Radford University
School of Computing and Information Sciences
Student Outcome 6-CY
(6-CY) Apply security principles and practices to maintain operations in the presence of risks and threats
|
Level 5
|
The student:
- almost always identifies the category of the type of attacks when presented with an attack scenario.
- almost always describes the steps in intrusion response.
- demonstrates competency in selecting and using tools used in cyber defense.
- almost always provides examples in technology to illustrate security design principles.
- fully describes the need and components of common security policies such as business continuity and disaster
recovery.
- almost always can apply the appropriate network, host or administrative security controls given a
scenario.
|
Level 3
|
The student:
- mostly enumerate the different categories of threats and attacks.
- mostly identify steps in intrusion response.
- demonstrates competence in using a specific tool in cyber defense when asked to use that tool.
- mostly enumerate sign principles.
- fully describe the need for common security policies such as business continuity and disaster
recovery.
- mostly apply common network, host or administrative security controls given a scenario.
|
Level 1
|
The student:
- enumerates a few categories of threats and attacks.
- cannot adequately identify all the steps in intrusion response.
- cannot adequately use a tool in cyber defense.
- can identify some but not most common secure design principles.
- can identify security policies such as disaster recovery and business ty but is unable to describe their
need.
- mostly unable to select the appropriate network, host or administrative security control given a
scenario.
|