Student Solution

-->

"Education is the most powerful weapon which you can use to change the world”
– Nelson Mandela

1 University

1 Course

2 Subjects

Week 7 Structured External Assignment Proposal

Week 7 Structured External Assignment

Q Again, please see the Security Bid Proposal Download Security Bid Proposalfor an information security contract. Record (4 ) full pages of writing content explaining your proposal (not including PIC/Graphs) and include (1) page for an Excel budget sheet for financial purposes of the solutions you choose (Total of 5 pages due). Also required is a hard copy visual of a 5-10 PowerPoint slide presentation (not to be presented). If you don’t have PowerPoint just use Word and each page would be a slide. No APA requirement for this assignment. Rubric COT UG SEA Rubric COT UG SEA Rubric Criteria Ratings Pts This criterion is linked to a Learning OutcomeContent 20 to >19.0 pts Excellent Reveals a solid understanding of the proposed topic as evidenced by preliminary research and knowledge. 19 to >18.0 pts Good Identifies significant details of the proposed topic. Reveals an adequate understanding of the topic as evidenced by the amount of preliminary research. 18 to >15.0 pts Satisfactory Reveals a restricted understanding of the proposed topic. 15 to >13.0 pts Emerging Adds little detail to describe the proposed topic. 13 to >0 pts Unsatisfactory Does not identify the proposed topic. 20 pts This criterion is linked to a Learning OutcomeOrganization 20 to >19.0 pts Excellent Well-developed paragraphs. Sequencing enhances ideas and meaning. Ideas focused on central theme. 19 to >18.0 pts Good Smooth transition between paragraph with adequate structure and sequencing of ideas. 18 to >15.0 pts Satisfactory Transition between most paragraphs with limited paragraph structure. Sequence is not logical. 15 to >13.0 pts Emerging Some transition with poor paragraph structure and some evidence of planning. 13 to >0 pts Unsatisfactory No transition between paragraphs, ideas not in logical order. No structure to paragraphs. 20 pts This criterion is linked to a Learning OutcomeDevelopment 20 to >19.0 pts Excellent Ideas focus on the central theme. All ideas are clearly presented and unified. 19 to >18.0 pts Good Central theme is matched to the topic, most ideas explore the central theme, clear and unified. 18 to >15.0 pts Satisfactory Ideas are clear. Some ideas address the central theme. Central theme is linked to the topic. 15 to >13.0 pts Emerging Few idea address central theme. Ideas ramble and are difficult to identify. 13 to >0 pts Unsatisfactory Does not follow the theme with muddles unclear ideas. 20 pts This criterion is linked to a Learning OutcomeConventions 20 to >19.0 pts Conventions No errors noted. 19 to >18.0 pts Good 1 error -sentence structure -capitalization -grammar -presentation -general structure 18 to >15.0 pts Satisfactory 2-3 errors -sentence structure -capitalization -grammar -presentation -general structure 15 to >13.0 pts Emerging 4-5 errors -sentence structure -capitalization -grammar -presentation -general structure 13 to >0 pts Comventions Multiple errors -sentence structure -capitalization -grammar -presentation -general structure 20 pts This criterion is linked to a Learning OutcomeAPA Style 20 to >19.0 pts Excellent No Errors noted. 19 to >18.0 pts Good 1 error -cover page -in text citations -reference page -general format 18 to >15.0 pts Good 2-3 errors -cover page -in text citations -reference page -general format 15 to >13.0 pts Emerging 4-5 errors -cover page -in text citations -reference page -general format 13 to >0 pts Unsatisfactory Several errors in: -cover page -in text citations -reference page -general format 20 pts Total Points: 100 Previous

View Related Questions

Solution Preview

Every time we hear the term “data breach” most of us immediately think that someone or a multitude of people’s personal information was stolen and that it will no doubt be used with criminal intentions. There are other important things associated with the data breached that most of us probably don't think of. The aftermath or consequences that the victims of stolen data have to endure to get their life back. Also, the fallout that a organization will have to deal with. This could result in an enormous cost in legal fees and implementing new data protection protocols. Worst case scenario this could result in the company going bankrupt and many people losing their jobs.