Unacceptable (Below 70%) | Needs Improvement (70-79% | Competent (80-89%) | Exemplary (90-100%) | |
---|---|---|---|---|
Provide at least three reasons why it is less expensive to build secure software than to correct security issues after a breach. | Points: 0 (0.00%) Did not provide any reasons as to why it is less expensive to build secure software than to correct security issues after a breach. | Points: 22.5 (11.25%) Provided one reason as to why it is less expensive to build secure software than to correct security issues after a breach. | Points: 25.5 (12.75%) Provided two reasons as to why it is less expensive to build secure software than to correct security issues after a breach. | Points: 30 (15.00%) Provided three or more reasons as to why it is less expensive to build secure software than to correct security issues after a breach. |
Outline the purpose and objectives of your company’s "best secure coding practices" and explain how it will influence your department. | Points: 0 (0.00%) Did not submit the purpose and objectives of your company’s "best secure coding practices" and did not explain how it will influence your department. | Points: 30 (15.00%) Outlined the purpose of your company’s "best secure coding practices" but did not outline the objectives, and did not explain how it will influence your department. | Points: 34 (17.00%) Outlined the purpose and objectives of your company’s "best secure coding practices" but did not explain how it will influence your department. | Points: 40 (20.00%) Outlined the purpose and objectives of your company’s "best secure coding practices" and explained how it will influence your department. |
Evaluate which method of the secure software development lifecycle will best serve your team and explain how you plan on implementing your chosen method into your existing processes. | Points: 0 (0.00%) Did not submit which method of the secure software development lifecycle will best serve your team and did not explain how you plan on implementing your chosen method into your existing processes. | Points: 30 (15.00%) Identified which method of the secure software development lifecycle will best serve your team, but did not explain your evaluation of that method, and did not explain how you plan on implementing your chosen method into your existing processes. | Points: 34 (17.00%) Evaluated which method of the secure software development lifecycle will best serve your team, but did not explain how you plan on implementing your chosen method into your existing processes. | Points: 40 (20.00%) Evaluated which method of the secure software development lifecycle will best serve your team and explained how you plan on implementing your chosen method into your existing processes. |
Identify and outline the importance of three resources that can be used as "reference material" and act as a beginner’s guide for new employees, and explain how each resource can assist new coders. | Points: 0 (0.00%) Did not submit three resources and an outline of the importance of these resources that can be used as "reference material" and act as a beginner’s guide for new employees, and did not explain how each resource can assist new coders. | Points: 30 (15.00%) Identified three resources that can be used as "reference material" and act as a beginner’s guide for new employees, but did not outline the importance of each resource and did not explain how each resource can assist new coders. | Points: 34 (17.00%) Identified and outlined the importance of three resources that can be used as "reference material" and act as a beginner’s guide for new employees, but did not explain how each resource can assist new coders. | Points: 40 (20.00%) Identified and outlined the importance of three resources that can be used as "reference material" and act as a beginner’s guide for new employees, and explained how each resource can assist new coders. |
Outline all of the major aspects of the best practice coding guideline, (objectives, purpose, resources, and methodology) including the fictional company’s name on each slide of your presentation. | Points: 0 (0.00%) Did not submit all of the major aspects of the best practice coding guideline, (objectives, purpose, resources, and methodology) including the fictional company’s name on each slide of your presentation. | Points: 22.5 (11.25%) Outlined major aspects of the best practice coding guideline, but left off one or more of the following aspects: objectives, purpose, resources or methodology. | Points: 25.5 (12.75%) Outlined all of the major aspects of the best practice coding guideline, (objectives, purpose, resources, and methodology), but did not include the fictional company’s name on each slide of your presentation. | Points: 30 (15.00%) Outlined all of the major aspects of the best practice coding guideline, (objectives, purpose, resources, and methodology) including the fictional company’s name on each slide of your presentation. |
Provide four peer-reviewed, academic references. | Points: 0 (0.00%) No references provided. | Points: 7.5 (3.75%) Does not meet the required number of references; some or all references are not peer-reviewed, academic references. | Points: 8.5 (4.25%) Meets the required number of references; some or all references are not peer-reviewed, academic references. | Points: 10 (5.00%) Meets the required number of references; all references are peer-reviewed, academic references. |
Clarity, writing mechanics, and formatting requirements. | Points: 0 (0.00%) Writing has spelling, punctuation, and grammatical errors, fragments, comma splices and run-ons that distract from the message. More than 6 errors present. | Points: 7.5 (3.75%) Writing has spelling, punctuation, and grammatical errors that are distracting in some places. 5–6 errors present. | Points: 8.5 (4.25%) Writing has spelling, punctuation, and grammatical errors that are distracting in a few places; few fragments, comma splices, and run-ons. 3–4 errors present. | Points: 10 (5.00%) Writing has very few spelling, punctuation, and grammatical errors. 0–2 errors |