Compare / Contrast the ENISA and Commonwealth Approaches to Developing National Cybersecurity Strategies

Need your ASSIGNMENT done? Use our essay writing service to score better and meet your deadline.


Order a Similar Paper Order a Different Paper

CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds Significant ImprovementMissing or UnacceptableIntroduction or Overview for National Cybersecurity Strategies10 points

Provided an excellent introduction or overview of national cybersecurity strategies. Explained the purpose of a national cybersecurity strategy and how it is used. Fully answered the question: why should every nation have a cybersecurity strategy? Addressed the importance of such strategies to small, resource-poor nations as well as to wealthy, developed nations. The overview appropriately used information from 3 or more authoritative sources. 

8.5 points

Provided an outstanding introduction or overview of national cybersecurity strategies. Explained the purpose of a national cybersecurity strategy and how it is used. Addressed the question: why should every nation have a cybersecurity strategy? Addressed the importance of such strategies to small, resource-poor nations as well as to wealthy, developed nations. The overview appropriately used information from 2 or more authoritative sources. 

7 points

Introduced national cybersecurity strategies; explained the purpose of a national cybersecurity strategy and how it is used. Addressed the question: why should every nation have a cybersecurity strategy? Mentioned the importance of such strategies to small, resource-poor nations as well as to wealthy, developed nations. The overview appropriately used information from 1 or more authoritative sources. 

6 points

Provided an overview but the section lacked important details about national cybersecurity strategies. Information from authoritative sources was cited and used in the overview.

4 points

Attempted to provide an introduction to the paper but this section lacked detail and/or was not well supported by information drawn from authoritative sources. 

0 points

The introduction and/or overview sections of the paper were off topic. 

Common Principles / Guidance (CTO, ENISA)10 points

Provided an excellent discussion of the common principles and guidelines (similarities) found in both guidance documents (ENISA & CTO). Provided 5 or more specific examples of content which was similar between the two documents. Appropriately used information from 3 or more authoritative sources.

8.5 points

Provided an outstanding discussion of the common principles and guidelines (similarities) found in both guidance documents (ENISA & CTO). Provided 4 or more specific examples of content which was similar between the two documents. Appropriately used information from 2 or more authoritative sources.

7 points

Provided a discussion of the common principles and guidelines (similarities) found in both guidance documents (ENISA & CTO). Provided 3 or more specific examples of content which was similar between the two documents. Appropriately used information from 1 or more authoritative sources.

6 points

Provided a discussion of similarities between the two documents including at least two examples.Appropriately used information from authoritative sources.

4 points

Provided a discussion of similarities between the two documents including at least one example. The discussion lacked detail and/or was not well supported by information drawn from authoritative sources.

0 points

This section was missing, off topic, or failed to provide information about similarities in the two documents (CTO, ENISA).

Unique Aspects of CTO Guidance15 points

Provided an excellent discussion of the unique aspects of the CTO principles and guidelines for national cybersecurity strategies. Provided 5 or more examples of specific principles or guidelines or other content which were unique to the CTO guidance. Appropriately used information from 3 or more authoritative sources.

14 points

Provided an outstanding discussion of the unique aspects of the CTO principles and guidelines for national cybersecurity strategies. Provided 4 or more examples of specific principles or guidelines or other content which were unique to the CTO guidance. Appropriately used information from 2 or more authoritative sources.

13 points

Provided a discussion of the unique aspects of the CTO principles and guidelines for national cybersecurity strategies. Provided 3 or more examples of specific principles or guidelines or other content which were unique to the CTO guidance. Appropriately used information from 1 or more authoritative sources.

11 points

Provided a discussion of the unique aspects of the CTO principles and guidelines for national cybersecurity strategies. Named three or more specific principles or guidelines or other content which were unique to the CTO guidance. Appropriately used information from authoritative sources.

4 points

Provided a discussion of the unique aspects of the CTO guidance document. The discussion lacked detail and/or was not well supported by information drawn from authoritative sources.

0 points

This section was missing, off topic, or failed to provide information about unique aspects of the CTO guidance document.

Unique Aspects of ENISA Guidance15 points

Provided an excellent discussion of the unique aspects of the ENISA principles and guidelines for national cybersecurity strategies. Provided 5 or more examples of specific principles or guidelines or other content which were unique to the ENISA guidance. Appropriately used information from 3 or more authoritative sources.

14 points

Provided an outstanding discussion of the unique aspects of the ENISA principles and guidelines for national cybersecurity strategies. Provided 4 or more examples of specific principles or guidelines or other content which were unique to the ENISA guidance. Appropriately used information from 2 or more authoritative sources.

13 points

Provided a discussion of the unique aspects of the ENISA principles and guidelines for national cybersecurity strategies. Provided 3 or more examples of specific principles or guidelines or other content which were unique to the ENISA guidance. Appropriately used information from 1 or more authoritative sources.

