程序代写案例-7808ICT
时间:2022-06-16
7808ICT: Assessment 2 Marking Criteria Weighting: 50% (Individual)
Description Outstanding Very Good Good Satisfactory Limited No Attempt
Incident
Investigation
- Question 1
The correct answer is
provided. An
outstanding explanation
of the process for finding
the answer is provided.
The student shows in
depth understanding of
the nature of the data
analyzed. The student
provided extremely
significant screenshots
and diagrams to support
their reasoning.
The correct answer is
provided. A very good
explanation of the
process for finding the
answer is provided. The
student shows very good
understanding of the
nature of the data
analyzed. The student
provided significant
screenshots and
diagrams to support their
reasoning.
The correct or very close
to correct answer is
provided. A good
explanation of the
process for finding the
answer is provided. The
student shows good
understanding of the
nature of the data
analyzed. The student
provided relevant
screenshots to support
their reasoning.
The correct or close to
correct answer is
provided. A satisfactory
explanation of the
process for finding the
answer is provided.
The student shows a
satisfactory
understanding of the
nature of the data
analyzed. The student
provided screenshots
with satisfactory
explanation.
An incorrect answer is
provided. Very little
explanation of the
process for finding the
answer is provided. The
student shows little
understanding of the
nature of the data
analyzed. The student
provided irrelevant or no
screenshots with limited
explanation.
No evidence
that the task
was
attempted.
Plagiarism or
academic
dishonesty
detected.
Marks 5 4 3 2 1 0
Incident
Investigation
- Question 2
The correct answer is
provided. An
outstanding explanation
of the process for finding
the answer is provided.
The student shows in
depth understanding of
the nature of the data
analyzed. The student
provided extremely
significant screenshots
and diagrams to support
their reasoning.
The correct answer is
provided. A very good
explanation of the
process for finding the
answer is provided. The
student shows very good
understanding of the
nature of the data
analyzed. The student
provided significant
screenshots and
diagrams to support their
reasoning.
The correct or very close
to correct answer is
provided. A good
explanation of the
process for finding the
answer is provided. The
student shows good
understanding of the
nature of the data
analyzed. The student
provided relevant
screenshots to support
their reasoning.
The correct or close to
correct answer is
provided. A satisfactory
explanation of the
process for finding the
answer is provided.
The student shows a
satisfactory
understanding of the
nature of the data
analyzed. The student
provided screenshots
with satisfactory
explanation.
An incorrect answer is
provided. Very little
explanation of the
process for finding the
answer is provided. The
student shows little
understanding of the
nature of the data
analyzed. The student
provided irrelevant or no
screenshots with limited
explanation.
No evidence
that the task
was
attempted.
Plagiarism or
academic
dishonesty
detected.
Marks 5 4 3 2 1 0
Description Outstanding Very Good Good Satisfactory Limited No Attempt
Incident
Investigation
- Question 3
The correct answer is
provided. An
outstanding explanation
of the process for finding
the answer is provided.
The student shows in
depth understanding of
the nature of the data
analyzed. The student
provided extremely
significant screenshots
and diagrams to support
their reasoning.
The correct answer is
provided. A very good
explanation of the
process for finding the
answer is provided. The
student shows very good
understanding of the
nature of the data
analyzed. The student
provided significant
screenshots and
diagrams to support their
reasoning.
The correct or very close
to correct answer is
provided. A good
explanation of the
process for finding the
answer is provided. The
student shows good
understanding of the
nature of the data
analyzed. The student
provided relevant
screenshots to support
their reasoning.
The correct or close to
correct answer is
provided. A satisfactory
explanation of the
process for finding the
answer is provided.
The student shows a
satisfactory
understanding of the
nature of the data
analyzed. The student
provided screenshots
with satisfactory
explanation.
An incorrect answer is
provided. Very little
explanation of the
process for finding the
answer is provided. The
student shows little
understanding of the
nature of the data
analyzed. The student
provided irrelevant or no
screenshots with limited
explanation.
No evidence
that the task
was
attempted.
Plagiarism or
academic
dishonesty
detected.
Marks 5 4 3 2 1 0
Incident
Investigation
- Question 4
The correct answer is
provided. An
outstanding explanation
of the process for finding
the answer is provided.
The student shows in
depth understanding of
the nature of the data
analyzed. The student
provided extremely
significant screenshots
and diagrams to support
their reasoning.
