Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

I need help on proposal 3 (CMIT 320 7380 Network Security (2182) Rubric Name: Network Security Proposal Part 3 CriteriaExcellent Good Acceptable (Minimally Proficient) Needs

I need help on proposal 3 (CMIT 320 7380 Network Security (2182) Rubric Name: Network Security Proposal Part 3 CriteriaExcellent Good Acceptable (Minimally Proficient) Needs Improvement Needs Significant Improvement Missing or Unacceptable Assessed the appropriate public key infrastructure implementation Provided an excellent description of the technical requirements, proposal, and justification for public key infrastructure (PKI). Provided an outstanding description of the technical requirements, proposal, and justification for public key infrastructure (PKI). Provided a description of the technical requirements, proposal, and justification for public key infrastructure (PKI). Provided a description of the technical requirements and proposal for public key infrastructure (PKI), but lacked an appropriate justification. Identified technical requirements for public key infrastructure (PKI), but the proposal and justification lacked detail and/or was not well supported. The technical requirements, proposal, and justification for public key infrastructure (PKI) were off topic or failed to provide required level of detail. Identified the secure protocol implementation given the network design Provided an excellent description of the technical requirements, proposal, and justification for the secure protocol implementation. Provided an outstanding description of the technical requirements, proposal, and justification for the secure protocol implementation. Provided a description of the technical requirements, proposal, and justification for the secure protocol implementation. Provided a description of the technical requirements and proposal for the secure protocol implementation, but lacked an appropriate justification. Identified a technical requirement for the secure protocol implementation, but the proposal and justification lacked detail and/or was not well supported. The technical requirements, proposal, and justification for the secure protocol implementation were off topic or failed to provide required level of detail. Assessed the appropriate file encryption implementation Provided an excellent description of the technical requirements, proposal, and justification for file encryption. Provided an outstanding description of the technical requirements, proposal, and justification for file encryption. Provided a description of the technical requirements, proposal, and justification for file encryption. Provided a description of the technical requirements and proposal for file encryption, but lacked an appropriate justification. Identified a technical requirement for file encryption, but the proposal and justification lacked detail and/or was not well supported. The technical requirements, proposal, and justification for file encryption were off topic or failed to provide required level of detail. Assessed the appropriate implementation for hashing method Provided an excellent description of the technical requirements, proposal, and justification for the hashing method. Provided an outstanding description of the technical requirements, proposal, and justification for the hashing method. Provided a description of the technical requirements, proposal, and justification for the hashing method. Provided a description of the technical requirements and proposal for the hashing method, but lacked an appropriate justification. Identified a technical requirement, but the proposal and justification for the hashing method lacked detail and/or was not well supported. The technical requirements, proposal, and justification for the hashing method were off topic or failed to provide required level of detail. Assessed the proper backup and restoration implementation for the organization Provided an excellent description of the technical requirements, proposal, and justification for the backup and restoration system and processes. Provided an outstanding description of the technical requirements, proposal, and justification for the backup and restoration system and processes. Provided a description of the technical requirements, proposal, and justification for the backup and restoration system and processes. Provided a description of the technical requirements and proposal for the backup and restoration system and processes, but lacked an appropriate justification. Identified a technical requirement for the backup and restoration system and processes, but the proposal and justification lacked detail and/or was not well supported. The technical requirements, proposal, and justification for the backup and restoration system and processes were off topic or failed to provide required level of detail. Use of Authoritative Sources / Resources Work contains a reference list containing entries for all cited sources. Reference list entries and intext citations are correctly formatted using the appropriate IEEE style for each type of resource. The description appropriately used information from 3 or more authoritative sources, i.e. journal articles, industry or trade publications, news articles, industry or government white papers and authoritative Web sites. Work contains a reference list containing entries for all cited sources. One or two minor errors in IEEE format for in-text citations and/or reference list entries. The description appropriately used information from 3 or more authoritative sources, i.e. journal articles, industry or trade publications, news articles, industry or government white papers and authoritative Web sites. Work contains a reference list containing entries for all cited sources. No more than 5 minor errors in IEEE format for in-text citations and/or reference list entries. The description appropriately used information from 2 or more authoritative sources, i.e. journal articles, industry or trade Work publications, news articles, industry or government white papers and authoritative Web sites. Work contains a reference list containing entries for cited sources. Work contains no more than 5 minor errors in IEEE format for in-text citations and/or reference list entries. The description appropriately used information from 2 or more authoritative sources, i.e. journal articles, industry or trade publications, news articles, industry or government white papers and authoritative Web sites. Work attempts to credit sources but demonstrates a fundamental failure to understand and apply the IEEE formatting standard. The description appropriately used information from 1 or more authoritative sources, i.e. journal articles, industry or trade publications, news articles, industry or government white papers and authoritative Web sites. Reference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Navigating The Supply Chain Maze A Comprehensive Guide To Optimize Operations And Drive Success

Authors: Michael E Kirshteyn Ph D

1st Edition

B0CPQ2RBYC, 979-8870727585

More Books

Students also viewed these Databases questions