Technology Review #2: Emerging Application of Technology in a Critical Infrastructure
Objective
The purpose of this technology review is to identify, discuss, and evaluate the cybersecurity implications
of an emerging application of technology in the context of a critical infrastructure sector. Your selected
technology may be hardware, software, or systems that rely upon both hardware and software. Your
research will also include an examination of the cybersecurity implications of using this technology in
critical infrastructures. This type of research is also referred to as a survey of the literature. Allowable
sources for your literature survey are journal articles, papers published in conference proceedings, and
research studies published in dissertations.
Overview
Your audience is a group of senior executives who will be meeting to decide which emerging
applications of technologies should be selected for a security-focused, Internal Research & Development
projects during the next budget cycle. Each of these executives is responsible for developing products
and systems that support next generation systems in the nation’s critical infrastructure sectors.
The high-level visibility for your deliverable means that you need to start from a strong foundation of
suitable research-based journal articles, papers published in conference proceedings, and doctoral
dissertations. The basic question that must be answered about the selected technology is: what are the
cybersecurity implications (good or bad) for the selected critical infrastructure sector?
In addition, the executives have expressed the following information needs, which must be met by the
deliverable for this assignment:
(a)
(b)
(c)
(d)
(e)
(f)
(g)
characteristics of the critical infrastructure,
characteristics of the technology,
use of the technology to support or improve cybersecurity,
use of the technology to reduce or manage risk,
use of the technology to increase resistance to threats/attacks,
use of the technology to decrease vulnerabilities in an existing technology application,
use or exploitation of the technology by attackers, criminals, terrorists, etc. to accomplish their
goals.
Instructions
Format your deliverable as a “descriptive or informative” annotated bibliography. The UMUC library
provides information about how to complete this type of assignment. See
http://sites.umuc.edu/library/libhow/bibliography_apa.cfm (sub-heading “To get started”).
Copyright © 2017 by University of Maryland University College. All rights reserved.
In addition to the list of sources and annotations, you must provide an introductory paragraph.
See the rubric for additional requirements for this assignment.
Before you begin your research and writing, review the grading rubric attached to the Assignment
Folder entry for this assignment. The rubric provides specific information about content and formatting
requirements. After you have reviewed the rubric, follow the instructions provided below.
Choose a Critical Infrastructure Sector
“There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or
virtual, are considered so vital to the United States that their incapacitation or destruction would have a
debilitating effect on security, national economic security, national public health or safety, or any
combination thereof” (Department of Homeland Security, 2016, p.1).
Choose a critical infrastructure sector to focus your technology review. For definitions of critical
infrastructures, see https://www.dhs.gov/critical-infrastructure-sectors. You may wish to choose your
emerging application of technology first and then select an appropriate critical infrastructure in which
your selected technology can be applied or deployed.
Choose an Emerging Application of Technology
Choose an emerging application of technology that can be used in the computers, digital devices, and
other electronic / electrical technologies (including networks and network infrastructures) that are
deployed in or used to build, operate, support, or maintain a critical infrastructure sector (e.g. utilities,
pipelines, transportation, smart cities, etc.).
Suggested technologies include:
•
•
•
•
•
•
•
•
Autonomous Vehicles (ground, sea, or air): Transportation Systems Sector
Crypto Currencies: Financial Services Sector (DO NOT CHOOSE Bitcoins)
Deep Space Communication Networks: Communications Sector
Implantable Medical Devices: Healthcare and Public Health Sector
Precision Agriculture (integrated systems using satellite imagery, GPS, Sensors, Robots):
Food & Agriculture Sector
Robot inspectors for physical infrastructures (buildings, roads, railways, pipelines, etc.):
Multiple Sectors
Smart Grid (also called Advanced Metering Infrastructure): Energy Sector
Wearable Sensors for Hazardous Materials Detection (e.g. CBRNE): Emergency Services
Sector
Copyright © 2017 by University of Maryland University College. All rights reserved.
You are encouraged to look for and investigate additional appropriate technologies before deciding
upon your technology choice for this assignment.
If you decide to research a technology that is not on the suggested technologies list (see above), you
must first request and receive your instructor’s permission. Your instructor may require that you do
preliminary library searches for research papers and technical papers to prove that you can find a
sufficient number of resources to complete the assignment.