The correct answer is
provided. A very good
explanation of the
process for finding the
answer is provided. The
student shows very good
understanding of the
nature of the data
analyzed. The student
provided significant
screenshots and
diagrams to support their
reasoning.
The correct or very close
to correct answer is
provided. A good
explanation of the
process for finding the
answer is provided. The
student shows good
understanding of the
nature of the data
analyzed. The student
provided relevant
screenshots to support
their reasoning.
The correct or close to
correct answer is
provided. A satisfactory
explanation of the
process for finding the
answer is provided.
The student shows a
satisfactory
understanding of the
nature of the data
analyzed. The student
provided screenshots
with satisfactory
explanation.
An incorrect answer is
provided. Very little
explanation of the
process for finding the
answer is provided. The
student shows little
understanding of the
nature of the data
analyzed. The student
provided irrelevant or no
screenshots with limited
explanation.
No evidence
that the task
was
attempted.
Plagiarism or
academic
dishonesty
detected.
Marks 5 4 3 2 1 0
Description Outstanding Very Good Good Satisfactory Limited No Attempt
Incident
Investigation
- Question 5
The correct answer is
provided. An
outstanding explanation
of the process for finding
the answer is provided.
The student shows in
depth understanding of
the nature of the data
analyzed. The student
provided extremely
significant screenshots
and diagrams to support
their reasoning.
The correct answer is
provided. A very good
explanation of the
process for finding the
answer is provided. The
student shows very good
understanding of the
nature of the data
analyzed. The student
provided significant
screenshots and
diagrams to support their
reasoning.
The correct or very close
to correct answer is
provided. A good
explanation of the
process for finding the
answer is provided. The
student shows good
understanding of the
nature of the data
analyzed. The student
provided relevant
screenshots to support
their reasoning.
The correct or close to
correct answer is
provided. A satisfactory
explanation of the
process for finding the
answer is provided.
The student shows a
satisfactory
understanding of the
nature of the data
analyzed. The student
provided screenshots
with satisfactory
explanation.
An incorrect answer is
provided. Very little
explanation of the
process for finding the
answer is provided. The
student shows little
understanding of the
nature of the data
analyzed. The student
provided irrelevant or no
screenshots with limited
explanation.
No evidence
that the task
was
attempted.
Plagiarism or
academic
dishonesty
detected.
Marks 5 4 3 2 1 0
Incident
Investigation
- Question 6
The correct answer is
provided. An
outstanding explanation
of the process for finding
the answer is provided.
The student shows in
depth understanding of
the nature of the data
analyzed. The student
provided extremely
significant screenshots
and diagrams to support
their reasoning.
The correct answer is
provided. A very good
explanation of the
process for finding the
answer is provided. The
student shows very good
understanding of the
nature of the data
analyzed. The student
provided significant
screenshots and
diagrams to support their
reasoning.
The correct or very close
to correct answer is
provided. A good
explanation of the
process for finding the
answer is provided. The
student shows good
understanding of the
nature of the data
analyzed. The student
provided relevant
screenshots to support
their reasoning.
The correct or close to
correct answer is
provided. A satisfactory
explanation of the
process for finding the
answer is provided.
The student shows a
satisfactory
understanding of the
nature of the data
analyzed. The student
provided screenshots
with satisfactory
explanation.
An incorrect answer is
provided. Very little
explanation of the
process for finding the
answer is provided. The
student shows little
understanding of the
nature of the data
analyzed. The student
provided irrelevant or no
screenshots with limited
explanation.
No evidence
that the task
was
attempted.
Plagiarism or
academic
dishonesty
detected.
Marks 5 4 3 2 1 0
Description Outstanding Very Good Good Satisfactory Limited No Attempt
Incident
Investigation
– Question 7
The correct answer is
provided. An
outstanding explanation
of the process for finding
the answer is provided.
The student shows in
depth understanding of
the nature of the data
analyzed. The student
provided extremely
significant screenshots
and diagrams to support
their reasoning.
The correct answer is
provided. A very good
explanation of the
process for finding the
answer is provided. The
student shows very good
understanding of the
nature of the data
analyzed. The student
provided significant
screenshots and
diagrams to support their
reasoning.
The correct or very close
to correct answer is
provided. A good
explanation of the
process for finding the
answer is provided. The
student shows good
understanding of the
nature of the data
analyzed. The student
provided relevant
screenshots to support
their reasoning.
