SlideShare a Scribd company logo
CYB- 690 Security Architecture Scoring Guide
Performance Level Ratings
Meets Expectations
Performance consistently met expectations in all essential areas
of the assignment criteria, at times possibly exceeding
expectations, and the quality of work overall was very good.
The most critical goals were met.
Near Expectations
Performance did not consistently meet expectations.
Performance failed to meet expectations in one or more
essential areas of the assignment criteria, one or more of the
most critical goals were not met.
Below Expectations
Performance was consistently below expectations in most
essential areas of the assignment criteria, reasonable progress
toward critical goals was not made. Significant improvement is
needed in one or more important areas.
Criteria
Below Expectations
Near Expectations
Meets Expectations
Earned
The student accurately creates an overall security architecture
structure diagram with comprehensive descriptions of the
architecture components making sure to:
Identify all types of data and sensitive data the organization
will store.
0 pts – 2 pts
3 pts – 4 pts
5 pts
Define where that information is stored.
0 pts – 2 pts
3 pts – 4 pts
5 pts
Record of all hardware and software devices in the network.
0 pts – 2 pts
3 pts – 4 pts
5 pts
Describe how the security controls are positioned and how they
relate to the overall systems architecture.
0 pts – 2 pts
3 pts – 4 pts
5 pts
Define security attacks, mechanisms, and services, and the
relationships between these categories.
0 pts – 6 pts
7 pts – 9 pts
10 pts
Specify when and where to apply security controls.
0 pts – 2 pts
3 pts – 4 pts
5 pts
Present in-depth security control specifications.
0 pts – 6 pts
7 pts – 9 pts
10 pts
Address restricting access, layering security, employing
authentication, encrypting storage, automating security, and IT
infrastructure.
0 pts – 2 pts
3 pts – 4 pts
5 pts
Include the full scope of policy, procedural and technical
responsibilities.
0 pts – 6 pts
7 pts – 9 pts
10 pts
Prose is largely free of mechanical errors. The writer uses a
variety of effective sentence structures, figures of speech, and
industry terminology.
0 pts – 2 pts
3 pts – 4 pts
5 pts
TOTAL
/65
Instructor Feedback
© 2019. Grand Canyon University. All Rights Reserved.
Cyb  690 security architecture scoring guide performance level

More Related Content

DOCX
Customer case study © 2010 cisco systems, inc. all rig
PDF
Ontology-based context-sensitive software security knowledge management model...
PDF
Defense In-Depth
PPTX
Enterprise Strategy Group: Security Survey
DOCX
The NIST Cybersecurity Framework
PDF
Data Center Security Challenges
PDF
Cisco Addresses the Full Attack Continuum
PDF
Why Penetration Tests Are Important Cyber51
Customer case study © 2010 cisco systems, inc. all rig
Ontology-based context-sensitive software security knowledge management model...
Defense In-Depth
Enterprise Strategy Group: Security Survey
The NIST Cybersecurity Framework
Data Center Security Challenges
Cisco Addresses the Full Attack Continuum
Why Penetration Tests Are Important Cyber51

What's hot (20)

PDF
Dr. Charles Pak
PPS
BISS - 11nov2011
PDF
Introduction: CISSP Certification
DOC
David Patterson IT Security Resumes 2016
PDF
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
DOCX
Jenkins_ Carlasha 2016 v1
PDF
IT SECURITY ASSESSMENT PROPOSAL
PPTX
Journey from CCNA to Certified Network Defender v2
PDF
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
PPTX
CyberSecurity Strategy For Defendable ROI
PDF
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
PPTX
Information security principles
PPT
002.itsecurity bcp v1
PDF
Complete network security protection for sme's within limited resources
PDF
IIC IoT Security Maturity Model: Description and Intended Use
PPTX
CompTIA Security+: Everything you need to know about the SY0-601 update
PDF
20161021 JS Cybersecurity Service Proposal
PPTX
Understanding cyber resilience
PPT
II Security At Microsoft
DOCX
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Dr. Charles Pak
BISS - 11nov2011
Introduction: CISSP Certification
David Patterson IT Security Resumes 2016
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
Jenkins_ Carlasha 2016 v1
IT SECURITY ASSESSMENT PROPOSAL
Journey from CCNA to Certified Network Defender v2
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
CyberSecurity Strategy For Defendable ROI
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Information security principles
002.itsecurity bcp v1
Complete network security protection for sme's within limited resources
IIC IoT Security Maturity Model: Description and Intended Use
CompTIA Security+: Everything you need to know about the SY0-601 update
20161021 JS Cybersecurity Service Proposal
Understanding cyber resilience
II Security At Microsoft
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Ad