Find Appropriate Sources (“Survey the Literature”)
You may find it helpful to begin by reading the tables of contents for recent issues of the
Communications of the ACM, IEEE Computer Magazine, IEEE Pervasive Computing, and IEEE Security &
Privacy. These professional journals frequently publish highly readable, research-based articles about
the cybersecurity implications of new and emerging technologies in the context of critical infrastructure
sectors. Here are some examples to get you started:
Bellatti, J., Brunner, A., Lewis, J., & Annadata, P. (2017). Driving habits data: Location privacy
implications and solutions. IEEE Security & Privacy, 15(1), 12-20.
Erdelj, M., Natalizio, E., Chowdhury, K. R., ^ Akyildiz, I.F. (2017). Help from the sky: Leveraging
UAVs for disaster management. IEEE Pervasive Computing, 16(1), 24-32.
Khatoun, R., & Zeadally, S. (2016). Smart cities: Concepts, architectures, research opportunities.
Communications of the ACM, 59(8), 46-57.
Wac, K., Rivas, H., & Fiordelli, M. (2017). Quality-of-life technologies. Computer, 50(3), 14-19.
Next, brainstorm keywords that you can use to find additional articles, papers, and other scholarly
publications (“sources’) which discuss and/or evaluate your selected emerging application of technology
in the context of your chosen critical infrastructure.
Allowable source types are: (a) professional journals, (b) conference proceedings, (c) dissertations or
theses, and (d) technical magazines (published by either the ACM or IEEE). Each of your selected sources
must have a reference list containing at least 3 references for authoritative papers. (See
http://sites.umuc.edu/library/libhow/scholarlyjournals.cfm)
Your selected sources must come from publications indexed in one or more of the following library
databases:
•
•
ACM Digital Library http://ezproxy.umuc.edu/login?url=http://www.acm.org/dl
Dissertations & Theses (Pro Quest)
http://ezproxy.umuc.edu/login?url=http://search.proquest.com/pqdtft/advanced?accountid=1
4580
Copyright © 2017 by University of Maryland University College. All rights reserved.
•
•
IEEE Computer Society Digital Library
http://ezproxy.umuc.edu/login?url=http://www.computer.org/portal/web/csdl/home
Science Direct
http://ezproxy.umuc.edu/login?url=http://www.sciencedirect.com/science/search
Since the point of this search is to find information about emerging applications of technology for a
critical infrastructure, your sources must have a publication date of 2013 or later (2013, 2014, 2015,
2016, 2017). For papers indexed in Science Direct, you may also use papers that are marked “In Press.”
To complete this part of the assignment, you may need to review 15 – 20 sources (search results) in
order to find 10 papers or articles that are usable for this assignment. The sources you choose must
provide technical information about your selected technology (see selection requirements for each
paper).
Create Your Bibliography (List of Sources)
Choose the 10 best sources from your searches for articles, papers, and dissertations. Focus on the ones
that give details about your technology and how it can be used in a critical infrastructure. Next, write the
APA format reference list entry for each source. Alphabetize your list of reference list entries. After you
have the correctly ordered list, number your entries from 1 to 10. Note: different reference entry
formats are used for different types of sources. Review the UMUC Library’s “Get Help > Citing and
Writing > APA Examples” for samples and explanations of the formatting rules.
(http://sites.umuc.edu/library/libhow/apa_examples.cfm ) Your list should look something like the
following.
1. Authors. (date). Article title. Publication name, vol(issue), #-#.
2. Authors. (date). Paper title. Published in the Proceedings of conference-name, pp. #-#.
3. Author …
Write Your Annotations
In an annotated bibliography, the annotation is a paragraph or two placed under the reference list entry
for each source. For this assignment, the annotation should be a combination of factual information
from the source and your evaluation (opinion) of that information. To accomplish this, you should read
the abstract, introduction section, and closing sections for each article or paper. For dissertations, look
over the Introduction and the Literature Review (usually Chapters 1 & 2). From this information, develop
a one to three paragraph informative or descriptive summary of the source that includes: (a) a
description of technology and its characteristics, (b) planned uses of the technology in the critical
infrastructure, and (c) your thoughts and opinions as to how you could use this paper to justify selecting
the technology for an Internal Research & Development study.