The correct or close to
correct answer is
provided. A satisfactory
explanation of the
process for finding the
answer is provided.
The student shows a
satisfactory
understanding of the
nature of the data
analyzed. The student
provided screenshots
with satisfactory
explanation.
An incorrect answer is
provided. Very little
explanation of the
process for finding the
answer is provided. The
student shows little
understanding of the
nature of the data
analyzed. The student
provided irrelevant or no
screenshots with limited
explanation.
No evidence
that the task
was
attempted.
Plagiarism or
academic
dishonesty
detected.
Marks 5 4 3 2 1 0
Incident
Investigation
– Question 8
The correct answer is
provided. An
outstanding explanation
of the process for finding
the answer is provided.
The student shows in
depth understanding of
the nature of the data
analyzed. The student
provided extremely
significant screenshots
and diagrams to support
their reasoning.
The correct answer is
provided. A very good
explanation of the
process for finding the
answer is provided. The
student shows very good
understanding of the
nature of the data
analyzed. The student
provided significant
screenshots and
diagrams to support their
reasoning.
The correct or very close
to correct answer is
provided. A good
explanation of the
process for finding the
answer is provided. The
student shows good
understanding of the
nature of the data
analyzed. The student
provided relevant
screenshots to support
their reasoning.
The correct or close to
correct answer is
provided. A satisfactory
explanation of the
process for finding the
answer is provided.
The student shows a
satisfactory
understanding of the
nature of the data
analyzed. The student
provided screenshots
with satisfactory
explanation.
An incorrect answer is
provided. Very little
explanation of the
process for finding the
answer is provided. The
student shows little
understanding of the
nature of the data
analyzed. The student
provided irrelevant or no
screenshots with limited
explanation.
No evidence
that the task
was
attempted.
Plagiarism or
academic
dishonesty
detected.
Marks 5 4 3 2 1 0
Description Outstanding Very Good Good Satisfactory Limited No Attempt
Incident
Investigation
– Question 9
The correct answer is
provided. An
outstanding explanation
of the process for finding
the answer is provided.
The student shows in
depth understanding of
the nature of the data
analyzed. The student
provided extremely
significant screenshots
and diagrams to support
their reasoning.
The correct answer is
provided. A very good
explanation of the
process for finding the
answer is provided. The
student shows very good
understanding of the
nature of the data
analyzed. The student
provided significant
screenshots and
diagrams to support their
reasoning.
The correct or very close
to correct answer is
provided. A good
explanation of the
process for finding the
answer is provided. The
student shows good
understanding of the
nature of the data
analyzed. The student
provided relevant
screenshots to support
their reasoning.
The correct or close to
correct answer is
provided. A satisfactory
explanation of the
process for finding the
answer is provided.
The student shows a
satisfactory
understanding of the
nature of the data
analyzed. The student
provided screenshots
with satisfactory
explanation.
An incorrect answer is
provided. Very little
explanation of the
process for finding the
answer is provided. The
student shows little
understanding of the
nature of the data
analyzed. The student
provided irrelevant or no
screenshots with limited
explanation.
No evidence
that the task
was
attempted.
Plagiarism or
academic
dishonesty
detected.
Marks 5 4 3 2 1 0
Incident
Investigation
– Question
10
The correct answer is
provided. An
outstanding explanation
of the process for finding
the answer is provided.
The student shows in
depth understanding of
the nature of the data
analyzed. The student
provided extremely
significant screenshots
and diagrams to support
their reasoning.
The correct answer is
provided. A very good
explanation of the
process for finding the
answer is provided. The
student shows very good
understanding of the
nature of the data
analyzed. The student
provided significant
screenshots and
diagrams to support their
reasoning.
The correct or very close
to correct answer is
provided. A good
explanation of the
process for finding the
answer is provided. The
student shows good
understanding of the
nature of the data
analyzed. The student
provided relevant
screenshots to support
their reasoning.
The correct or close to
correct answer is
provided. A satisfactory
explanation of the
process for finding the
answer is provided.
The student shows a
satisfactory
understanding of the
nature of the data
analyzed. The student
provided screenshots
with satisfactory
explanation.
An incorrect answer is
provided. Very little
explanation of the
process for finding the
answer is provided. The
student shows little
understanding of the
nature of the data
analyzed. The student
provided irrelevant or no
screenshots with limited
explanation.