Similar to Cyb 690 security architecture scoring guide performance level (20)

PPTX
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
DOCX
Resume
PDF
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
DOCX
Project 1CST630 Project ChecklistStudent Name DateNote This che
DOCX
Week 4 Written Assignment Stored Procedures as a Security Measure.docx
PPTX
Corporate Cyber Program
DOCX
Criteria Ratings PointsIntroduction 10 to 8.0 ptsAdva
DOC
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
DOCX
ISE 510 Final Project Milestone Two Guidelines and Rubric .docx
DOCX
Cyber Security Improvement Plan
PDF
Agile Secure Development
DOCX
LOKESH Curriculum
DOCX
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
PDF
Meeting the Cybersecurity Skills Challenge with CompTIA Security+
PDF
Keeping the World Connected with CompTIA Network+
PDF
Bini-CV
PDF
"CCNP Data Center: Your Roadmap to Success"
DOC
Kenneth Smith Resume 2015
PPTX
Ch 9 traceability and verification
PPTX
The Next Wave of Reliability Engineering
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
Resume
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Project 1CST630 Project ChecklistStudent Name DateNote This che
Week 4 Written Assignment Stored Procedures as a Security Measure.docx
Corporate Cyber Program
Criteria Ratings PointsIntroduction 10 to 8.0 ptsAdva
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
ISE 510 Final Project Milestone Two Guidelines and Rubric .docx
Cyber Security Improvement Plan
Agile Secure Development
LOKESH Curriculum
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Meeting the Cybersecurity Skills Challenge with CompTIA Security+
Keeping the World Connected with CompTIA Network+
Bini-CV
"CCNP Data Center: Your Roadmap to Success"
Kenneth Smith Resume 2015
Ch 9 traceability and verification
The Next Wave of Reliability Engineering
Ad

More from ANIL247048 (20)

DOCX
Effective leadership and management in nursing nint
DOCX
Effective crisis communication chapter 1 the conceptual foundat
DOCX
Edu 280 activity plan rubric df unsatisfactory
DOCX
Econ 3310 – microeconomics spring 2021 – david quigley g
DOCX
E commerce 2018 business. technology. society copyright ©
DOCX
Eco 223 economic history of the western community chapter
DOCX
Due date weekly percentage of course grade 20.undergra
DOCX
Drug addicts presenting information drug addicts are humans su
DOCX
Dmin 810 comparing and contrasting models paper assignment instru
DOCX
Dl002 assessment instructions assessment instructionsdl002
DOCX
Directions for discussion for h.m. and his doctor listen to t
DOCX
Directions for chapter 10 lesson 1 project researching the e
DOCX
Directions for chapter 9 lesson 3 write a three paragraph
DOCX
Digital media & society week 7 please respond in complet
DOCX
Digital media & society cmst 301 project 4 final exam1. fo
DOCX
Descriptive statistics worksheet directions answer each qu
DOCX
Define problem identi
DOCX
Data length of stayagesexprincipal payer total chgesrt chgeimaging
DOCX
Data length of stayagesexprincipal payer total chgesrt chgeimaging
DOCX
Data documentation and retrieval using unity in a universe®
Effective leadership and management in nursing nint
Effective crisis communication chapter 1 the conceptual foundat
Edu 280 activity plan rubric df unsatisfactory
Econ 3310 – microeconomics spring 2021 – david quigley g
E commerce 2018 business. technology. society copyright ©
Eco 223 economic history of the western community chapter
Due date weekly percentage of course grade 20.undergra
Drug addicts presenting information drug addicts are humans su
Dmin 810 comparing and contrasting models paper assignment instru
Dl002 assessment instructions assessment instructionsdl002
Directions for discussion for h.m. and his doctor listen to t
Directions for chapter 10 lesson 1 project researching the e
Directions for chapter 9 lesson 3 write a three paragraph
Digital media & society week 7 please respond in complet
Digital media & society cmst 301 project 4 final exam1. fo
Descriptive statistics worksheet directions answer each qu
Define problem identi
Data length of stayagesexprincipal payer total chgesrt chgeimaging
Data length of stayagesexprincipal payer total chgesrt chgeimaging
Data documentation and retrieval using unity in a universe®

