Expert answer:Capstone assignment

Expert answer:The Capstone Project will require you to submit a research paper and present to the class your findings.The Capstone Project requires you to take a deep dive into a security incident such as Target, OPM, or Equifax’s cyber breach.Students will review the incident from the lens of a CISO before, during, and after the breach to determine the impact of the event. Each breach will require an analysis of the security models, methodologies, policies, standards, procedures, and technologies in place before and after the incident. The organization should be critiqued for their management of the incident including the disclosure of the breach, follow-up with affected stakeholders, and both the short and long-term impacts of the breach from a company, industry, and national perspective. When possible, students should identify the attackers and the attack vectors used to compromise the system(s). Furthermore, students should provide guidance and strategies for companies to prevent and mitigate similar attacks.The grading rubric and additional details are attached.
capstone_project_rubric.pdf

Unformatted Attachment Preview

Final Paper Grading Rubric
BUIS 367
Date:
Name:
CATEGORY
Unacceptable (Below
Standards)
There is not clear
introduction to the paper
and the structure for the rest
of the paper is missing or
incoherent
Acceptable (Meets
Standards)
The abstract states the
main topic but does
not adequately prepare
the reader for the rest
of the paper
Good (Occasionally
Exceeds)
Clearly states the
purpose of the paper,
topic and previews
the structure of the
paper
Introduction
(Identify the security
incident and the subject
of the paper. What do
you hope to achieve by
taking a deep dive into
this event– set the tone
and importance of the
topic)
Background (Setup the
incident – what occurred
before the event? What
lead up to the event?
Provide details about the
company )
Does not adequately
introduce event. Does not
describe events to be
reviewed. Lacks adequate
supporting statements.
Conveys topic, but not
key points(s).
Describes events to be
reviewed. General
supporting statements.
Conveys incident and
key points(s). Clearly
delineates events and
culture to be
reviewed. General
supporting
statements.
Little evidence material is
logically organized into
topic, subtopics or related
to topic. Many transitions
are unclear or nonexistent.
Most material clearly
related to incident,
background. Material
may not be organized
within background.
Attempts to provide
variety of transitions
leading up to the
incident
Incident (What
happened during the
event? This section
describes the incident
leading to the lessons
learned and
opportunities for
improvement.)
Discussion, Application,
or Limitations (How
would someone apply or
learn from the event?
How can company avoid
a similar event? What is
the scope of your
solution – would it work
for everyone?)
Summary
Few sources supporting the
incident. Sources
insignificant or
unsubstantiated. Severely
lacking details.
References
Abstract

Excellent (Exceeds
Standards)
Clearly and concisely
states the purpose of the
paper, outlining the
structure of the paper,
and the results in an
engaging and though
provoking manner.
Strong introduction of
incident’s key points(s),
terms. Clearly delineates
events to be reviewed.
Specific supporting
statements.
SCORE
All material clearly
related to incident,
background, and
logically organized.
Clear, varied
transitions linking
background to the
incident
All material clearly
related to incident and
background. Strong
organization and
integration of material.
Strong transitions linking
background to the
incident
20
Sources generally
acceptable but not
enough research
(evidence) to support
an understanding of
the event.
Sources well selected
to support details of
the event with some
research in support of
detailed breach.
Strong peer- reviewed
research based support
for what actually
occurred.
20
No evidence of structure or
organization.
Logical organization;
organization of ideas
not fully developed.
Discussion,
Application, and
Limitations are
present but not
perfected.
Writer demonstrates
logical and subtle
sequencing of ideas
through well-developed
paragraphs; transitions
are used to enhance
organization.
20
Does not summarize
evidence with respect to the
incident Does not discuss
the impact of researched
material on topic.
Review of key
conclusions. Some
integration with events
of incident. Discusses
impact of researched
material on topic.
Strong review of key
conclusions. Strong
integration with
events of the
incident. Discusses
impact of researched
material on topic.
Strong review of key
conclusions. Strong
integration with events of
the incident. Insightful
discussion of impact of
the researched material
on topic.
10
Done in the correct format
with many errors. Includes
less than 5 references.
Done in the correct
format with some
errors. Includes less
than 7 references
Done in the correct
format with a few
errors. Includes less
than 11 references
Done in the correct
format with no errors.
Includes more than 10
references
5
10
15
The paper must present original content created by the authors. The submission may not
have a SafeAssign score greater than 5% otherwise the paper will earn a 0. Unique thought,
reflection and contributions are required for this assignment.




All references must be included in the paper and cited properly, 20 points will be deducted for
unused references.
Ten points (-10) will be deducted for grammatical, spelling, and punctuation that detract from the
paper
The style of the document must meet APA standards and word choice must be profession, ten
points (-10) will be deducted for anything less and/or if the writing does not flow (ie choppy,
awkward, or unclear passages that impact readability)
The paper should be at least a total of 6 full pages (without diagrams and/or figures) to
adequately discuss and vet the cyber incident. For every page under 6, 50 points will be deducted.
o Page count will be based on 12 point, Times New Roman, 1.5 spacing, 1 inch margins

Purchase answer to see full
attachment

How it works

  1. Paste your instructions in the instructions box. You can also attach an instructions file
  2. Select the writer category, deadline, education level and review the instructions 
  3. Make a payment for the order to be assignment to a writer
  4.  Download the paper after the writer uploads it 

Will the writer plagiarize my essay?

You will get a plagiarism-free paper and you can get an originality report upon request.

Is this service safe?

All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 20% with the discount code ESSAYHELP