No evidence
that the task
was
attempted.
Plagiarism or
academic
dishonesty
detected.
Marks 5 4 3 2 1 0
Description Outstanding Very Good Good Satisfactory Limited No Attempt
Visualization
– Panel 1
Design
An outstanding
description of the design
of the panel, outstanding
explanations of the
searches used, and the
importance and purpose
of the panels are
integrated together. Uses
multiple examples of
required Splunk
functionality with
multiple relevant sub
commands.
An excellent description
of how you incorporated
command functionality
into the panel and very
clear reasoning for why
the commands are
required for the panel.
A very good description
of the design of the
panel, very good
explanations of the
searches used, and the
importance and purpose
of the panel.
Uses several examples of
required Splunk
functionality with
multiple relevant sub
commands.
A very good, detailed
description of how you
incorporated command
functionality into the
panel and very good
reasoning for why the
commands are required
for the panel.
A good description of the
design of the panel, good
explanations of the
searches used, and the
importance and purpose
of the panel.
Uses one example of
required Splunk
functionality with
multiple relevant sub
commands.
A good description of
how you incorporated
command functionality
into the panel and good
reasoning for why the
commands are required
for the panel.
A satisfactory
description of the
design of the panel,
satisfactory
explanations of the
searches used, and the
purpose of the panel.
Uses one example of
required Splunk
functionality with
multiple relevant sub
commands.
A satisfactory
description of how you
incorporated command
functionality into the
panel and some
reasoning for why the
commands are required
for the panel.
A basic description of the
design of the panel, little
to no explanations of the
searches used, and the
purpose of the panel is
unclear.
Uses no examples of
required Splunk
functionality with
multiple relevant sub
commands.
Little to no description of
how you incorporated
command functionality
into the panel and no
reasoning for why the
commands are required
for the panel.
No evidence
that the task
was
attempted.
Plagiarism or
academic
dishonesty
detected.
Marks 10 8 6 4 2 0
Description Outstanding Very Good Good Satisfactory Limited No Attempt
Visualization
– Panel 2
Design
An outstanding
description of the design
of the panel, outstanding
explanations of the
searches used, and the
importance and purpose
of the panels are
integrated together. Uses
multiple examples of
required Splunk
functionality with
multiple relevant sub
commands.
An excellent description
of how you incorporated
command functionality
into the panel and very
clear reasoning for why
the commands are
required for the panel.
A very good description
of the design of the
panel, very good
explanations of the
searches used, and the
importance and purpose
of the panel.
Uses several examples of
required Splunk
functionality with
multiple relevant sub
commands.
A very good, detailed
description of how you
incorporated command
functionality into the
panel and very good
reasoning for why the
commands are required
for the panel.
A good description of the
design of the panel, good
explanations of the
searches used, and the
importance and purpose
of the panel.
Uses one example of
required Splunk
functionality with
multiple relevant sub
commands.
A good description of
how you incorporated
command functionality
into the panel and good
reasoning for why the
commands are required
for the panel.
A satisfactory
description of the
design of the panel,
satisfactory
explanations of the
searches used, and the
purpose of the panel.
Uses one example of
required Splunk
functionality with
multiple relevant sub
commands.
A satisfactory
description of how you
incorporated command
functionality into the
panel and some
reasoning for why the
commands are required
for the panel.
A basic description of the
design of the panel, little
to no explanations of the
searches used, and the
purpose of the panel is
unclear.
Uses no examples of
required Splunk
functionality with
multiple relevant sub
commands.
Little to no description of
how you incorporated
command functionality
into the panel and no
reasoning for why the
commands are required
for the panel.
No evidence
that the task
was
attempted.
Plagiarism or
academic
dishonesty
detected.
Marks 10 8 6 4 2 0
Description Outstanding Very Good Good Satisfactory Limited No Attempt
Visualization
– Panel 3
Design
An outstanding
description of the design
of the panel, outstanding
explanations of the
searches used, and the
importance and purpose
of the panels are
integrated together. Uses
multiple examples of
required Splunk
functionality with
multiple relevant sub
commands.
An excellent description
of how you incorporated
command functionality
into the panel and very
clear reasoning for why
the commands are
required for the panel.
A very good description
of the design of the
panel, very good
explanations of the
searches used, and the
importance and purpose
of the panel.