Copyright © 2017 by University of Maryland University College. All rights reserved.
In each annotation, you should provide at least one specific example of a characteristic and/or
application of the technology, e.g. an emerging technology, which impacts cybersecurity.
For example, for an annotation for an article about robots used to inspect dams and bridges, you could
focus upon the need to secure the WiFi communications used to operate the device (“command and
control” links). Improving the security of the WiFi transmissions would reduce the risk that attackers
could take control of the robot or otherwise interfere with its operations. This in turn will decrease the
probability of loss of availability caused by a successful attack. Decreasing the probability of a negative
event will decrease the risk associated with that event
Note: Remember that the security posture of a system or product is framed in terms of risk,
threats, vulnerabilities, etc. Improvements to the security posture (positive security
implications) will result in reduced risk, increased resistance to threats or attacks, and decreased
vulnerability. Negative impacts on the security posture will result in increased risk, decreased
resistance to threats / attacks, and increased vulnerability (weakness).
As you write the annotations for each article / paper / dissertation, make sure that you include YOUR
thoughts and ideas about the security implications of this technology. Use standard terminology from
the Five Pillars of Information Assurance and/or the Five Pillars of Information Security. You do not need
to include all ten “pillars” but you should address a minimum of three. If you are targeting an “A” on
your paper, address at least five of the pillars. (Sources for definitions of the Five Pillars of IA and Five
Pillars of IS are listed under Content > Course Resources.)
•
Five Pillars of Information Assurance (IA): confidentiality, integrity, availability, authentication,
and non-repudiation.
•
Five Pillars of Information Security (IS): protection, detection, reaction, documentation,
prevention.
As you brainstorm the security implications of this technology (if these are not specifically discussed by
your source), you should consider use of the technology to improve cybersecurity. Then consider
applications or uses which will negatively impact the security posture of the identified critical
infrastructure. It is very important that you consider BOTH SIDES OF THIS ISSUE.
Putting It All Together
Your annotated bibliography for your selected technology should be at least three pages in length and
no more than ten pages (excluding the title page and references page).
Your annotated bibliography must comply with the formatting guidance provided under Content >
Course Resources > APA Resources (see the sample papers and the template file). Your annotated
bibliography must comply with APA 6th Edition Style for references and citations.
Copyright © 2017 by University of Maryland University College. All rights reserved.
You are expected to write grammatically correct English in every assignment that you submit for
grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that
your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured
sentences and paragraphs.
References
Department of Homeland Security. (2016). Critical infrastructure sectors. Retrieved from
https://www.dhs.gov/critical-infrastructure-sectors
Copyright © 2017 by University of Maryland University College. All rights reserved.
Rubric
Name:
Technology
Review #2 Annotated
Bibliography
Bibliography
Introduction
Excellent
Outstanding
Acceptable
10 points
8.5 points
7 points
Provided an
outstanding
introductory
Provided an excellent
paragraph that
introductory paragraph that included a brief
included a brief description description of
of the selected critical
the selected
infrastructure sector and the critical
emerging application of
infrastructure
technology. Explained how sector and the
the survey of the
emerging
professional literature was application of
conducted (keywords,
technology.
databases searched).
Briefly explained
Summarized the results of
how the survey
the survey of the literature of the
(what was found in each
professional
database, the quality of the literature was
articles, etc.).
conducted
(keywords,
databases
searched).
10 points
8.5 points
Provided an
acceptable
introductory
paragraph that
named the critical
infrastructure
sector and included
a brief description
of the selected
emerging
application of
technology. Named
the databases
which were
searched.
7 points
Survey of the
Literature
Identified an appropriate
technology and then
surveyed the professional
literature. Bibliography
includes 10 or more
appropriate
sources obtained from at
least three of the four
approved sources (ACM
Digital Library, IEEE
Computer Society Digital
Library, Pro Quest
Dissertations and Theses,
and Science Direct).
10 points
APA Format
Reference Entries
Identified an
appropriate
technology and
then surveyed
the professional
literature.
