0 comments
Provided an excellent introduction or overview of national cybersecurity strategies. Explained the purpose of a national cybersecurity strategy and how it is used. Fully answered the question: why should every nation have a cybersecurity strategy? Addressed the importance of such strategies to small, resource-poor nations as well as to wealthy, developed nations. The overview appropriately used information from 3 or more authoritative sources.
Provided an outstanding introduction or overview of national cybersecurity strategies. Explained the purpose of a national cybersecurity strategy and how it is used. Addressed the question: why should every nation have a cybersecurity strategy? Addressed the importance of such strategies to small, resource-poor nations as well as to wealthy, developed nations. The overview appropriately used information from 2 or more authoritative sources.
Introduced national cybersecurity strategies; explained the purpose of a national cybersecurity strategy and how it is used. Addressed the question: why should every nation have a cybersecurity strategy? Mentioned the importance of such strategies to small, resource-poor nations as well as to wealthy, developed nations. The overview appropriately used information from 1 or more authoritative sources.
Provided an overview but the section lacked important details about national cybersecurity strategies. Information from authoritative sources was cited and used in the overview.
Attempted to provide an introduction to the paper but this section lacked detail and/or was not well supported by information drawn from authoritative sources.
The introduction and/or overview sections of the paper were off topic.
Provided an excellent discussion of the common principles and guidelines (similarities) found in both guidance documents (ENISA & CTO). Provided 5 or more specific examples of content which was similar between the two documents. Appropriately used information from 3 or more authoritative sources.
Provided an outstanding discussion of the common principles and guidelines (similarities) found in both guidance documents (ENISA & CTO). Provided 4 or more specific examples of content which was similar between the two documents. Appropriately used information from 2 or more authoritative sources.
Provided a discussion of the common principles and guidelines (similarities) found in both guidance documents (ENISA & CTO). Provided 3 or more specific examples of content which was similar between the two documents. Appropriately used information from 1 or more authoritative sources.
Provided a discussion of similarities between the two documents including at least two examples. Appropriately used information from authoritative sources.
Provided a discussion of similarities between the two documents including at least one example. The discussionlacked detail and/or was not well supported by information drawn from authoritative sources.
This section was missing, off topic, or failed to provide information about similarities in the two documents (CTO, ENISA).
Provided an excellent discussion of the unique aspects of the CTO principles and guidelines for national cybersecurity strategies. Provided 5 or more examples of specific principles or guidelines or other content which were unique to the CTO guidance. Appropriately used information from 3 or more authoritative sources.
Provided an outstanding discussion of the unique aspects of the CTO principles and guidelines for national cybersecurity strategies. Provided 4 or more examples of specific principles or guidelines or other content which were unique to the CTO guidance. Appropriately used information from 2 or more authoritative sources.
Provided a discussion of the unique aspects of the CTO principles and guidelines for national cybersecurity strategies. Provided 3 or more examples of specific principles or guidelines or other content which were unique to the CTO guidance. Appropriately used information from 1 or more authoritative sources.
Provided a discussion ofthe unique aspects of the CTO principles and guidelines for national cybersecurity strategies. Named three or more specific principles or guidelines or other content which were unique to the CTO guidance. Appropriately used information from authoritative sources.
Provided a discussion of the unique aspects of the CTO guidance document. The discussion lacked detail and/or was not well supported by information drawn from authoritative sources.
This section was missing, off topic, or failed to provide information aboutunique aspects of the CTO guidance document.
Provided an excellent discussion of the unique aspects of the ENISA principles and guidelines for national cybersecurity strategies. Provided 5 or more examples of specific principles or guidelines or other content which were unique to the ENISA guidance. Appropriately used information from 3 or more authoritative sources.
Provided an outstanding discussion of the unique aspects of the ENISA principles and guidelines for national cybersecurity strategies. Provided 4 or more examples of specific principles or guidelines or other content which were unique to the ENISA guidance. Appropriately used information from 2 or more authoritative sources.
Provided a discussion of the unique aspects of the ENISA principles and guidelines for national cybersecurity strategies. Provided 3 or more examples of specific principles or guidelines or other content which were unique to the ENISA guidance. Appropriately used information from 1 or more authoritative sources.
Provided a discussion ofthe unique aspects of the ENISA principles and guidelines for national cybersecurity strategies. Named three or more specific principles or guidelines or other content which were unique to the ENISA guidance. Appropriately used information from authoritative sources.
Provided a discussion of the unique aspects of the ENISA guidance document. The discussion lacked detail and/or was not well supported by information drawn from authoritative sources.
This section was missing, off topic, or failed to provide information aboutunique aspects of the ENISA guidance document.
Provided an excellent summary of best practice recommendations for national cybersecurity strategy development. Recommended 5 or more appropriate next steps to help the competition team prepare to answer the question: what is the best approach for developing a national cybersecurity strategy? Appropriately used information from 3 or more authoritative sources.
Provided an outstanding summary of best practice recommendations for national cybersecurity strategy development. Recommended 3 or more appropriate next steps to help the competition team prepare to answer the question: what is the best approach for developing a national cybersecurity strategy? Appropriately used information from 2 or more authoritative sources.
Provided a summary of best practice recommendations for national cybersecurity strategy development. Recommended at least one appropriate next step to help the competition team prepare to answer the question: what is the best approach for developing a national cybersecurity strategy?Appropriately used information from 1 or more authoritative sources.
Discussion provided some information about best practices for developing national cybersecurity strategies. Mentioned information obtained from authoritative sources.
Discussion provided some information about best practices for national cybersecurity strategies, but the lacked detail and/or was not supported by information from authoritative sources.
Did not address best practices for national cybersecurity strategies.
Demonstrated excellence in the integration of standard cybersecurity terminology into the case study.
Provided an outstanding integration of standard cybersecurity terminology into the case study.
Integrated standard cybersecurity terminology into the into the case study
Used standard cybersecurity terminology but this usage was not well integrated with the discussion.
Misused standard cybersecurity terminology.
Did not integrate standard cybersecurity terminology into the discussion.
Work contains a reference list containing entries for all cited resources. Reference list entries and in-text citations are correctly formatted using the appropriate APA style for each type of resource.
Work contains a reference list containing entries for all cited resources. One or two minor errors in APA format for in-text citations and/or reference list entries.
Work contains a reference list containing entries for all cited resources. No more than 3 minor errors in APA format for in-text citations and/or reference list entries.
Work has no more than three paragraphs with omissions of citations crediting sources for facts and information. Work contains a reference list containing entries for cited resources. Work contains no more than 5 minor errors in APA format for in-text citations and/or reference list entries.
Work attempts to credit sources but demonstrates a fundamental failure to understand and apply the APA formatting standard as defined in the Publication Manual of the American Psychological Association (6th ed.).
Reference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper.
Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.
Submitted work has minor style or formatting flaws but still presents a professional appearance. Submitted work is well organized and appropriately uses color, fonts, and section headings (per the assignment’s directions).
Organization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved.
Submitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement.
Submitted work meets minimum requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance.
Submitted work is poorly organized and formatted. Writing and presentation are lacking in professional style and appearance. Work does not reflect college level writing skills.
No formatting, grammar, spelling, or punctuation errors.
Work contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance.
Errors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work.
Submitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance.
Submitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage.
Submitted work is poorly executed OR does not reflect college level work.
About the Author
Daniel Kevins
Follow me
0 comments