Uses several examples of
required Splunk
functionality with
multiple relevant sub
commands.
A very good, detailed
description of how you
incorporated command
functionality into the
panel and very good
reasoning for why the
commands are required
for the panel.
A good description of the
design of the panel, good
explanations of the
searches used, and the
importance and purpose
of the panel.
Uses one example of
required Splunk
functionality with
multiple relevant sub
commands.
A good description of
how you incorporated
command functionality
into the panel and good
reasoning for why the
commands are required
for the panel.
A satisfactory
description of the
design of the panel,
satisfactory
explanations of the
searches used, and the
purpose of the panel.
Uses one example of
required Splunk
functionality with
multiple relevant sub
commands.
A satisfactory
description of how you
incorporated command
functionality into the
panel and some
reasoning for why the
commands are required
for the panel.
A basic description of the
design of the panel, little
to no explanations of the
searches used, and the
purpose of the panel is
unclear.
Uses no examples of
required Splunk
functionality with
multiple relevant sub
commands.
Little to no description of
how you incorporated
command functionality
into the panel and no
reasoning for why the
commands are required
for the panel.
No evidence
that the task
was
attempted.
Plagiarism or
academic
dishonesty
detected.
Marks 10 8 6 4 2 0
Description Outstanding Very Good Good Satisfactory Limited No Attempt
Visualization
– Panel 4
Design
An outstanding
description of the design
of the panel, outstanding
explanations of the
searches used, and the
importance and purpose
of the panels are
integrated together. Uses
multiple examples of
required Splunk
functionality with
multiple relevant sub
commands.
An excellent description
of how you incorporated
command functionality
into the panel and very
clear reasoning for why
the commands are
required for the panel.
A very good description
of the design of the
panel, very good
explanations of the
searches used, and the
importance and purpose
of the panel.
Uses several examples of
required Splunk
functionality with
multiple relevant sub
commands.
A very good, detailed
description of how you
incorporated command
functionality into the
panel and very good
reasoning for why the
commands are required
for the panel.
A good description of the
design of the panel, good
explanations of the
searches used, and the
importance and purpose
of the panel.
Uses one example of
required Splunk
functionality with
multiple relevant sub
commands.
A good description of
how you incorporated
command functionality
into the panel and good
reasoning for why the
commands are required
for the panel.
A satisfactory
description of the
design of the panel,
satisfactory
explanations of the
searches used, and the
purpose of the panel.
Uses one example of
required Splunk
functionality with
multiple relevant sub
commands.
A satisfactory
description of how you
incorporated command
functionality into the
panel and some
reasoning for why the
commands are required
for the panel.
A basic description of the
design of the panel, little
to no explanations of the
searches used, and the
purpose of the panel is
unclear.
Uses no examples of
required Splunk
functionality with
multiple relevant sub
commands.
Little to no description of
how you incorporated
command functionality
into the panel and no
reasoning for why the
commands are required
for the panel.
No evidence
that the task
was
attempted.
Plagiarism or
academic
dishonesty
detected.
Marks 10 8 6 4 2 0
Description Outstanding Very Good Good Satisfactory Limited No Attempt
Visualization
– Panel 5
Design
An outstanding
description of the design
of the panel, outstanding
explanations of the
searches used, and the
importance and purpose
of the panels are
integrated together. Uses
multiple examples of
required Splunk
functionality with
multiple relevant sub
commands.
An excellent description
of how you incorporated
command functionality
into the panel and very
clear reasoning for why
the commands are
required for the panel.
A very good description
of the design of the
panel, very good
explanations of the
searches used, and the
importance and purpose
of the panel.
Uses several examples of
required Splunk
functionality with
multiple relevant sub
commands.
A very good, detailed
description of how you
incorporated command
functionality into the
panel and very good
reasoning for why the
commands are required
for the panel.
A good description of the
design of the panel, good
explanations of the
searches used, and the
importance and purpose
of the panel.
Uses one example of
required Splunk
functionality with
multiple relevant sub
commands.
A good description of
how you incorporated
command functionality
into the panel and good
reasoning for why the
commands are required
for the panel.
A satisfactory
description of the
design of the panel,
satisfactory
explanations of the
searches used, and the
purpose of the panel.
Uses one example of
required Splunk
functionality with
multiple relevant sub
commands.