Bibliography
includes 8 or
more
appropriate
sources obtained
from at
least three of the
four approved
sources (ACM
Digital Library,
IEEE Computer
Society Digital
Library, Pro
Quest
Dissertations and
Theses, and
Science Direct).
Identified an
appropriate
technology and
then surveyed the
professional
literature.
Bibliography
includes 7 or
more appropriate
sources obtained
from at least two of
the four approved
sources (ACM
Digital Library, IEEE
Computer Society
Digital Library, Pro
Quest Dissertations
and Theses, and
Science Direct).
8.5 points
7 points
APA Format
Reference Entries
Annotations
Annotation for
Source #1
Bibliography contains a
reference list entry for each
identified source. Reference
list entries and in-text
citations are correctly
formatted using the
appropriate APA style for
each type of resource.
Bibliography
contains a
reference list
entry for each
identified source.
One or two
minor errors in
APA formatting.
Bibliography
contains a
reference list entry
for each identified
source. Three to
five minor errors in
APA formatting.
Excellent
Outstanding
Acceptable
5 points
4 points
3 points
Annotation for
Source #1
Annotation for
Source #2
Provided an excellent
summary of an appropriate
source. The summary clearly
and concisely explained how
this source could be used to
meet five (5) or more of the
information needs of
executives as listed in the
detailed assignment
description.
Provided an
outstanding
summary of an
appropriate
source. The
summary clearly
explained how
this source could
be used to meet
four (4) or more
of the
information
needs of
executives as
listed in the
detailed
assignment
description.
Provided an
acceptable
summary of an
appropriate source.
The summary
explained how this
source could be
used to meet at
least three (3) of
the information
needs of executives
as listed in the
detailed assignment
description.
5 points
4 points
3 points
Provided an excellent
summary of an appropriate
source. The summary clearly
and concisely explained how
this source could be used to
meet five (5) or more of the
information needs of
executives as listed in the
detailed assignment
description.
Provided an
outstanding
summary of an
appropriate
source. The
summary clearly
explained how
this source could
be used to meet
four (4) or more
of the
information
needs of
executives as
listed in the
detailed
assignment
description.
Provided an
acceptable
summary of an
appropriate source.
The summary
explained how this
source could be
used to meet at
least three (3) of
the information
needs of executives
as listed in the
detailed assignment
description.
5 points
4 points
3 points
Annotation for
Source #3
Annotation for
Source #4
Provided an excellent
summary of an appropriate
source. The summary clearly
and concisely explained how
this source could be used to
meet five (5) or more of the
information needs of
executives as listed in the
detailed assignment
description.
Provided an
outstanding
summary of an
appropriate
source. The
summary clearly
explained how
this source could
be used to meet
four (4) or more
of the
information
needs of
executives as
listed in the
detailed
assignment
description.
Provided an
acceptable
summary of an
appropriate source.
The summary
explained how this
source could be
used to meet at
least three (3) of
the information
needs of executives
as listed in the
detailed assignment
description.
5 points
4 points
3 points
Provided an excellent
summary of an appropriate
source. The summary clearly
and concisely explained how
this source could be used to
meet five (5) or more of the
information needs of
executives as listed in the
detailed assignment
description.
Provided an
outstanding
summary of an
appropriate
source. The
summary clearly
explained how
this source could
be used to meet
four (4) or more
of the
information
needs of
executives as
listed in the
detailed
assignment
description.
Provided an
acceptable
summary of an
appropriate source.
The summary
explained how this
source could be
used to meet at
least three (3) of
the information
needs of executives
as listed in the
detailed assignment
description.
5 points
4 points
3 points
Annotation for
Source #5
Annotation for
Source #6
Provided an excellent
summary of an appropriate
source. The summary clearly
and concisely explained how
this source could be used to
meet five (5) or more of the
information needs of
executives as listed in the
detailed assignment
description.
Provided an
outstanding
summary of an
appropriate
source. The
summary clearly
explained how
this source could
be used to meet
four (4) or more
of the
information
needs of
executives as
listed in the
detailed
assignment
description.
Provided an
acceptable
summary of an
appropriate source.
The summary
explained how this
source could be
used to meet at
least three (3) of
the information
needs of executives
as listed in the
detailed assignment
description.
