal and rarely interrupt the flow; cites applicable sources Paper contains errors of organization and grammar but errors are limited enough so that assignments can be understood; cites applicable sources Paper contains errors of organization and grammar making the content difficult to understand 10 Total 100% 

UK assignment helper

Author & Editor

We are the best assignment writing service provider in the UK. We can say it with pride that we tend to perceive our client’s requirements better than any other company. We provide assignment writing service in 100+ subjects.

0 comments:

Post a Comment