A satisfactory
description of how you
incorporated command
functionality into the
panel and some
reasoning for why the
commands are required
for the panel.
A basic description of the
design of the panel, little
to no explanations of the
searches used, and the
purpose of the panel is
unclear.
Uses no examples of
required Splunk
functionality with
multiple relevant sub
commands.
Little to no description of
how you incorporated
command functionality
into the panel and no
reasoning for why the
commands are required
for the panel.
No evidence
that the task
was
attempted.
Plagiarism or
academic
dishonesty
detected.
Marks 10 8 6 4 2 0
Description Outstanding Very Good Good Satisfactory Limited No Attempt
Strategic
Planning -
Threat
Intelligence
Outstanding
description of Threat
Intelligence processes
and policies relevant to
Frothly with extensive
reasoning and well
thought out arguments
as to why processes are
recommended. Shows
outstanding
understanding of
Threat Intelligence
theory and models
strongly applied to the
Frothly environment
with respect to the
selected cybercrime
syndicate.
Very Good description of
Threat Intelligence
processes and policies
relevant to Frothly with
very good reasoning and
well thought out
arguments as to why
processes are
recommended. Shows
Very Good understanding
of Threat Intelligence
theory and models
directly applied to the
Frothly environment with
respect to the selected
cybercrime syndicate.
Good description of
Threat Intelligence
processes and policies
relevant to Frothly with
good reasoning and
arguments as to why
processes are
recommended. Shows
good understanding of
Threat Intelligence
theory and models
applied to the Frothly
environment with
respect to the selected
cybercrime syndicate.
Satisfactory description
of Threat Intelligence
processes and policies
relevant to Frothly with
satisfactory reasoning
and arguments as to
why processes are
recommended. Shows
reasonable
understanding of Threat
Intelligence theory and
loosely applied to the
Frothly environment
with respect to the
selected cybercrime
syndicate.
Limited description of
Threat Intelligence
processes and policies
relevant to Frothly with
little reasoning or
arguments as to why
processes are
recommended. Shows
limited understanding of
Threat Intelligence
theory and models with
some application to the
Frothly environment with
respect to the selected
cybercrime syndicate.
No evidence
that the task
was
attempted.
Plagiarism or
academic
dishonesty
detected.
Marks 30 24 18 12 6 0
Description Outstanding Very Good Good Satisfactory Limited No Attempt
Strategic
Planning -
Threat
Hunting
Outstanding description
of Threat Hunting
processes and policies
relevant to Frothly with
extensive reasoning and
well thought out
arguments as to why
processes are
recommended. Shows
outstanding
understanding of Threat
Hunting theory and
models strongly applied
to the Frothly
environment with
respect to the selected
cybercrime syndicate.
Very Good description of
Threat Hunting processes
and policies relevant to
Frothly with very good
reasoning and well
thought out arguments
as to why processes are
recommended. Shows
Very Good understanding
of Threat Hunting theory
and models directly
applied to the Frothly
environment with
respect to the selected
cybercrime syndicate.
Good description of
Threat Hunting processes
and policies relevant to
Frothly with good
reasoning and arguments
as to why processes are
recommended. Shows
good understanding of
Threat Hunting theory
and models applied to
the Frothly environment
with respect to the
selected cybercrime
syndicate.
Satisfactory description
of Threat Hunting
processes and policies
relevant to Frothly with
satisfactory reasoning
and arguments as to
why processes are
recommended. Shows
reasonable
understanding of Threat
Hunting theory and
loosely applied to the
Frothly environment
with respect to the
selected cybercrime
syndicate.
Limited description of
Threat Hunting processes
and policies relevant to
Frothly with little
reasoning or arguments
as to why processes are
recommended. Shows
limited understanding of
Threat Hunting theory
and models with some
application to the Frothly
environment with
respect to the selected
cybercrime syndicate.
No evidence
that the task
was
attempted.
Plagiarism or
academic
dishonesty
detected
Marks 30 24 18 12 6 0
Strategic
Planning -
Incident
Playbooks
Outstanding description
of an Incident Playbook
relevant to Frothly and
the MS Exchange
vulnerability with
extensive reasoning and
convincing arguments for
playbook content. Shows
outstanding
understanding of Incident
Playbook design and
theory.
Very Good description of
an Incident Playbook
relevant to Frothly and
the MS Exchange
vulnerability with very
good reasoning and well
thought out arguments
for playbook content.
