Rubric Name: Paper #3: Compare / Contrast IT Security Policies (Rubric)

Rubric Name: Paper #3: Compare / Contrast IT Security Policies (Rubric)

Criteria Excellent Outstanding Acceptable Needs Improvement Needs Significant Improvement Missing or Unacceptable
Introduction or Overview for State Government IT Security Policies 10 points

Provided an excellent introduction or overview of IT Security Policies for the executive branch of state governments. Explained the purpose of an IT Security Policy and how it is used. Fully answered the question: why should every state in the nation  have a comprehensive IT Security Policy? Addressed the importance of such strategies to small, resource-poor states as well as to larger or more wealthy states. The overview appropriately used information from 3 or more authoritative sources.

8.5 points

Provided an outstanding introduction or overview of IT Security Policies for the executive branch of state governments. Explained the purpose of an IT Security Policy and how it is used. Addressed the question: why should every state in the nation  have a comprehensive IT Security Policy? Addressed the importance of such strategies to small, resource-poor states as well as to larger or more wealthy states.The overview appropriately used information from 2 or more authoritative sources.

7 points

Introduced IT security policies; explained the purpose of an IT security policy for state governments and how such policies are used. Addressed the question: why should every state have an IT security policy? Mentioned the importance of such policies to small, resource-poor states as well as to larger or wealthier states. The overview appropriately used information from 1 or more authoritative sources.

6 points

Provided an overview of IT security policies but the section lacked important details. Information from authoritative sources was cited and used in the overview.

4 points

Attempted to provide an introduction to the paper but this section lacked detail and/or was not well supported by information drawn from authoritative sources.

0 points

The introduction and/or overview sections of the paper were off topic.

Common Principles / Policies / Guidance between the two IT Security Policies 10 points

Provided an excellent discussion of the common principles and policies (similarities) found in both IT security policies. Correctly identified the two states used for the analysis. Provided 5 or more specific examples of content which was similar between the two documents. Appropriately used information from 3 or more authoritative sources.

8.5 points

Provided an outstanding discussionof the common principles and policy sections / statements (similarities) found in both IT security policy documents. Correctly identified the two states used for the analysis. Provided 4 or more specific examples of content which was similar between the two documents.Appropriately used information from 2 or more authoritative sources.

7 points

Provided a discussionof the common principles and policy sections / statements (similarities) found in both IT security policy documents. Correctly identified the two states used for the analysis. Provided 3 or more specific examples of content which was similar between the two documents. Appropriately used information from 1 or more authoritative sources.

6 points

Provided a discussion of similarities between the two documents including at least two examples. Correctly identified the two states. Appropriately used information from authoritative sources.

4 points

Provided a discussion of similarities between the two documents including at least one example. The discussionlacked detail and/or was not well supported by information drawn from authoritative sources.

0 points

This section was missing, off topic, or failed to provide information about similarities in the two documents.

Unique Aspects of State #1’s IT Security Policy 15 points

Provided an excellent discussion of the unique aspects of the IT Security Policy for state #1. Provided 5 or more examples of specific principles or guidelines or other content which were unique to the policy document. Appropriately used information from 3 or more authoritative sources.

14 points

Provided an outstanding discussion of the unique aspects of the IT Security Policy for state #1. Provided 4 or more examples of specific principles or guidelines or other content which were unique to the policy document. Appropriately used information from 2 or more authoritative sources.

13 points

Provided a discussion of the unique aspects of the IT Security Policy for state #1. Provided 3 or more examples of specific principles or guidelines or other content which were unique to the policy document. Appropriately used information from 1 or more authoritative sources.

11 points

Provided a brief discussion of the unique aspects of the IT Security Policy for state #1. Provided 2 or more examples of specific principles or guidelines or other content which were unique to the policy document. Appropriately used information from authoritative sources.

4 points

Mentioned unique aspects of the IT Security Policy for state #1. The discussion lacked detail and/or was not well supported by information drawn from authoritative sources.

0 points

This section was missing, off topic, or failed to provide information about unique aspects of the IT Security Policy document.

Unique Aspects of State #2’s IT Security Policy 15 points

Provided an excellent discussion of the unique aspects of the IT Security Policy for state #2. Provided 5 or more examples of specific principles or guidelines or other content which were unique to the policy document. Appropriately used information from 3 or more authoritative sources.

14 points

Provided an outstanding discussion of the unique aspects of the IT Security Policy for state #2. Provided 4 or more examples of specific principles or guidelines or other content which were unique to the policy document. Appropriately used information from 2 or more authoritative sources.

13 points

Provided a discussion of the unique aspects of the IT Security Policy for state #2. Provided 3 or more examples of specific principles or guidelines or other content which were unique to the policy document. Appropriately used information from 1 or more authoritative sources.

