SIT763: CYBER SECURITY MANAGEMENT Risk Analysis & Assessment Corporate Mission Statements 2 Academic Integrity Policy Life Cycle…

FIND A SOLUTION AT Academic Writers Bay

SIT763: CYBER SECURITY MANAGEMENT
Assessment 4 rubric: individual critical thinking (task 2)
CRITERIA
PERFORMANCE INDICATOR
Fail 0-49
Pass 50-59
Credit 60-69
Distinction 70-79
High distinction 80-100
Task
Task 1: Compliance to Australian Notifiable Data
Breaches (NDB) scheme
Missing or provides no
meaningful
Answer is not provided for each of
the following in students’ own
words together with a reference:
(i)Reason incident would be
classified as an eligible data breach.
(ii)How assessment is to be
performed following eligible data
breach.
(iii)Stated time for compliance
assessment.
(iv)To whom and how notification
of data breach will be
communicated.
Answer is not clearly related to
learning material and lacks support
from the theory. Less than 4
references to Australian NDB
scheme are included.
Answer is provided for each of the
following in students’ own words
together with a reference:
(i)Reason incident would be
classified as an eligible data
breach.
(ii)How assessment is to be
performed following eligible data
breach.
(iii)Stated time for compliance
assessment.
(iv)To whom and how notification
of data breach will be
communicated.
Answer is not clear in
demonstrating understanding of
learning material and lacks
support from the theory. Less
than 4 references to Australian
NDB scheme are included.
Answer is provided for each of
the following in students’ own
words together with a
reference:
(i)Reason incident would be
classified as an eligible data
breach.
(ii)How assessment is to be
performed following eligible
data breach.
(iii)Stated time for compliance
assessment.
(iv)To whom and how
notification of data breach will
be communicated.
Answer is clear without
ambiguity and shows well
developed understanding of
learning material supported
clearly by theory including 4
references to Australian NDB
scheme.
Answer is provided for each of the
following in students’ own words
together with a reference:
(i)Reason incident would be
classified as an eligible data breach.
(ii)How assessment is to be
performed following eligible data
breach.
(iii)Stated time for compliance
assessment.
(iv)To whom and how notification of
data breach will be communicated.
Answer is clear without ambiguity
and shows excellent understanding
of learning material supported
clearly by theory including 4
references to Australian NDB
scheme.
information related to the
task.
The answer does not exceed 500
words
20-23 marks
The answer does not exceed 500
words
24-27 marks
The answer does not exceed 500
words
28-31 marks
The answer does not exceed 500
words
32-40 marks
Task 2:
Incident
Manage
ment and
Missing or provides no
meaningful
Less than 2 of the NIST incident
response lifecycle steps are defined
and explained by the diagram.
Less than 4 of the NIST incident
response lifecycle steps are
defined and explained by the
diagram.
The 4 NIST incident response
lifecycle steps are defined and
explained by the diagram in
your own words.
The 4 NIST incident response
lifecycle steps are defined and
explained by the diagram in your
own words.
Total 40
marks
0-19 marks
The diagram shows an incomplete
or illogical representation of the
phases that can be followed in the
event of a ransomware attack.
It is clear the document provided
has not been critically analysed and
synthesised.
The answer is not properly
referenced.
The diagram shows an incomplete
or illogical representation of the
phases that can be followed in the
event of a ransomware attack.
It is not clear the document
provided has been critically
analysed and synthesised.
The answer is not properly
referenced.
The diagram shows a logical
representation of the phases
that can be followed in the
event of a ransomware attack.
It is clear the document
provided has been critically
analysed and synthesised.
The answer is properly cited and
referenced.
The diagram shows a logical
representation of the phases that
can be followed in the event of a
ransomware attack.
It is clear the reference document
provided has been critically
analysed and synthesised.
An example for readiness and
response and remediation are
provided by the diagram.
The answer is properly cited and
referenced.
information related to the
task.
Answer is ambiguous and shows
basic understanding of the learning
material, unsupported by theory
and application of critical thinking
skills.
Answer is ambiguous and shows
partial understanding of the
learning material, unsupported by
theory and application of critical
thinking skills.
Answer is clear without
ambiguity and shows excellent
understanding of learning
material supported clearly by
theory and application of critical
thinking skills.
Answer is clear without ambiguity
and shows outstanding
understanding of learning material
supported clearly by theory and
application of critical thinking skills.
Total 40
marks
0-19 marks
20-23 marks
24-27 marks
28-31 marks
32-40 marks
Task 3: Ransomware Attack Procedure
Missing or provides no
meaningful information
related to the task.
Answer provides basic
understanding of what a
ransonware incident would look
like for Transcon.
The steps describing a scenario of
how a ransomware attack could
occur is identified and explained
using the Transcon SAD.
Scenario is not justified using a
citation and reference to the
related assets impacted by the
ransomware attack in the SAD.
Answer does not clearly identify the
definition of a cyber security
procedure.
The procedure does not include
what to report, when to report,
where to report and who to report
to.
Answer is not supported and
justified by at least 2 citations and
references.
The writing style does not show
critical thinking for Transcon
management to have confidence in
terms of protecting users from
ransomware attacks.
Answer provides partial
understanding of what a
ransonware incident would look
like for Transcon.
The steps describing a scenario of
how a ransomware attack could
occur is identified and using the
Transcon SAD.
Scenario is justified using a
citation and reference to the
related assets impacted by the
ransomware attack in the SAD.
Answer clearly identifies the
definition of a cyber security
procedure.
The procedure includes what to
report, when to report, where to
report and who to report to.
Answer is supported and justified
by at least 2 citations and
references.
The writing style shows
outstanding critical thinking for
Transcon management to have
confidence in terms of protecting
users from ransomware attacks.
Answer provides clear
understanding of what a
ransonware incident would look
like for Transcon.
The steps describing a scenario
of how a ransomware attack
could occur is identified and
explained using the Transcon
SAD.
Scenario is justified using a
citation and reference to the
related assets impacted by the
ransomware attack in the SAD.
Answer clearly identifies the
definition of a cyber security
procedure.
The procedure includes what to
report, when to report, where
to report and who to report to.
Answer is supported and
justified by at least 2 citations
and references.
The writing style shows
excellent critical thinking for
Transcon management to have
confidence in terms of
protecting users from
ransomware attacks.
Answer provides clear
understanding of what a
ransonware incident would look like
for Transcon.
The steps describing a scenario of
how a ransomware attack could
occur is identified and explained
using the Transcon SAD.
Scenario is justified using a citation
and reference to the related assets
impacted by the ransomware attack
in the SAD.
Answer clearly identifies the
definition of a cyber security
procedure.
The procedure includes what to
report, when to report, where to
report and who to report to.
Answer is supported and justified by
at least 2 citations and references.
The writing style shows outstanding
critical thinking for Transcon
management to have confidence in
terms of protecting users from
ransomware attacks.
Total 20
marks
0-9 marks
10-11 marks
12-13 marks
14-15 marks
16-20 marks

YOU MAY ALSO READ ...  Project management 29 Geotechnics & Soil Mechanics PSIDDIQUI – Assessment 2 Ethical and Legal Issues in Healthcare BABS Foundati...
Order from Academic Writers Bay
Best Custom Essay Writing Services

QUALITY: 100% ORIGINAL PAPERNO PLAGIARISM – CUSTOM PAPER