3 slides and two tutorial pages

Critical Elements

Exemplary

Proficient

Needs Improvement

Not Evident

Value

Information Assurance – Access

Meets “Proficient“ criteria and provides specific examples to substantiate description

 

(18-20)

Provides a slide with a description of information assurance

 

(16-17)

Provides a slide describing information assurance; however, it is not accurate or lacks important detail

(14-15)

Does not provide a slide describing information assurance

 

(0-13)

20

Information Assurance – Risks

Meets “Proficient“ criteria and provides specific examples to illustrate risks

 

 

 

(18-20)

Provides a slide explaining the risks associated with non-adherence to information security processes

 

 

(16-17)

Provides a slide explaining the risks associated with non-adherence to information security processes; however, description lacks clarity or is not accurate

(14-15)

Does not provide a slide describing the risks associated with non-adherence to information security processes

 

 

(0-13)

20

Information Assurance – Countermeasures

 

Meets “Proficient“ criteria and uses specific examples to support countermeasure use

 

 

(18-20)

Provides a slide describing countermeasures to mitigate information security risks

 

 

(16-17)

Provides a slide describing countermeasures to mitigate information security risks; however, description is limited or is not accurate

(14-15)

Does not provide a slide describing the risks associated with non-adherence to information security processes

 

(0-13)

20

 

 

Instructions: Set Homepage

 

Meets “Proficient“ criteria, and the tutorial indicates the optimal settings for use and function

(18-20)

Provides a tutorial for setting the company website as the homepage for newly updated computers

(16-17)

Provides a tutorial, but it is missing significant information

 

 

(14-15)

Does not provide a tutorial for setting company website as the homepage for newly updated computers

(0-13)

20

Instructions: Cookies

 

Meets “Proficient“ criteria, and the tutorial indicates key considerations for enabling and disabling cookies

(18-20)

Provides a tutorial for enabling and disabling cookies

 

 

(16-17)

Provides a tutorial for enabling and disabling cookies, but instructions lack detail or are inaccurate

(14-15)

Does not provide a tutorial for enabling and disabling cookies

 

 

(0-13)

20

Earned Total

Comments:

100%