5 points
4 points
3 points
Provided an excellent
summary of an appropriate
source. The summary clearly
and concisely explained how
this source could be used to
meet five (5) or more of the
information needs of
executives as listed in the
detailed assignment
description.
Provided an
outstanding
summary of an
appropriate
source. The
summary clearly
explained how
this source could
be used to meet
four (4) or more
of the
information
needs of
executives as
listed in the
detailed
assignment
description.
Provided an
acceptable
summary of an
appropriate source.
The summary
explained how this
source could be
used to meet at
least three (3) of
the information
needs of executives
as listed in the
detailed assignment
description.
5 points
4 points
3 points
Annotation for
Source #7
Annotation for
Source #8
Provided an excellent
summary of an appropriate
source. The summary clearly
and concisely explained how
this source could be used to
meet five (5) or more of the
information needs of
executives as listed in the
detailed assignment
description.
Provided an
outstanding
summary of an
appropriate
source. The
summary clearly
explained how
this source could
be used to meet
four (4) or more
of the
information
needs of
executives as
listed in the
detailed
assignment
description.
Provided an
acceptable
summary of an
appropriate source.
The summary
explained how this
source could be
used to meet at
least three (3) of
the information
needs of executives
as listed in the
detailed assignment
description.
5 points
4 points
3 points
Provided an excellent
summary of an appropriate
source. The summary clearly
and concisely explained how
this source could be used to
meet five (5) or more of the
information needs of
executives as listed in the
detailed assignment
description.
Provided an
outstanding
summary of an
appropriate
source. The
summary clearly
explained how
this source could
be used to meet
four (4) or more
of the
information
needs of
executives as
listed in the
detailed
assignment
description.
Provided an
acceptable
summary of an
appropriate source.
The summary
explained how this
source could be
used to meet at
least three (3) of
the information
needs of executives
as listed in the
detailed assignment
description.
5 points
4 points
3 points
Annotation for
Source #9
Annotation for
Source #10
Provided an excellent
summary of an appropriate
source. The summary clearly
and concisely explained how
this source could be used to
meet five (5) or more of the
information needs of
executives as listed in the
detailed assignment
description.
Provided an
outstanding
summary of an
appropriate
source. The
summary clearly
explained how
this source could
be used to meet
four (4) or more
of the
information
needs of
executives as
listed in the
detailed
assignment
description.
Provided an
acceptable
summary of an
appropriate source.
The summary
explained how this
source could be
used to meet at
least three (3) of
the information
needs of executives
as listed in the
detailed assignment
description.
5 points
4 points
3 points
Provided an excellent
summary of an appropriate
source. The summary clearly
and concisely explained how
this source could be used to
meet five (5) or more of the
information needs of
executives as listed in the
detailed assignment
description.
Provided an
outstanding
summary of an
appropriate
source. The
summary clearly
explained how
this source could
be used to meet
four (4) or more
of the
information
needs of
executives as
listed in the
detailed
assignment
description.
Provided an
acceptable
summary of an
appropriate source.
The summary
explained how this
source could be
used to meet at
least three (3) of
the information
needs of executives
as listed in the
detailed assignment
description.
Professionalism
Use of Standard
Cybersecurity
Terminology
Excellent
Outstanding
Acceptable
5 points
4 points
3 points
Deliverable
showed an
outstanding
Demonstrated excellence in understanding
the use of standard
and integration
cybersecurity terminology to of standard
support the deliverable.
cybersecurity
Appropriately used
terminology.
terminology from five or
Appropriately
more pillars of IA/IS.
used terminology
from four or
more pillars of
IA/IS.
5 points
Organization &
Appearance
4 points
Submitted work
has minor style
or formatting
flaws but still
presents a
Submitted work shows
professional
excellence in organization
appearance.
and the use of color, fonts, Submitted work
titles, headings and subis well organized
headings, etc. is appropriate and
to the assignment type.
appropriately
uses color, fonts,
and section
headings (per the
assignment’s
directions).
10 points
8.5 points
Correctly used
standard
cybersecurity
terminology in the
deliverable.
Appropriately used
terminology from
three or more
pillars of IA/IS.
3 points
Organization and/or
appearance of
submitted work
could be improved
through better use
of fonts, color,
titles, headings, etc.
