Cyber-Attack PLEASE FOLLOW THE RUBIC
Assignment 1:
Go online and look for information about an attack on a government or military information system.
Assessment: Write a 5 paragraph essay in APA format with references and submit as required.
Grading Rubric for Assignment
Criteria
Developing
Competent
Exemplary
Weight
Topic
Vague, irrelevant information which was not connected to negligent liability or other liability associated with security work.
Captured the some aspects of negligent liability and other liability within security work.
Clearly and specifically addressed the most relevant aspects of negligent liability and other liability associated with security work.
Structure and Organization
Lacks clear organization; ideas do not follow a logical order and do not support the central focus.
Generally well organized, ideas usually follow logical order and support central focus, although greater attention to detail would improve the paper.
Well organized, ideas follow a logical order with appropriate transitions and always supporting central focus.
Development and Organization
Rarely or never uses reasons, examples or evidence to support ideas.
Generally uses appropriate reasons, examples or evidence to support ideas, although additional support would improve the paper.
Consistently and properly uses appropriate reasons, examples or evidence to support ideas.
Grammar/Mechanics
Inadequate sentence and paragraph structure with many grammar errors.
Adequate sentence and paragraph structure with few grammar errors.
Excellent sentence and paragraph structure with minor grammar errors.
APA
Serious and persistent errors in APA conventions for title page, font and spacing, page numbering, in text citation, and reference page
Generally follows APA conventions for title page, font and spacing, page numbering, in text citation and reference page but with a few minor errors
Follows APA conventions for title page, font and spacing, page numbering, in text citations and reference page
Attachments area
20170727212611sec_305_assignment
Solution Preview
In 2008, the US military’s networks were under cyber-attack and according to a top US military official, it came from a corrupted flash drive. This action forced the Pentagon to assess its digital security. The flash drive was placed in a military laptop in the Middle East and it contained harmful code that was not easily detected as it spread through both secret and non-secret systems.
(405 words)