Industry Profile: Part 2 (Supply Chain Risk )

profileJBRADDEN

 

Provided an excellent overview of the problem of supply chain risk as it pertains to the cybersecurity industry.  Appropriately used information from 3 or more authoritative sources.

Provided an outstanding overview of the problem of supply chain risk as it pertains to the cybersecurity industry.  Appropriately used information from 2 or more authoritative sources.

Provided an overview of the problem of supply chain risk as it pertains to the cybersecurity industry.  Appropriately used information from authoritative sources.

Provided an introduction to supply chain risk but the section lacked some required details. Information from authoritative sources was cited and used in the overview.

Attempted to provide an introduction to supply chain risk but this section lacked detail and/or was not well supported by information drawn from authoritative sources. 

The introduction section was missing or did not present information about the supply chain risk in the cybersecurity industry.

Provided an excellent discussion of specific aspects of supply chain risks in the cybersecurity industry. Identified and discussed 5 or more specific examples of supply chain risk that have or will impact cybersecurity products and services. Appropriately used and cited information from 3 or more authoritative sources.

Provided an outstanding discussion of specific aspects of supply chain risks in the cybersecurity industry. Identified and discussed 4 or more specific examples of supply chain risk that have or will impact cybersecurity products and services. Appropriately used and cited information from 2 or more authoritative sources.

Discussed supply chain risks in the cybersecurity industry. Identified and discussed 3 or more specific examples of supply chain risk that have or will impact cybersecurity products and services. Appropriately used and cited information from authoritative sources.

Discussed supply chain risks in the cybersecurity industry. Identified and discussed one or two examples of supply chain risk that have or will impact cybersecurity products and services. Appropriately used and cited information from authoritative sources.

Provided a discussion of supply chain risk as it applies to the cybersecurity industry. The discussion lacked detail and/or was not well supported by information drawn from authoritative sources.

This section was missing, off topic, or failed to provide information about supply chain risks and the impacts thereof.

Provided an excellent discussion of due diligence as a risk management strategy for acquisitions and procurements of cybersecurity products and services. Addressed requirements to investigate suppliers prior to entering into contracts for products or services. Provided 5 or more examples of cybersecurity related questions that should be asked during the due diligence process. Appropriately used information from 3 or more authoritative sources.

Provided an outstanding discussion of due diligence as a risk management strategy for acquisitions and procurements of cybersecurity products and services. Addressed requirements to investigate suppliers prior to entering into contracts for products or services. Provided 3 or more examples of cybersecurity related questions that should be asked during the due diligence process. Appropriately used information from 2 or more authoritative sources.

Discussed due diligence as a risk management strategy for acquisitions and procurements of cybersecurity products and services. Addressed requirements to investigate suppliers prior to entering into contracts for products or services. Provided at least one example of a cybersecurity related question that should be asked during the due diligence process. Appropriately used information from authoritative sources.

 

Attempted to provide a discussion of due diligence prior to purchases of products or services in the cybersecurity industry.  The discussion was supported by information drawn from authoritative sources.

Mentioned due diligence but the section was lacking in details and/or was not well supported by information from authoritative sources.

This section was missing, off topic, or failed to address due diligence.

Provided an excellent discussion of the role that best practices should play in addressing global supply chain risks for cybersecurity products and services. Provided 5 or more examples of best practice recommendations and an evaluation of the expected benefits from implementing each of these practices. Appropriately used information from 3 or more authoritative sources.

Provided an outstanding discussion of the role that best practices should play in addressing global supply chain risks for cybersecurity products and services. Provided 4 or more examples of best practice recommendations and an evaluation of the expected benefits from implementing each of these practices. Appropriately used information from 3 or more authoritative sources.

Discussed the role that best practices should play in addressing global supply chain risks for cybersecurity products and services. Provided 3 or more examples of best practice recommendations and an evaluation of the expected benefits from implementing each of these practices. Appropriately used information from authoritative sources.

Provided a discussion of using best practices to manage global supply chain risk for cybersecurity products and services. Appropriately used information from authoritative sources.

Attempted to provide a discussion best practices for managing global supply chain risk but the discussion was substantially lacking in details and/or was not well supported by information drawn from authoritative sources.

Section was missing, off topic, or did not mention best practices for managing global supply chain risk.

Provided an excellent summary and conclusions section which presented a summary of findings including 3 or more reasons why global supply chain risk is a problem that must be addressed by both suppliers and purchasers of cybersecurity related products and services.

Provided an outstanding summary and conclusions section which presented a summary of findings including 2 or more reasons why global supply chain risk is a problem that must be addressed by both suppliers and purchasers of cybersecurity related products and services.

Provided a summary and conclusions section which presented a summary of findings including the reasons why global supply chain risk is a problem that must be addressed by both suppliers and purchasers of cybersecurity related products and services.

Summarized findings which mentioned global supply chain risk as a problem in the cybersecurity industry.

Included a summary but did not mention global supply chain risk.

Summary and conclusions were missing.

Demonstrated excellence in the integration of standard cybersecurity terminology into the case study.

Provided an outstanding integration of standard cybersecurity terminology into the case study.

Integrated standard cybersecurity terminology into the into the case study

Used standard cybersecurity terminology but this usage was not well integrated with the discussion.

Misused standard cybersecurity terminology.

Did not integrate standard cybersecurity terminology into the discussion.

Work contains a reference list containing entries for all cited resources. Reference list entries and in-text citations are correctly formatted using the appropriate APA style for each type of resource.

Work contains a reference list containing entries for all cited resources. One or two minor errors in APA format for in-text citations and/or reference list entries.

Work contains a reference list containing entries for all cited resources. No more than 3 minor errors in APA format for in-text citations and/or reference list entries.

Work has no more than three paragraphs with omissions of citations crediting sources for facts and information. Work contains a reference list containing entries for cited resources. Work contains no more than 5 minor errors in APA format for in-text citations and/or reference list entries.

Work attempts to credit sources but demonstrates a fundamental failure to understand and apply the APA formatting standard as defined in the Publication Manual of the American Psychological Association (6th ed.).

Reference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper.

Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.

Submitted work has minor style or formatting flaws but still presents a professional appearance. Submitted work is well organized and appropriately uses color, fonts, and section headings (per the assignment’s directions).

Organization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved.

Submitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement.

Submitted work meets minimum requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance.

No work submitted.

No formatting, grammar, spelling, or punctuation errors.

Work contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance.

Errors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work.

Submitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance.

Submitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage.

No work submitted

  • 7 years ago
  • 35
Answer(2)

Purchase the answer to view it

blurred-text
  • attachment
    supply_chain_risk_in_cyberecurity_industry_done.docx

Purchase the answer to view it

blurred-text
NOT RATED
  • attachment
    industry_profile_part_2_supply_chain_risk_in_the_cybersecurity_industry.docx
Bids(1)