OR Submitted work
has multiple style or
formatting errors.
Professional
appearance could
be improved.
7 points
Execution
Overall Score
No formatting, grammar,
spelling, or punctuation
errors.
Work contains
minor errors in
formatting,
grammar,
spelling or
punctuation
which do not
significantly
impact
professional
appearance.
Errors in formatting,
spelling, grammar,
or punctuation
which detract from
professional
appearance of the
submitted work.
Excellent
Outstanding
Acceptable
100 or more
85 or more
75 or more
Needs
Improvement
6 points
Provided an
introductory
paragraph for the
bibliography that
identified the
critical
infrastructure
sector and the
technology being
researched.
6 points
Needs
Significant
Improvement
5 points
Provided an
introductory
paragraph but
the paragraph
was off-topic or
otherwise did
not meet the
requirements of
the assignment.
OR the work
submitted was
not well
supported by
the use of
authoritative
sources.
5 points
Missing or
Unacceptable
0 points
Introductory
paragraph was
missing OR no
work submitted
for grading.
0 points
Identified an
appropriate
technology and
then surveyed the
professional
literature.
Bibliography
includes 5 or
more appropriate
sources obtained
from one or more
of the four
approved
sources (ACM
Digital Library, IEEE
Computer Society
Digital Library, Pro
Quest
Dissertations and
Theses, and
Science Direct).
The bibliography
included entries
for 3 or more
sources which
met some of the
requirements
for the
assignment. OR
the work
submitted was
not well
supported by
the use of
authoritative
sources.
The bibliography
was missing or did
not meet the
requirements of
the assignment.
6 points
5 points
0 points
Bibliography
contains a
reference list entry
for each identified
source. Attempted
to use APA style
but has multiple
formatting errors.
Sufficient
information was
provided to allow
the reader to find
and retrieve each
of the sources.
Needs
Improvement
2 points
Provided some
reference
information
about sources
for the
bibliography,
but
demonstrates a
fundamental
failure to
understand and
apply the APA
formatting
standard as
defined in
the Publication
Manual of the
American
Psychological
Association (6th
ed.).
Needs
Significant
Improvement
1 point
No bibliographic
entries were
provided OR the
assignment was
not submitted for
grading.
Missing or
Unacceptable
0 points
Provided an
annotation of
Provided a
the source
summary of an
which addresse
appropriate
d at least one of
source. The
the information
summary
needs of
explained how this
executives (as
source could be
listed in the
used to meet at
detailed
least two (2) of the
assignment
information needs
description). OR,
of executives as
the annotation
listed in the
was not well
detailed
supported by
assignment
the use of
description.
authoritative
sources.
2 points
1 point
Provided an
annotation of
Provided a
the source
summary of an
which addresse
appropriate
d at least one of
source. The
the information
summary
needs of
explained how this
executives (as
source could be
listed in the
used to meet at
detailed
least two (2) of the
assignment
information needs
description). OR,
of executives as
the annotation
listed in the
was not well
detailed
supported by
assignment
the use of
description.
authoritative
sources.
2 points
1 point
Annotation was
missing or did not
meet the
requirements of
the assignment.
0 points
Annotation was
missing or did not
meet the
requirements of
the assignment.
0 points
Provided an
annotation of
Provided a
the source
summary of an
which addresse
appropriate
d at least one of
source. The
the information
summary
needs of
explained how this
executives (as
source could be
listed in the
used to meet at
detailed
least two (2) of the
assignment
information needs
description). OR,
of executives as
the annotation
listed in the
was not well
detailed
supported by
assignment
the use of
description.
authoritative
sources.
2 points
1 point
Provided an
annotation of
Provided a
the source
summary of an
which addresse
appropriate
d at least one of
source. The
the information
summary
needs of
explained how this
executives (as
source could be
listed in the
used to meet at
detailed
least two (2) of the
assignment
information needs
description). OR,
of executives as
the annotation
listed in the
was not well
detailed
supported by
assignment
the use of
description.
authoritative
sources.
2 points
1 point
Annotation was
missing or did not
meet the
requirements of
the assignment.
0 points
Annotation was
missing or did not
meet the
requirements of
the assignment.
