Assessment 2: Report Rubric STANDARDS Assessment Criteria High Distinction (HD) 80%-100% Distinction

Assessment 2: Report Rubric

STANDARDS

Assessment Criteria

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

High Distinction (HD)
80%-100%

Distinction (D)
70%-79%

Credit (C)
60%-69%

Pass (P)
50%-59%

Fail (N)
0%-49%

Identification of security
issues (two for IoT and two
for IT)
8 marks

A total of four security issues
comprising of; two security issues for
IoT and two security issues for IT
identified. The security issues must be
related to hardware, software,
firmware, and/or protocols among
technology information provided in
the case study.
AND
The context of each security issue has
been clearly described supported with
relevant evidence.
AND
The consequence or risk imposed by
each security issue to the organisation
has been described supported with
relevant evidence.
(Relevant evidence are proper
references to authoritative sources for
the subject discussed such as
technical documentation and/or
academic literature.)

A total of three security issues
comprising of; one/two security
issues for IoT and one/two security
issues for IT identified. The security
issues must be related to hardware,
software, firmware, and/or
protocols among technology
information provided in the case
study.
AND
The context of each security issue
has been clearly described
supported with relevant evidence.
AND
The consequence or risk imposed by
each security issue to the
organisation has been described
supported with relevant evidence.
(Relevant evidence are proper
references to authoritative sources
for the subject discussed such as
technical documentation and/or
academic literature.)

A total of at least two security issues
comprising of; one/two security
issues for IoT and/or one/two
security issues for IT identified. The
security issues must be related to
hardware, software, firmware,
and/or protocols among technology
information provided in the case
study.
AND/OR
The context of at least two security
issue has been adequately described
supported with relevant evidence.
AND/OR
The consequence or risk imposed by
each security issue to the
organisation has been listed
supported with relevant evidence.
(Relevant evidence are proper
references to authoritative sources
for the subject discussed such as
technical documentation and/or
academic literature.)

At least one security issue
comprising of; one security issue for
IoT or one security issues for IT
identified. The security issue must
be related to hardware, software,
firmware, and/or protocols among
technology information provided in
the case study.
AND/OR
The context of at least two security
issue has been adequately
described supported with relevant
evidence.
AND/OR
The consequence or risk imposed
by each security issue to the
organisation has been listed
supported with relevant evidence.
(Relevant evidence are proper
references to authoritative sources
for the subject discussed such as
technical documentation and/or
academic literature.)

At least one security issue have not
been identified as required.
AND/OR
The context the security issue(s)
has not been adequately described
with relevant evidence.
AND/OR
The consequence or risk imposed
by each security issue to the
organisation has not been listed
with relevant evidence.

AssignmentTutorOnline

Actual attacks described for
IoT and IT
8 marks

Provide an example of an attack
that has occurred related to one
of the security issues identified
for IoT for task 1.
AND
Provide an example of an attack
that has occurred related to one
of the security issues identified
for IT for task 1.
The attack has been described in
detail and relevant to the context
of the case study and related to a
security issue identified.
(You may refer to incidents
reported in relevant media,
technical reports by relevant
organisations, and/or academic
literature.)

Provide an example of an attack
that has occurred related to one
of the security issues identified
for IoT for task 1.
AND/OR
Provide an example of an attack
that has occurred related to one
of the security issues identified
for IT for task 1.
The attack has been described in
detail and relevant to the
context of the case study and
related to a security issue
identified.
(You may refer to incidents
reported in relevant media,
technical reports by relevant
organisations, and/or academic
literature.)

Provide an example of an attack
that has occurred related to one
of the security issues identified
for IoT for task 1.
AND/OR
Provide an example of an attack
that has occurred related to one
of the security issues identified
for IT for task 1.
The attack has been briefly
described and relevant to the
context of the case study and
related to a security issue
identified.
(You may refer to incidents
reported in relevant media,
technical reports by relevant
organisations, and/or academic
literature.)

Provide an example of an attack
that has occurred related to
one of the security issues
identified for IoT for task 1.
AND/OR
Provide an example of an attack
that has occurred related to
one of the security issues
identified for IT for task 1.
The attack has been briefly
described.
(You may refer to incidents
reported in relevant media,
technical reports by relevant
organisations, and/or academic
literature.)

