Activities Guide and Evaluation Rubric - Unit 1 - Task 1 - Recognizing The Importance of Information Security

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Universidad Nacional Abierta y a Distancia

Vicerrectoría Académica y de Investigación


Course: Information Security
Code: 202016905

Activity Guide and Evaluation Rubric – Task 1 Recognizing the importance of


information security

1. Activity Description
Type of activity: Individual
Evaluation moment: Initial
Highest score of the activity: 25 points
The activity starts on: Monday, February The activity ends on:
6, 2023 Sunday, February 19, 2023
With this activity, you are expected to achieve the following learning
outcomes:

Evaluate information security risks in software development processes in


accordance with standards and the organization's security policy to ensure the
quality of software products.

The activity consists of:

Make a review of the readings corresponding to Unit 1 that are in the learning
environment.

Each student documents and publishes in the forum of the activity the question
and the answer argued, based on the readings made and their personal criteria.

Questions:

1. What is Information Security?


2. What are the pillars of information?
3. What is a vulnerability and a threat?
4. What is risk management in computer security?
5. What are security controls?

Each student must make a comment to at least one response from a classmate,
to respectfully and argue their support, complement or disagreement.

1
It is important to cite the sources that support the opinions in APA 7 format, so
that colleagues can consult them for more information.

From the participations made in the forum, the student elaborates an electronic
presentation online, presenting the relevant information of the topics developed
in the questions. The structure is as follows:

Slide 1: Cover Page


Slide 2: What is Computer Security.
Slide 3: Pillars of information.
Slide 4: Vulnerability and Threats
Slide 5: Study of computer security risks
Slide 6: Security Controls
Slide 7. Conclusions.
Slide 8. Bibliography

For the development of the activity consider that:

In the Initial Information Environment, you must:

• Check the course agenda to review the deadlines of the activity

In the Learning Environment, you must:

• Read the suggested readings for unit 1.


• Enter the forum of the activity to discuss with colleagues about the topics
referred to.

In the Evaluation Environment, you must:

• Each student sends a digital document (a Word or PDF document) that


contains the link of the electronic presentation online.

Evidence of individual work:


The individual evidence to be submitted is:

Participation in the forum of the activity.


Digital document with the link of the electronic presentation.

Evidence of collaborative work:

2
No collaborative evidence is required in this activity.

2. General Guidelines for the Development of Evidence to Submit

For Individual evidence, consider the following:

1. Before building the electronic presentation, it is important to analyze and


organize the information.
2. As you select the information, build the bibliography.
3. You can use your preferred online presentation software, some options are:
canva, emaze, prezi, genially.
4. After building the electronic presentation, copy the link of the presentation
into a Word document and send this document through the evaluation
environment. Verify that the link works correctly and does not have access
restrictions.

Please keep in mind that all individual or collaborative written products must
comply with the spelling rules and presentation conditions defined in this activity
guide.

Regarding the use of references, consider that the product of this activity must
comply with APA style.
In any case, make sure you comply with the rules and avoid academic
plagiarism. You can review your written products using the Turnitin tool found
in the virtual campus.

Under the Academic Code of Conduct, the actions that infringe the academic
order, among others, are the following: paragraph e) Plagiarism is to present
as your own work all or part of a written report, task or document of invention
carried out by another person. It also implies the use of citations or lack of
references, or it includes citations where there is no match between these and
the reference and paragraph f) To reproduce, or copy for profit, educational
resources, or results of research products, which have rights reserved for the
University. (Agreement 029 - 13 de December de 2013, article 99)

The academic penalties students will face are:


a) In case of academic fraud demonstrated in the academic work or evaluation,
the score obtained will be zero (0.0) without any disciplinary measures being
derived.

3
b) In case of proven plagiarism in academic work of any nature, the score
obtained will be zero (0.0), without any disciplinary measures being derived.

3. Evaluation Rubric Template

Type of activity: Individual


Evaluation moment: Initial
The highest score in this activity is 25 points
First evaluation High level: It appropriates the concept of Information
criterion: Security, vulnerabilities and Threats, risk management and
computer security controls and reflects it in the online
Contents: electronic presentation.
Appropriation of If your work is at this level, you can get between 10
the concept of points and 15 points.
Information
Security. Average level: Some ideas expressed in the electronic
presentation are not coherent or not all the requested
This criterion concepts are presented.
represents 15 If your work is at this level, you can get between 4
points of the points and 9 points.
total of 25 points
of the activity. Low level: The ideas embodied in the presentation do not
present an understanding of the concept of computer
security or do not deliver the presentation.
If your work is at this level, you can get between 0
points and 3 points.
Second High level: The presentation is structured appropriately,
evaluation performed using online electronic filing software, and
criterion: includes references in APA format.
If your work is at this level, you can get between 4
Form: points and 5 points.
Presentation of the
document. Average level: The presentation does not include
references, is not structured in a totally orderly manner, or
This criterion is not done in online electronic presentation software.
represents 5 If your work is at this level, you can get between 2
points of the points and 3 points.

4
total of 25 points
of the activity. Low level: The presentation is not structured in an
organized way.
If your work is at this level, you can get between 0
points and 1 point.
Third evaluation High level: Promotes the generation of diverse viewpoints
criterion: related to the theme, enriching the discussion and adding
value to it.
Participation
Participation in the If your work is at this level, you can get between 4
forum. points and 5 points.

This criterion Average level: The contents of some messages are not
represents 5 coherent with the subject matter, not all of them are original
points of the or they do not always promote the generation of different
total of 25 points points of view, enriching the discussion and adding value to
of the activity. it.
If your work is at this level, you can get between 2
points and 3 points.

Low level: The contents of the messages are not coherent


with the subject matter; they are not original, or they do not
promote the generation of different points of view for the
discussion and adding value to it or they do not carry out
the work.
If your work is at this level, you can get between 0
points and 1 point.

You might also like