Recently uploaded (20)

PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Computing-Curriculum for Schools in Ghana
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
master seminar digital applications in india
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Presentation on HIE in infants and its manifestations
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Classroom Observation Tools for Teachers
PPTX
Final Presentation General Medicine 03-08-2024.pptx
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
102 student loan defaulters named and shamed – Is someone you know on the list?
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Computing-Curriculum for Schools in Ghana
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
master seminar digital applications in india
Pharma ospi slides which help in ospi learning
Presentation on HIE in infants and its manifestations
VCE English Exam - Section C Student Revision Booklet
Chinmaya Tiranga quiz Grand Finale.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
A systematic review of self-coping strategies used by university students to ...
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Final Presentation General Medicine 03-08-2024.pptx
human mycosis Human fungal infections are called human mycosis..pptx
Supply Chain Operations Speaking Notes -ICLT Program
Classroom Observation Tools for Teachers
Final Presentation General Medicine 03-08-2024.pptx

Cyb 690 security architecture scoring guide performance level

  • 1. CYB- 690 Security Architecture Scoring Guide Performance Level Ratings Meets Expectations Performance consistently met expectations in all essential areas of the assignment criteria, at times possibly exceeding expectations, and the quality of work overall was very good. The most critical goals were met. Near Expectations Performance did not consistently meet expectations. Performance failed to meet expectations in one or more essential areas of the assignment criteria, one or more of the most critical goals were not met. Below Expectations Performance was consistently below expectations in most essential areas of the assignment criteria, reasonable progress toward critical goals was not made. Significant improvement is needed in one or more important areas. Criteria Below Expectations Near Expectations Meets Expectations Earned The student accurately creates an overall security architecture structure diagram with comprehensive descriptions of the architecture components making sure to:
  • 2. Identify all types of data and sensitive data the organization will store. 0 pts – 2 pts 3 pts – 4 pts 5 pts Define where that information is stored. 0 pts – 2 pts 3 pts – 4 pts 5 pts Record of all hardware and software devices in the network. 0 pts – 2 pts 3 pts – 4 pts 5 pts Describe how the security controls are positioned and how they relate to the overall systems architecture. 0 pts – 2 pts 3 pts – 4 pts 5 pts Define security attacks, mechanisms, and services, and the relationships between these categories. 0 pts – 6 pts 7 pts – 9 pts 10 pts Specify when and where to apply security controls. 0 pts – 2 pts 3 pts – 4 pts 5 pts
  • 3. Present in-depth security control specifications. 0 pts – 6 pts 7 pts – 9 pts 10 pts Address restricting access, layering security, employing authentication, encrypting storage, automating security, and IT infrastructure. 0 pts – 2 pts 3 pts – 4 pts 5 pts Include the full scope of policy, procedural and technical responsibilities. 0 pts – 6 pts 7 pts – 9 pts 10 pts Prose is largely free of mechanical errors. The writer uses a variety of effective sentence structures, figures of speech, and industry terminology. 0 pts – 2 pts 3 pts – 4 pts 5 pts TOTAL /65 Instructor Feedback © 2019. Grand Canyon University. All Rights Reserved.