Discussion
Evaluation Results
Author: Maverick Morgan
Date Evaluated: 06/12/2016 08:48:08 AM (MDT)
DRF template: Cyberwarfare (GR, C688, BWP20116)
Program: Cyberwarfare (GR, C688, BWP20116)
Evaluation Method: Using Rubric
Evaluation Summary for Cyberwarfare: BWP Task 3
Final Score: Does not Meet
Overall comments: 06/12/2016: The submission provides a very good discussion of several recommendations to protect the delivery of critical infrastructure services and enable the timely detection of cybersecurity threats. However, It is unclear which of the recommendations are safeguards and which are functions or systems. This distinction is necessary to meet the requirements of the rubric for this assessment. Plausible changes of both safeguards and functions/systems must be discussed as well to demonstrate competency.
Detailed Results (Rubric used: BWP2 Task 3 (0116))
Articulation of Response (clarity, organization, mechanics)
(1) 1=Not Evident (2) 2=Approaching Competence (3) 3=Competent
Responses are unstructured or disjointed. Vocabulary and tone are unprofessional or distract from the topic. Responses contain pervasive errors in mechanics, usage, or grammar.
Responses are poorly organized or difficult to follow. Terminology is misused or ineffective. Responses contain errors in mechanics, usage, or grammar that cause confusion.
Responses are organized and focus on the main ideas presented in the assessment. Word choice is pertinent and clearly conveys the intended meaning to the audience. Responses reflect attention to detail. Mechanics, usage, and grammar promote understanding and readability.
Criterion Score: 3.00
A. Recommended Safeguards
(1) 1=Not Evident (2) 2=Approaching Competence (3) 3=Competent
Specific recommended safeguards are not provided, or the specific recommended safeguards do not protect the delivery of critical infrastructure services at the Western Interconnection power grid.
The specific recommended safeguards protect the delivery of critical infrastructure services at the Western Interconnection power grid, but an explanation is not provided for how these recommended safeguards will protect the critical infrastructure services, or the information provided contains inaccuracies.
The specific recommended safeguards protect the delivery of critical infrastructure services at the Western Interconnection power grid, and an explanation is provided for how these recommended safeguards will protect the critical infrastructure services.
Criterion Score: 2.00 Comments on this criterion: 06/12/2016: Several safeguards to protect the delivery of critical infrastructure services are recommended. However, a explanation of exactly how these safeguards will provide the protection and benefit the Western Interconnection power grid could not be found.
B. Evolution of Safeguards
(1) 1=Not Evident (2) 2=Approaching Competence (3) 3=Competent
Printed on: 06/12/2016 01:49:34 PM (EST)
A description is not provided, or the description does not contain changes that would be needed over time with the evolution of cyberrelated capabilities, changing threats, and emerging technologies.
The description contains changes that would be needed over time with the evolution of cyberrelated capabilities, changing threats, and emerging technologies but does not address all safeguards, or the described changes are not plausible.
The description contains plausible changes that would be needed over time for each safeguard with the evolution of cyber related capabilities, changing threats, and emerging technologies.
Criterion Score: 1.00 Comments on this criterion: 06/12/2016: A robust list of safeguards is provided. The discussion of plausible changes needed over time for each safeguard with the evolution of cyberrelated capabilities, changing threats and emerging technologies is not evident but is required.
C. Recommended Functions or Systems
(1) 1=Not Evident (2) 2=Approaching Competence (3) 3=Competent
Recommended functions or systems are not provided, or the recommended functions or systems do not enable timely detection of cybersecurity threats.
The recommended functions or systems would enable timely detection of cybersecurity threats, but the explanation is not provided for how each function or system would detect cybersecurity threats or contains inaccuracies.
The recommended functions or systems would enable timely detection of cybersecurity threats, and an accurate explanation is provided for how each function or system would detect cybersecurity threats.
Criterion Score: 1.00 Comments on this criterion: 06/12/2016: A very good list of recommendations including certification bodies, security improvement management systems, information sharing and frequent revision of laws and regulations is provided. It is unclear which of the recommendations are safeguards and which are functions or systems. This distinction is necessary to meet the requirements of the rubric for this assessment.
D. Evolution of Functions or Systems
(1) 1=Not Evident (2) 2=Approaching Competence (3) 3=Competent
A description is not provided, or the description does not contain changes that would be needed over time with the evolution of cyberrelated capabilities, changing threats, and emerging technologies.
The description contains changes that would be needed over time with the evolution of cyberrelated capabilities, changing threats, and emerging technologies but does not address all functions or systems, or the described changes are not plausible.
The description contains plausible changes that would be needed over time for each function or system with the evolution of cyberrelated capabilities, changing threats, and emerging technologies.
Criterion Score: 1.00 Comments on this criterion: 06/12/2016: This aspect will be reevaluated after the revision of aspects A and C.
E. Sources
(1) 1=Not Evident (2) 2=Approaching Competence (3) 3=Competent
The submission does not provide intext citations and references according to APA style.
The submission includes intext citations and references but does not demonstrate a consistent application of APA style.
The submission includes intext citations and references and demonstrates a consistent application of APA style.
Criterion Score: 3.00
Printed on: 06/12/2016 01:49:34 PM (EST)
Needs help with similar assignment?
We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper
Get Answer Over WhatsApp Order Paper Now