Radford University
School of Computing and Information Sciences
Student Outcome 6-CY

(6-CY) Apply security principles and practices to maintain operations in the presence of risks and threats

Level 5
The student:
  1. almost always identifies the category of the type of attacks when presented with an attack scenario.
  2. almost always describes the steps in intrusion response.
  3. demonstrates competency in selecting and using tools used in cyber defense.
  4. almost always provides examples in technology to illustrate security design principles.
  5. fully describes the need and components of common security policies such as business continuity and disaster recovery.
  6. almost always can apply the appropriate network, host or administrative security controls given a scenario.

Level 3
The student:
  1. mostly enumerate the different categories of threats and attacks.
  2. mostly identify steps in intrusion response.
  3. demonstrates competence in using a specific tool in cyber defense when asked to use that tool.
  4. mostly enumerate sign principles.
  5. fully describe the need for common security policies such as business continuity and disaster recovery.
  6. mostly apply common network, host or administrative security controls given a scenario.

Level 1
The student:
  1. enumerates a few categories of threats and attacks.
  2. cannot adequately identify all the steps in intrusion response.
  3. cannot adequately use a tool in cyber defense.
  4. can identify some but not most common secure design principles.
  5. can identify security policies such as disaster recovery and business ty but is unable to describe their need.
  6. mostly unable to select the appropriate network, host or administrative security control given a scenario.