11 points

Provided a brief discussion of the unique aspects of the IT Security Policy for state #2. Provided 2 or more examples of specific principles or guidelines or other content which were unique to the policy document. Appropriately used information from authoritative sources.

4 points

Mentioned unique aspects of the IT Security Policy for state #2. The discussion lacked detail and/or was not well supported by information drawn from authoritative sources.

0 points

This section was missing, off topic, or failed to provide information about unique aspects of the IT Security Policy document.

Evaluation and Best Practice Based Recommendations for Improvements 10 points

Provided a well reasoned and appropriately justified evaluation of which state’s IT Security Policy was the better of the two documents. Presented an excellent summary for 5 or more best practice based recommendations for improvements to both IT Security Policies. Answered the question: How can these policies be improved? Appropriately used information from 3 or more authoritative sources.

8.5 points

Provided an evaluation of which state’s IT Security Policy was the better of the two documents. Presented an outstanding summary for 3 or more best practice based recommendations for improvements to both IT Security Policies. Answered the question: How can these policies be improved? Appropriately used information from 2 or more authoritative sources.

7 points

Provided an evaluation of which state’s IT Security Policy was the better of the two documents. Presented a summary of best practice based recommendations for improvements to both IT Security Policies. Answered the question: How can these policies be improved? Appropriately used information from 1 or more authoritative sources.

6 points

Discussion provided some information about best practices for IT Security Policies and mentioned recommendations for improving the current policy documents. Mentioned information obtained from authoritative sources.

4 points

Discussion provided some information about best practices for IT security policies, but the lacked detail and/or was not supported by information from authoritative sources.

0 points

Did not address best practices for IT security policies.

Summary of Research and Recommendations 10 points

Provided an excellent summary of the research and recommendations for this deliverable. Summary was clear, concise, and accurate. Appropriately used information from authoritative sources.

8.5 points

Provided an outstanding summary of the research and recommendations for this deliverable. Summary was clear and accurate. Appropriately used information from authoritative sources.

7 points

Provided an acceptable summary of the research and recommendations for this deliverable. Appropriately used information from authoritative sources.

6 points

Provided a summary section but, this section was disorganized or lacked relevant details. Mentioned information from authoritative sources.

4 points

Attempted to provide a summary for this deliverable. But, the summary was not relevant to the deliverable. OR, this section was not well supported by information from authoritative sources.

0 points

The summary was missing.

Professionalism: Addressed security issues using standard cybersecurity terminology 5 points

Demonstrated excellence in the integration of standard cybersecurity terminology into the case study.

4 points

Provided an outstanding integration of standard cybersecurity terminology into the case study.

3 points

Integrated standard cybersecurity terminology into the into the case study

2 points

Used standard cybersecurity terminology but this usage was not well integrated with the discussion.

1 point

Misused standard cybersecurity terminology.

0 points

Did not integrate standard cybersecurity terminology into the discussion.

Professionalism: APA Formatting for Citations and Reference List 5 points

Work contains a reference list containing entries for all cited resources. Reference list entries and in-text citations are correctly formatted using the appropriate APA style for each type of resource.

4 points

Work contains a reference list containing entries for all cited resources. One or two minor errors in APA format for in-text citations and/or reference list entries.

3 points

Work contains a reference list containing entries for all cited resources. No more than 3 minor errors in APA format for in-text citations and/or reference list entries.

2 points

Work has no more than three paragraphs with omissions of citations crediting sources for facts and information. Work contains a reference list containing entries for cited resources. Work contains no more than 5 minor errors in APA format for in-text citations and/or reference list entries.

1 point

Work attempts to credit sources but demonstrates a fundamental failure to understand and apply the APA formatting standard as defined in the Publication Manual of the American Psychological Association (6th ed.).

0 points

Reference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper.

Professionalism: Organization & Appearance 5 points

Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.

4 points

Submitted work has minor style or formatting flaws but still presents a professional appearance. Submitted work is well organized and appropriately uses color, fonts, and section headings (per the assignment’s directions).

3 points

Organization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved.

2 points

Submitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement.

1 point

Submitted work meets minimum requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance.

0 points

Submitted work is poorly organized and formatted. Writing and presentation are lacking in professional style and appearance. Work does not reflect college level writing skills.

Professionalism: Execution 15 points

No formatting, grammar, spelling, or punctuation errors.

14 points

Work contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance.

13 points

Errors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work.

11 points

Submitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance.

4 points

Submitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage.

0 points

Submitted work is poorly executed OR does not reflect college level work.

Overall Score Excellent 90 or more Outstanding 80 or more Acceptable 70 or more Needs Improvement 56 or more Needs Significant Improvement 36 or more Missing or Unacceptable 0 or more

Comments are closed.