11 points

Provided a discussion of the unique aspects of the ENISA principles and guidelines for national cybersecurity strategies. Named three or more specific principles or guidelines or other content which were unique to the ENISA guidance. Appropriately used information from authoritative sources.

4 points

Provided a discussion of the unique aspects of the ENISA guidance document. The discussion lacked detail and/or was not well supported by information drawn from authoritative sources.

0 points

This section was missing, off topic, or failed to provide information about unique aspects of the ENISA guidance document.

Recommendations for Best Approach (Next Steps)10 points

Provided an excellent summary of best practice recommendations for national cybersecurity strategy development. Recommended 5 or more appropriate next steps to help the competition team prepare to answer the question:  what is the best approach for developing a national cybersecurity strategy? Appropriately used information from 3 or more authoritative sources.

8.5 points

Provided an outstanding summary of best practice recommendations for national cybersecurity strategy development. Recommended 3 or more appropriate next steps to help the competition team prepare to answer the question:  what is the best approach for developing a national cybersecurity strategy? Appropriately used information from 2 or more authoritative sources.

7 points

Provided a summary of best practice recommendations for national cybersecurity strategy development. Recommended at least one appropriate next step to help the competition team prepare to answer the question:  what is the best approach for developing a national cybersecurity strategy? Appropriately used information from 1 or more authoritative sources.

6 points

Discussion provided some information about best practices for developing national cybersecurity strategies. Mentioned information obtained from authoritative sources.

4 points

Discussion provided some information about best practices for national cybersecurity strategies,but the lacked detail and/or was not supported by information from authoritative sources.

0 points

Did not address best practices for national cybersecurity strategies.

Summary of Research and Recommendations10 points

Provided an excellent summary of the research and recommendations for this deliverable. Summary was clear, concise, and accurate. Appropriately used information from authoritative sources.

8.5 points

Provided an outstanding summary of the research and recommendations for this deliverable. Summary was clear and accurate. Appropriately used information from authoritative sources.

7 points

Provided an acceptable summary of the research and recommendations for this deliverable. Appropriately used information from authoritative sources.

6 points

Provided a summary section but, this section was disorganized or lacked relevant details. Mentioned information from authoritative sources.

4 points

Attempted to provide a summary for this deliverable. But, the summary was not relevant to the deliverable. OR, this section was not well supported by information from authoritative sources.

0 points

The summary was missing.

Professionalism: Addressed security issues using standard cybersecurity terminology5 points

Demonstrated excellence in the integration of standard cybersecurity terminology into the case study.

4 points

Provided an outstanding integration of standard cybersecurity terminology into the case study.

3 points

Integrated standard cybersecurity terminology into the into the case study

2 points

Used standard cybersecurity terminology but this usage was not well integrated with the discussion.

1 point

Misused standard cybersecurity terminology.

0 points

Did not integrate standard cybersecurity terminology into the discussion.

Professionalism: APA Formatting for Citations and Reference List5 points

Work contains a reference list containing entries for all cited resources. Reference list entries and in-text citations are correctly formatted using the appropriate APA style for each type of resource. 

4 points

Work contains a reference list containing entries for all cited resources. One or two minor errors in APA format for in-text citations and/or reference list entries. 

3 points

Work contains a reference list containing entries for all cited resources. No more than 3 minor errors in APA format for in-text citations and/or reference list entries.

2 points

Work has no more than three paragraphs with omissions of citations crediting sources for facts and information. Work contains a reference list containing entries for cited resources. Work contains no more than 5 minor errors in APA format for in-text citations and/or reference list entries. 

1 point

Work attempts to credit sources but demonstrates a fundamental failure to understand and apply the APA formatting standard as defined in the Publication Manual of the American Psychological Association (6th ed.). 

0 points

Reference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper.

Professionalism: Organization & Appearance5 points

Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.

4 points

Submitted work has minor style or formatting flaws but still presents a professional appearance. Submitted work is well organized and appropriately uses color, fonts, and section headings (per the assignment’s directions).

3 points

Organization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved.

2 points

Submitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement.

1 point

Submitted work meets minimum requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance.

0 points

Submitted work is poorly organized and formatted. Writing and presentation are lacking in professional style and appearance. Work does not reflect college level writing skills.

Professionalism: Execution15 points

No formatting, grammar, spelling, or punctuation errors. 

14 points

Work contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance.

13 points

Errors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work.

11 points

Submitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance.

4 points

Submitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage. 

0 points

Submitted work is poorly executed OR does not reflect college level work.

Overall ScoreExcellent
90 or moreOutstanding
80 or moreAcceptable
70 or moreNeeds Improvement
56 or moreNeeds Significant Improvement
36 or moreMissing or Unacceptable
0 or more