0 points
Provided an
annotation of
Provided a
the source
summary of an
which addresse
appropriate
d at least one of
source. The
the information
summary
needs of
explained how this
executives (as
source could be
listed in the
used to meet at
detailed
least two (2) of the
assignment
information needs
description). OR,
of executives as
the annotation
listed in the
was not well
detailed
supported by
assignment
the use of
description.
authoritative
sources.
2 points
1 point
Provided an
annotation of
Provided a
the source
summary of an
which addresse
appropriate
d at least one of
source. The
the information
summary
needs of
explained how this
executives (as
source could be
listed in the
used to meet at
detailed
least two (2) of the
assignment
information needs
description). OR,
of executives as
the annotation
listed in the
was not well
detailed
supported by
assignment
the use of
description.
authoritative
sources.
2 points
1 point
Annotation was
missing or did not
meet the
requirements of
the assignment.
0 points
Annotation was
missing or did not
meet the
requirements of
the assignment.
0 points
Provided an
annotation of
Provided a
the source
summary of an
which addresse
appropriate
d at least one of
source. The
the information
summary
needs of
explained how this
executives (as
source could be
listed in the
used to meet at
detailed
least two (2) of the
assignment
information needs
description). OR,
of executives as
the annotation
listed in the
was not well
detailed
supported by
assignment
the use of
description.
authoritative
sources.
2 points
1 point
Provided an
annotation of
Provided a
the source
summary of an
which addresse
appropriate
d at least one of
source. The
the information
summary
needs of
explained how this
executives (as
source could be
listed in the
used to meet at
detailed
least two (2) of the
assignment
information needs
description). OR,
of executives as
the annotation
listed in the
was not well
detailed
supported by
assignment
the use of
description.
authoritative
sources.
2 points
1 point
Annotation was
missing or did not
meet the
requirements of
the assignment.
0 points
Annotation was
missing or did not
meet the
requirements of
the assignment.
0 points
Provided an
annotation of
Provided a
the source
summary of an
which addresse
appropriate
d at least one of
source. The
the information
summary
needs of
explained how this
executives (as
source could be
listed in the
used to meet at
detailed
least two (2) of the
assignment
information needs
description). OR,
of executives as
the annotation
listed in the
was not well
detailed
supported by
assignment
the use of
description.
authoritative
sources.
2 points
1 point
Provided an
annotation of
Provided a
the source
summary of an
which addresse
appropriate
d at least one of
source. The
the information
summary
needs of
explained how this
executives (as
source could be
listed in the
used to meet at
detailed
least two (2) of the
assignment
information needs
description). OR,
of executives as
the annotation
listed in the
was not well
detailed
supported by
assignment
the use of
description.
authoritative
sources.
Annotation was
missing or did not
meet the
requirements of
the assignment.
0 points
Annotation was
missing or did not
meet the
requirements of
the assignment.
Needs
Improvement
2 points
Used standard
cybersecurity
terminology but
this usage was not
well integrated
into the
deliverable.
2 points
Submitted work
has multiple style
or formatting
errors.
Organization and
professional
appearance need
substantial
improvement.
6 points
Needs
Significant
Improvement
1 point
Misused or
incorrectly
defined
cybersecurity
terminology.
Missing or
Unacceptable
0 points
Did not integrate
standard
cybersecurity
terminology into
the deliverable.
1 point
0 points
Submitted work
meets minimum
requirements
but has major
style and
formatting
errors. Work is
disorganized
and needs to be
rewritten for
readability and
professional
appearance.
Submitted work is
poorly organized
and formatted.
Writing and
presentation are
lacking in
professional style
and appearance.
Work does not
reflect college
level writing skills.
Or, no submission.
5 points
0 points
Submitted work
Submitted work
is difficult to
has numerous
read /
errors in
understand and
formatting,
has significant
spelling, grammar, errors in
or punctuation.
formatting,
Work is
spelling,
unprofessional in grammar,
appearance.
punctuation, or
word usage.
Needs
Improvement
65 or more
Needs
Significant
Improvement
50 or more
No work
submitted. OR,
Submitted work is
poorly executed /
does not reflect
college level work.
Missing or
Unacceptable
0 or more
Purchase answer to see full
attachment