Shows Very Good
understanding of Incident
Playbook design and
theory.
Good description of an
Incident Playbook
relevant to Frothly and
the MS Exchange
vulnerability with good
reasoning and arguments
for playbook content.
Shows good
understanding of
Incident Playbook design
and theory.
Satisfactory description
of an Incident Playbook
relevant to Frothly and
the MS Exchange
vulnerability with
satisfactory reasoning
and arguments for
playbook content.
Shows reasonable
understanding of
Incident Playbook
design and theory.
Limited description of an
Incident Playbook
relevant to Frothly and
the MS Exchange
vulnerability with limited
reasoning or arguments
for playbook content.
Shows limited
understanding of Incident
Playbook design and
theory.
No evidence
that the task
was
attempted.
Plagiarism or
academic
dishonesty
detected
Marks 30 24 18 12 6 0
Description Outstanding Very Good Good Satisfactory Limited No Attempt
Strategic
Planning -
SOAR
Outstanding description
of Orchestration and
Automation processes
and policies relevant to
Frothly with extensive
reasoning and well
thought out arguments
as to why processes are
recommended. Shows
outstanding
understanding of
Orchestration and
Automation theory and
tools strongly applied to
the Frothly environment
with respect to the
selected cybercrime
syndicate.
Very Good description of
Orchestration and
Automation processes
and policies relevant to
Frothly with very good
reasoning and well
thought out arguments
as to why processes are
recommended. Shows
Very Good understanding
of Orchestration and
Automation theory and
tools directly applied to
the Frothly environment
with respect to the
selected cybercrime
syndicate.
Good description of
Orchestration and
Automation processes
and policies relevant to
Frothly with good
reasoning and arguments
as to why processes are
recommended. Shows
good understanding of
Orchestration and
Automation theory and
tools applied to the
Frothly environment with
respect to the selected
cybercrime syndicate.
Satisfactory description
of Orchestration and
Automation processes
and policies relevant to
Frothly with satisfactory
reasoning and
arguments as to why
processes are
recommended. Shows
reasonable
understanding of
Orchestration and
Automation theory and
tools loosely applied to
the Frothly
environment with
respect to the selected
cybercrime syndicate.
Limited description of
Orchestration and
Automation processes
and policies relevant to
Frothly with little
reasoning or arguments
as to why processes are
recommended. Shows
limited understanding of
Orchestration and
Automation theory and
tools with some
application to the Frothly
environment with
respect to the selected
cybercrime syndicate.
No evidence
that the task
was
attempted.
Plagiarism or
academic
dishonesty
detected
Marks 30 24 18 12 6 0
Description Outstanding Very Good Good Satisfactory Limited No Attempt
Strategic
Planning -
Maturity
Models
Outstanding description
of Maturity Model Audit
processes and policies
relevant to Frothly with
extensive reasoning and
well thought out
arguments as to why
processes are
recommended. Shows
outstanding
understanding of the
Maturity Model strongly
applied to the Frothly
environment with
respect to the selected
cybercrime syndicate.
Very Good description of
Maturity Model Audit
processes and policies
relevant to Frothly with
very good reasoning and
well thought out
arguments as to why
processes are
recommended. Shows
Very Good understanding
of the Maturity Model
directly applied to the
Frothly environment with
respect to the selected
cybercrime syndicate.
Good description of
Maturity Model Audit
processes and policies
relevant to Frothly with
good reasoning and
arguments as to why
processes are
recommended. Shows
good understanding of
the Maturity Model
applied to the Frothly
environment with
respect to the selected
cybercrime syndicate.
Satisfactory description
of Maturity Model
Audit processes and
policies relevant to
Frothly with satisfactory
reasoning and
arguments as to why
processes are
recommended. Shows
reasonable
understanding of the
Maturity Model loosely
applied to the Frothly
environment with
respect to the selected
cybercrime syndicate.
Limited description of
Maturity Model Audit
processes and policies
relevant to Frothly with
little reasoning or
arguments as to why
processes are
recommended. Shows
limited understanding of
the Maturity Model with
some application to the
Frothly environment with
respect to the selected
cybercrime syndicate.
No evidence
that the task
was
attempted.
Plagiarism or
academic
dishonesty
detected
Marks 30 24 18 12 6 0
Total: _____________ of 250 marks