Csia 485 project #5 | Computer Science homework help

Expertly defines goals and objectives

identifies goals and objectives in a manner that reflects a general understanding of overall effort

identifies goals and objectives in a manner that reflects a basic understanding of overall effort

identifies goals and objectives in a manner where some aspects are missing or incomplete.

does not identify goals and objectives in a manner that reflects a general understanding of overall effort.

Clearly describes and relates information security and other technology issues. Synthesizes and applies material and document relationships.

Basically describes and relates information security and other technology issues. Synthesizes and applies some material and document relationships.

Weakly describes and relates information security and other technology issues. Some synthesizing and application or applies material and document relationships.

Little description and relating information security and other technology issues. Little synthesizing or application of material and document relationships.

No description or relationship of information security or other technology issues. Doesn’t synthesize or  apply material and document relationships.

Project Expenses

Clearly identifies and articulates the cost of overall security solution.

Basically identifies and articulates the cost of overall security solution.

Weakly identifies and articulates the cost of overall security solution.

Little identification or articulation of the costs regarding technology solution. May not link any costs to technologies identified.

No identification or articulation of the costs regarding technology solution. No link of any costs to technologies identified.

Synthesizes and applies logical SDLC processes and schedule to overall solution deployment.

Basically Synthesizes and applies logical SDLC processes and schedule to overall solution deployment.

Weakly Synthesizes and applies logical SDLC processes and schedule to overall solution deployment.

Little synthesis or application of logical SDLC processes and schedule to overall solution deployment.

No synthesis or application of logical SDLC processes and schedule to overall solution deployment.

Solution Diagram and Illustration

Network diagram and accompanying illustration are strongly linked to proposed solution and content

Network diagram and accompanying illustration are generally linked to proposed solution and content

Network diagram and accompanying illustration are weakly linked to proposed solution and content

Network diagram and accompanying illustration are haphazardly linked to proposed solution and content

Network diagram and accompanying illustration are not linked to proposed solution and content

Security Strategy

Each defined milestone is directly related to overall strategy/solution and clearly mitigates the risk or issue.

Most milestones are related to overall strategy/solution and clearly mitigates the risk or issue.

Milestones are weakly related to overall strategy/solution and clearly mitigates the risk or issue.

Milestone are haphazardly related to overall strategy/solution and clearly mitigates the risk or issue.

No milestones are directly related to overall strategy/solution and clearly mitigates the risk or issue.

Clearly identifies security solutions and assumptions that consist of people, processes and technologies that relate to the risks. Covers all three requirements.

Basically identifies security solutions and assumptions that consist of people, processes and technologies that relate to the risks. Covers at least two of the three requirements.

Weakly identifies security solutions and assumptions that consist of people, processes and technologies that relate to the risks. Covers at least one of the requirements.

Little identification of security solutions and assumptions that consist of people, processes or technologies that relate to the risks.  May not cover one of the requirements.

Doesn’t identify security solutions or assumptions that consist of people, processes or technologies that relate to the risks. Doesn’t cover any of the three requirements.

Clearly describes the linkage and constraints associated with solution 

Basically describes the linkage and constraints associated with solution

Weakly describes the linkage and constraints associated with solution

Little description of the linkage and constraints associated with solution

No description of any linkage or constraints associated with solution

Timeline

Clear and detailed SDLC tasks that logically leads to the proposed solutions  

Basic SDLC tasks are provided that generally lead or infer how the proposed solution will be realized

Weak and poorly detailed SDLC tasks are provided that minimally lead or infer how the proposed solution will be realized

Haphazard and poorly detailed SDLC tasks that minimally lead or infer how the proposed solution will be realized 

No SDLC tasks are provided that lead or infer how the proposed solution will be realized

No clear and defined tasks for each solution. 

Major tasks are clearly prioritized according their importance to mitigating the risks and issues found.

Major tasks basically prioritized according their importance to mitigating the risks or issues found.

Major tasks weakly prioritized according their importance to mitigating the risks and issues found.

Few tasks prioritized according their importance to mitigating the risks or issues found.

No tasks prioritized according their importance to mitigating the risks or issues found.

Clearly defined people resources (by type) that support each task in the timeline.

Basically defined people resources (by type) that support each task in the timeline.

Weakly defined people resources (by type) that support each task in the timeline.

Little defined people resources (by type) that support each task in the timeline.

No defined people resources (by type) that support each task in the timeline.

Finds and Applies Knowledge

Used at least 5 authoritative or scholarly sources in paper. No APA style errors in sources.

Used at least 3 authoritative or scholarly sources in paper. No more than 1 APA errors in sources.

Used at least 2 authoritative or scholarly sources in paper. No more than 2 APA errors in sources.

May have used 1 authoritative or scholarly source in paper. May not have used APA style formatting.

No authoritative or scholarly sources used in paper.

All sources cited. No errors in citing material in paper.

All but 1 source cited. Had no more than 5 citing errors in paper.

All but 2 sources cited. Had no more than 10 citing errors in paper.

All but 3 sources cited. Had less than 15 APA citing errors in paper.

No sources cited or had more than 15 APA citing errors in paper.

Organization, Execution and Appearance

Prepared MS Word document, used consistent formatting, section subheadings, submitted one file, used instructor provided template, correct coversheet and separate reference page and meets minimum page count of 5 pages.

MS Word document didn’t follow up to two (2) of the following: used consistent formatting, section subheadings, submitted one file, used instructor provided template, correct coversheet and separate reference page and meets minimum page count of 5 pages. 

MS Word document didn’t follow up to four (4) of the following: used consistent formatting, section subheadings, submitted one file, used instructor provided template, correct coversheet and separate reference page and meets minimum page count of 5 pages. 

MS Word document followed only one (1) of the following: used consistent formatting, section subheadings, submitted one file, used instructor provided template, correct coversheet and separate reference page and meets minimum page count of 5 pages. 

Non MS Word document didn’t any of the following: used consistent formatting, section subheadings, submitted one file, used instructor provided template, correct coversheet and separate reference page and meets minimum page count of 5 pages. 

No grammar errors, use of first/second person, spelling or punctuation errors.

Less than 5 grammar errors, use of first/second person, spelling or punctuation errors. 

Less than 10 grammar errors, use of first/second person, spelling or punctuation errors. 

Less than 15 grammar errors, use of first/second person, spelling or punctuation errors.

More than 15 grammar errors, use of first/second person, spelling or punctuation errors.

Overall Score            

We offer the best custom writing services. We have done this question before; we can also do it for you…

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more