Project 2: VM Scanner Evaluation Background Report
Top of Form
Hide Assignment Information | ||
Turnitin™ | ||
This assignment will be submitted to Turnitin™. | ||
Instructions | ||
This week, you will submit the second project, VM Scanner Background Report, based on the Nessus Report. As you are writing your report, you may want to refer back to the CEO’s video in Week 1 to make sure your analysis and recommendations align with the CEO’s prioritiess and concerns.
This project should be four to six pages in length and include a title/cover page. Include in-text citations and a reference page with three quality sources in a citation style of your choice. You should link your analysis to the kinds of organizational functions and data associated with a transportation company (e.g., protecting order data, customer lists, sales leads, Payment Card Industry (PCI) compliance for processing credit, proprietary software, etc.) and provide your recommendation if Mercury USA should purchase the Nessus tool. This report should be four to six pages in length and include a title/cover page. Include in-text citations and a reference page with three quality sources in a citation style of your choice.
If you haven’t already downloaded it last week, download the VM Scanner Background Report Template now and follow the instructions in the document. Delete the instructional text from the template before you submit. When you are finished, click “add a file” to upload your work, then click the Submit button. |
||
Due on Jul 16, 2024 11:59 PM |
Hide Rubrics
Rubric Name: Project 2: VM Scanner Evaluation Background Report
Evaluation Criteria | Exceeds Performance Requirements 100% | Meets Performance Requirements 85% | Approaches Performance Requirements 75% | Does Not Meet Performance Requirements 0% | Criterion Score |
1.3.1: Identify potential sources of information that can be used to develop and support ideas. | 12 points
Identifies potential sources of information in a thorough and accurate manner to develop and support ideas |
10.2 points
Identifies potential sources of information to develop and support ideas. |
9 points
Attempts to identify potential sources of information to develop and support ideas. |
0 points
Does not identify potential sources of information to develop and support ideas. |
Score of 1.3.1: Identify potential sources of information that can be used to develop and support ideas.,
/ 12 |
1.4.1: Produce grammatically correct material in standard academic English that supports the communication. | 12 points
Produces grammatically correct material in flawless standard academic English that fully supports the communication. |
10.2 points
Produces grammatically correct material in standard academic English that supports the communication. |
9 points
Attempts to produce grammatically correct material in standard academic English, but mistakes in some areas affect the credibility of the communication. |
0 points
Does not produce grammatically correct material, and the mistakes hamper the communication. |
Score of 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.,
/ 12 |
10.1.1: Identify the problem to be solved. | 19 points
Presents a relevant IT problem clearly and specifically. |
16.15 points
Presents an IT problem that requires a solution. |
14.25 points
Identifies an IT problem but may lack clarity and/or specificity regarding the need to be addressed. |
0 points
Does not identify an IT problem to be solved. |
Score of 10.1.1: Identify the problem to be solved.,
/ 19 |
12.2.1: Identify systems for the risk assessment. | 19 points
Clearly identifies the most critical vulnerabilities with the system and accurately describes the security issues that need to be addressed. |
16.15 points
Identifies most of the vulnerabilities with the system and describes most of the security issues that need to be addressed. |
14.25 points
Identifies some of the vulnerabilities with the system and describes some of the security issues that need to be addressed. |
0 points
Does not address the vulnerabilities with the system and does not describe the security issues that need to be addressed. |
Score of 12.2.1: Identify systems for the risk assessment.,
/ 19 |
12.3.1: Select controls. | 19 points
Selects highly effective controls. |
16.15 points
Selects appropriate controls. |
14.25 points
Selects some appropriate controls. |
0 points
Does not select appropriate controls. |
Score of 12.3.1: Select controls.,
/ 19 |
13.2.1: Evaluate vendor recommendations in the context of organization requirements. | 19 points
Evaluate and provides detailed justification for vendor recommendations in the context of organization requirements. |
16.15 points
Explains how ethical principles used in the information technology industry apply to the welfare and safety of stakeholders and society. |
14.25 points
Attempts to explain how ethical principles used in the information technology industry apply to the welfare and safety of stakeholders and society but does not articulate the issues clearly or thoroughly. |
0 points
Does not explain how ethical principles used in the information technology industry apply to the welfare and safety of stakeholders and society. |
Score of 13.2.1: Evaluate vendor recommendations in the context of organization requirements.,
/ 19 |
Total
Score of Project 2: VM Scanner Evaluation Background Report,
/ 100
Overall Score
Level 4
90 points minimum
Level 3
80 points minimum
Level 2
70 points minimum
Level 1
0 points minimum
Associated Learning Objectives | |
1.3.1: Identify potential sources of information that can be used to develop and support ideas. | |
Assessment Method: Score on Criteria – 1.3.1: Identify potential sources of information that can be used to develop and support ideas. | |
Required Performance: Meets Performance Requirements 85% | |
1.4.1: Produce grammatically correct material in standard academic English that supports the communication. | |
Assessment Method: Score on Criteria – 1.4.1: Produce grammatically correct material in standard academic English that supports the communication. | |
Required Performance: Meets Performance Requirements 85% | |
10.1.1: Identify the problem to be solved. | |
Assessment Method: Score on Criteria – 10.1.1: Identify the problem to be solved. | |
Required Performance: Meets Performance Requirements 85% | |
12.2.1: Identify systems for the risk assessment. | |
Assessment Method: Score on Criteria – 12.2.1: Identify systems for the risk assessment. | |
Required Performance: Meets Performance Requirements 85% | |
12.3.1: Select controls. | |
Assessment Method: Score on Criteria – 12.3.1: Select controls. | |
Required Performance: Meets Performance Requirements 85% | |
13.2.1: Evaluate vendor recommendations in the context of organization requirements. | |
Assessment Method: Score on Criteria – 13.2.1: Evaluate vendor recommendations in the context of organization requirements. | |
Required Performance: Meets Performance Requirements 85% |
Bottom of Form
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more