IT 549 Scenario Assignment Module Three Guidelines and Rubric
Overview
For the Module Three assignment, you will be provided with multiple scenarios that contain hypothetical situations pertaining to authentication and security protocols. Each situation requires you to assess the situation and propose appropriate actions. This allows you to practically apply your knowledge of authentication protocols, which will assist you in developing statements of policy for your information assurance plan.
Directions
Review the prompts and provide your responses in a Microsoft Word document. Use research-based evidence to support your responses.
Specifically, you must address the following rubric criteria:
Explain the threat and environment in each of the following types of authentication and provide a solution for each scenario below:
- Alice sends a password, and Bob compares it against a database of passwords.
- Alice sends a password, and Bob hashes it and compares it against a database of hashed passwords.
- Alice computes the hash of a password and uses it as secret key in challenge response protocol.
- Alice computes the hash of a password and sends it to Bob, who hashes it and compares it against a database of double-hashed passwords.
What to Submit
Your responses for each prompt must be submitted as two to three paragraphs and as a Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format.
Scenario Assignment Module Three Rubric
CriteriaExceeds Expectations (100%)Meets Expectations (85%)Partially Meets Expectations (55%)Does Not Meet Expectations (0%)ValueThreat and EnvironmentExceeds expectations substantiated with justification to support rationaleExplains the threat and the likely threat environment that exists within each of the given scenariosMinimally explains the threat and the likely threat environment that exists within each of the given scenariosDoes not explain the threat or the environment that exists within each of the given scenarios40SolutionExceeds expectations and the solution is substantiated by evidence-based researchProposes a solution that will provide the highest likelihood of resolving the situationProposes a solution that will provide the highest likelihood of resolving the situation but requires more research and evaluation of the threat or likely threat environmentDoes not propose a solution that will provide the highest likelihood of resolving the situation40Clear CommunicationExceeds expectations with an intentional use of language that promotes a thorough understandingConsistently and effectively communicates in an organized way to a specific audienceShows progress toward meeting expectations, but communication is inconsistent or ineffective in a way that negatively impacts understandingShows no evidence of consistent, effective, or organized communication20Total:100%

Leave a Reply
You must be logged in to post a comment.