Required examples not
provided.
AND/OR
The attack has not been
described.

Two vulnerabilities/CVE
explained
8 marks

Two vulnerabilities that exist in
the organisation explained in
detail. These should be support
with relevant evidence such as
CVE, technical documentation
and/or academic literature.

Two vulnerabilities that exist in
the organisation identified and
at least one explained in detail.
These should be support with
relevant evidence such as CVE,
technical documentation and/or
academic literature.

Two vulnerabilities that exist in
the organisation identified.
These should be support with
relevant evidence such as CVE,
technical documentation and/or
academic literature.

One vulnerability that exists in
the organisation identified.
These should be support with
relevant evidence such as CVE,
technical documentation
and/or academic literature.

A vulnerability that exists in
the organisation has not
been identified and/or
supported with relevant
evidence.

Solutions proposed and
justified to address the four
security issues identified
8 marks

The solutions provided should
address all four security issues
identified supported with relevant
evidence
AND
should mitigate the risks
identified in the organisation.
AND
Students should use the Ms Visio
diagram provided to illustrate
changes and solution proposed.
(Relevant evidence are proper
references to authoritative
sources for the subject discussed
such as technical documentation
and/or academic literature.)

The solutions provided should
address at least three security
issues identified supported with
relevant evidence
AND
should mitigate the risks
identified in the organisation.
AND
Students should use the Ms
Visio diagram provided to
illustrate changes and solution
proposed.
(Relevant evidence are proper
references to authoritative
sources for the subject
discussed such as technical
documentation and/or
academic literature.)

The solutions provided should
address at least two security
issues identified supported with
relevant evidence
AND/OR
should mitigate the risks
identified in the organisation.
AND
Students should use the Ms
Visio diagram provided to
illustrate changes and solution
proposed.
(Relevant evidence are proper
references to authoritative
sources for the subject
discussed such as technical
documentation and/or
academic literature.)

The solutions provided should
address at least one security
issue identified supported with
relevant evidence
AND/OR
should mitigate the risks
identified in the organisation.
AND/OR
Students should use the Ms
Visio diagram provided to
illustrate changes and solution
proposed.
(Relevant evidence are proper
references to authoritative
sources for the subject
discussed such as technical
documentation and/or
academic literature.)

The solutions provided do
not address any security
issue identified supported
with relevant evidence
AND/OR
Does not mitigate the risks
identified in the
organisation.
AND/OR
The changes have not been
illustrated in the Ms Visio
diagram provided.

Quality of report based,
depth of research, critique,
and writing
8 marks

Demonstrates skilful use of high
quality, credible, relevant sources
to develop ideas that are
pertinent to the discipline and
genre of the writing
AND
The issue / problem to be
considered critically is stated
clearly and described
comprehensively (delivering all
relevant information necessary
for a full understanding).
AND
Uses language that skilfully and
effectively communicates
meaning to readers with clarity
and fluency, and is virtually error
free

Demonstrates consistent use
of a range of credible,
relevant sources to support
key ideas that are pertinent
to the discipline and genre of
the writing
AND
The issue/ problem to be
considered critically is stated
clearly and described
thoroughly.
AND
Uses language that
effectively conveys meaning
to readers with clarity. Any
errors which occur do not
reduce effectiveness of
communication.

Demonstrates consistent use
of credible, relevant sources
to support ideas that are
situated within the discipline
and genre of the writing.
AND
The issue / problem to be
considered critically is stated
clearly and described with
enough information for an
adequate understanding.
There are no omissions
and/or errors.
AND
Uses language that generally
conveys meaning to readers
with clarity although writing
may include some errors

Demonstrates some use of
credible, relevant sources to
support ideas that are
situated within the discipline
and genre of the writing.
AND
The issue / problem to be
considered critically is stated
clearly and described with
enough information for an
adequate understanding.
There are some omissions
and/or errors.
AND
Uses language sufficiently
well to convey basic
meaning although errors
reduce effectiveness of
communication

Did not demonstrate
consistent use of credible,
relevant sources to support
ideas that are situated
within the discipline and
genre of the writing.
AND
The issue / problem to be
considered critically is not
clearly stated and described.
There are significant
omissions and/or errors.
AND
Did not use language that
conveys meaning to readers
with sufficient clarity and
includes numerous errors.