Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Research 1

Review rubric and document 

6/13/24, 5:56 PMRubric Assessment – CSIA 300 6982 Cybersecurity for Leaders and Managers (2245) – UMGC Learning Management System

Page 1 of 1

Discussion Rubric CSIA
Course: CSIA 300 6982 Cybersecurity for Leaders and Managers (2245)

Total

Overall Score

Criteria Exceeds Meets Needs Improvement Does Not Meet Criterion Score

Quality of the Initial

Post: Expresses

coherent, well-

reasoned thinking as

supported by evidence

included in the

discussion post.

Accuracy: Specifically

addresses topics and/or

questions in the

discussion instructions.

/ 15

Quality and frequency

of interactions:

Responses in the 2

replies are substantive

and add value and

advance the

conversation.

/ 15

Timeliness: Posts initial

response by before

Sunday at 11:59 PM ET

and additional critiques

and follow-up

responses by Tuesday

at 11:59 ET.

/ 10

15 points

Posts a complete, and

coherent initial response

to the discussion prompt

that fully addresses all

the elements of the

discussion topic or

question.

Posts ideas that address

assigned topics and/or

questions and

demonstrates a creative

approach.

10 points

Posts a somewhat

coherent response to the

initial discussion topic,

but the response is

missing major points.

5 points

Covers some aspects of

the question(s) posed,

thoughts are mostly

clearly expressed or well

thought-out, but not all.

May contain some helpful

follow-through. Missing

attribution to the text or

sources where

appropriate.

0 points

Did not post or

mischaracterized

concepts or facts related

to course content. Did

not present a discernible

or reasonable logic.

15 points

Respectfully responds to

peers and/or instructor in

a timely fashion and adds

value to the conversation

by providing constructive

feedback, asking follow-

up questions, and

presenting thoughtful,

reflective comments.

Posts are timely and meet

expectations for the

frequency of posts.

10 points

Responds to a fellow

student, adding some

value to the discussion.

5 points

Peer responses have

some or minimal relevant

content, and/or are off-

topic, and/or contain(s)

no relevant information.

0 points

Does not post a response

to the topic assignment.

10 points

Posts complete and

timely responses to the

discussion topic or

question.

7 points

May miss set deadlines or

lack a sufficient number

of posts.

3 points

Did not post or respond

during the time period

allowed.

0 points

Did not post and did not

respond during the time

period allowed.

Exceeds
40 points minimum

Meets
30 points minimum

Needs Improvement
20 points minimum

Does not meet
0 points minimum

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

VIII

see attached Project 4 includes two labs, Lab 9 and Lab 10. Lab 9 Assignment: Conducting Forensic Investigations on Network Infrastructure. Locate and complete Lab 9: Conducting Forensic Investigations on Network Infrastructure. Upon completion of Section 2 of the lab, you are required to provide the deliverables listed below. Note:

Information Systems assignment 1

Page 1 of 2 Background iPremier (A), iPremier (B), and iPremier (C) cases describe an IT security crisis, and raise issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure of security risks. After you experience the cases and debrief what you have learned, you

Deliverable 6 – Project Close-Out Reports item options

Assignment Content 1. Top of Form Competency · Analyze metrics for information technology projects. Student Success Criteria View the grading rubric for this deliverable by selecting the “This item is graded with a rubric” link, which is located in the Details & Information pane. Scenario The Project Manager for GDS

Deliverable 3 – Art Event for Workplace Colleagues

Assignment Content 1. Top of Form Competency Utilize art elements in real-world contexts and the workplace. Student Success Criteria View the grading rubric for this deliverable by selecting the “This item is graded with a rubric” link, which is located in the Details & Information pane. Scenario Your workplace has

Deliverable 2 – Grant Proposal Summary

Assignment Content 1. Top of Form Competency Identify the role of music, poetry, prose, and visual art in the modern world and workplace. Student Success Criteria View the grading rubric for this deliverable by selecting the “This item is graded with a rubric” link, which is located in the Details

Deliverable 1 – Timeline of Major Periods in Art

Assignment Content 1. Top of Form Competency Determine the historical impact of art on modern culture, society, and the workplace. Student Success Criteria View the grading rubric for this deliverable by selecting the “This item is graded with a rubric” link, which is located in the Details & Information pane.

Anti-Forensic Techniques

 Discuss anti-forensics techniques and explain how to detect steganography, hidden data in file system structures, trail obfuscation, and file extension mismatch. 

2 peer responses

Review the discussion posts and select two peers to respond to. Your two peer responses should be substantive. Substantive responses are those that further develop the topic and pursue an understanding of the domain. Simple messages that offer agreement or simple encouragement are considered conversant, but are not considered substantive.

VII

see attached Project 3 includes two labs, Lab 5, and Lab 6. Lab 5 Assignment: Conducting Forensic Investigations on Windows Systems. Locate and complete Lab 5: Conducting Forensic Investigations on Windows Systems. Upon completion of Section 2 of the lab, you are required to provide the deliverables listed below. Note:

Research

Creating a plan  Competencies 7035.1.1  :  Health Information Systems and Business Process The graduate explains how information systems affect business processes within the healthcare industry. 7035.1.2 :  Systems Development The graduate analyzes the different methods of system development for the purpose of recommending an appropriate method for a project. 7035.1.3 :  Health Information

Technology Leader

The topic is Katherine Johnson Katherine Johnson, an American mathematician, played a crucial role in NASA’s space missions. She excelled at orbital mechanics calculations and pioneered the use of computers. During her 33-year tenure at NASA, Johnson calculated trajectories, launch windows, and emergency return courses for the Project Mercury, Apollo

V

What are some nefarious purposes that stenography could be used for in the commission of a cybercrime? Do you think that stenography is a major security concern? Explain why or why not. Discuss what legitimate reasons a person would have for hiding data inside of an image, video, or audio

Computer Hardware & Software Project

Computer Hardware & Software Project OBJECTIVES: Successful completion of this assignment demonstrates your understanding of the following course level outcomes: 1. Explain the functions of hardware, software, data, procedures, and people in a business computer system. 2. Identify the major hardware elements of a computer system and describe the purpose

IV

see attached Lab 3 Assignment: Recovering Deleted and Damaged Files Locate and complete Lab 3: Recovering Deleted and Damaged Files. Upon completion of Section 2 of the lab, you are required to provide the deliverables listed below. Note: You do not have to complete Section 3 of the lab. 1.

Forensics

see attached. Unit III Project Project 1 includes two labs, Lab 1 and Lab 2. Lab 1 Assignment: Applying the Daubert Standard to Forensic Evidence Locate and complete Lab 1: Recognizing the Use of Steganography in Forensic Evidence. Upon completion of Section 2 of the lab, you are required to

Capstone Project: CSIS 474

Capstone Project: Project Management Assignment CSIS 474 Capstone Project Overview The objective of the final Capstone Project is to assess your knowledge on the learning objectives for the information technology program. All assignments in this course will build upon one another and provide you with different components for your Capstone

Input Device Dialogue

The choice of an appropriate input device for a product is often based on both the type of device being used and the target market for that device. For instance, a device targeted to college students and one targeted to older individuals may use different input methods. Suppose that you

Case Study-2

 Assessment 3:   This file is too large to display.View in new window