2023 For Milestone Three you will prepare and submit a three slide presentation explaining information assurance | Assignment Collections
Computer Science 2023 Slide Powerpoint Presentation And Two Tutorial Pages
2023 For Milestone Three you will prepare and submit a three slide presentation explaining information assurance | Assignment Collections
For Milestone Three, you will prepare and submit a three-slide presentation explaining information assurance needs includingrisks associated with non-adherence to information assurance processes, and countermeasures to mitigate risks. You will also prepare two one-page tutorials. The first tutorial is for setting the company website as the homepage and the second for enabling and disabling cookies.
Requirements of Submission: The slide presentation should consist of three slides using Microsoft PowerPoint. Written components of project must follow these formatting guidelines when applicable: double spacing, 12-point Times New Roman font, and one-inch margins. The tutorials should be one page in length.
Instructor Feedback: Students can find their feedback in the Grade Center.
Critical Elements |
Exemplary |
Proficient |
Needs Improvement |
Not Evident |
Value |
Information Assurance – Access |
Meets “Proficient“ criteria and provides specific examples to substantiate description
(18-20) |
Provides a slide with a description of information assurance
(16-17) |
Provides a slide describing information assurance; however, it is not accurate or lacks important detail (14-15) |
Does not provide a slide describing information assurance
(0-13) |
20 |
Information Assurance – Risks |
Meets “Proficient“ criteria and provides specific examples to illustrate risks
(18-20) |
Provides a slide explaining the risks associated with non-adherence to information security processes
(16-17) |
Provides a slide explaining the risks associated with non-adherence to information security processes; however, description lacks clarity or is not accurate (14-15) |
Does not provide a slide describing the risks associated with non-adherence to information security processes
(0-13) |
20 |
Information Assurance – Countermeasures
|
Meets “Proficient“ criteria and uses specific examples to support countermeasure use
(18-20) |
Provides a slide describing countermeasures to mitigate information security risks
(16-17) |
Provides a slide describing countermeasures to mitigate information security risks; however, description is limited or is not accurate (14-15) |
Does not provide a slide describing the risks associated with non-adherence to information security processes
(0-13) |
20
|
Instructions: Set Homepage
|
Meets “Proficient“ criteria, and the tutorial indicates the optimal settings for use and function (18-20) |
Provides a tutorial for setting the company website as the homepage for newly updated computers (16-17) |
Provides a tutorial, but it is missing significant information
(14-15) |
Does not provide a tutorial for setting company website as the homepage for newly updated computers (0-13) |
20 |
Instructions: Cookies
|
Meets “Proficient“ criteria, and the tutorial indicates key considerations for enabling and disabling cookies (18-20) |
Provides a tutorial for enabling and disabling cookies
(16-17) |
Provides a tutorial for enabling and disabling cookies, but instructions lack detail or are inaccurate (14-15) |
Does not provide a tutorial for enabling and disabling cookies
(0-13) |
20 |
Earned Total Comments: |
100% |
We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.