Assignment #3
No directly quoted material may be used in this project paper.
Resources should be summarized or paraphrased with appropriate in-text and Resource page
1. Explain what Cloud storage is, how it works, and what challenges and remedies are presented when attempting to acquire data from the Cloud.
2. If you had to explain to someone how and why they should protect their data on their computer, what would you present (remember to think about some key steps from intrusion, issues such as ransomware, how incidents occur, etc.)
3. Explain at least three ways, in detail, that a digital forensic practitioner can display their ethical practices and understanding of ethics in the profession.
Format Requirements
Paper must be double spaced, 11 or 12 pt font and 1 margins all around.
All APA 7th edition format requirements must be followed (cover page, in text citations, reference page). Refer to APA/UMGC – learning resources found in the content page of this course.
You must have resources to support your thoughts/opinions/information. These must be cited both in text as well as at the end of the document. Your paper should not contain direct quotes, sourced material must be paraphrased.
Due Date
Apr 27, 2021 11:59 PM
Hide Rubrics
Rubric Name: 321 Assignment #3 Rubric
This table lists criteria and criteria group names in the first column. The first row lists level names and includes scores if the rubric uses a numeric scoring method. You can give feedback on each criterion by tabbing to the add feedback buttons in the table.
Criteria
Exceeds Expectations
Meets Expectations
Approaching Expectations
Below Expectations
Criterion Score
Content
20 points
Student explained clearly and in detail what Cloud storage is, how it works, and what challenges and remedies are presented when attempting to acquire data from the Cloud. Student displayed exemplary critical thinking as evidenced by their response to this question and usage of resources to substantiate their response.
Student thoroughly and clearly presented the key considerations to be taken into consideration for someone to protect their data on their computer and why they should take steps to do so. Student’s discussion addressed each key element (i.e., intrusion, issues such as ransomware, how incidents occur, etc.) in a clear manner and used resources to substantiate their response.
Student clearly, and in detail, explained at least three ways that a digital forensic practitioner can display their ethical practices and understanding of ethics in the profession. Student displayed exemplary critical thinking in this discussion and substantiated their response with more than 2 resources.
Points Available: 18-20
17.9 points
Student explained what Cloud storage is, how it works, and what challenges and remedies are presented when attempting to acquire data from the Cloud. Student displayed solid/good critical thinking as evidenced by their response to this question and usage of resources to substantiate their response.
Student presented the key considerations to be taken into consideration for someone to protect their data on their computer and why they should take steps to do so. Student’s discussion addressed each key element (i.e., intrusion, issues such as ransomware, how incidents occur, etc.) in a clear manner and used resources to substantiate their response.
Student explained at least three ways that a digital forensic practitioner can display their ethical practices and understanding of ethics in the profession. Student displayed solid/good critical thinking in this discussion and substantiated their response with 2 resources.
Points Available: 16-17.9
15.9 points
Student explained what Cloud storage is, how it works, and what challenges and remedies are presented when attempting to acquire data from the Cloud in a limited/incomplete/incorrect manner. Student displayed limited or no critical thinking as evidenced by their response to this question and lack of usage of resources to substantiate their response.
Student presented the key considerations to be taken into consideration for someone to protect their data on their computer and why they should take steps to do so in a limited/incomplete/incorrect manner. Student’s discussion did not address each key element (i.e., intrusion, issues such as ransomware, how incidents occur, etc.) in a clear manner and/or response was limited/incomplete/incorrect. Student used 1 or less resources to substantiate their response.
Student explained less than three ways that a digital forensic practitioner can display their ethical practices and understanding of ethics in the profession. Student displayed limited to no critical thinking in this discussion and substantiated their response with 1 or less resources.
Points Available: 14-15.9
13.9 points
Did not fulfill one or more requirements for this assignment.
Points available D: 12-13.9
Points available F: 0 -11.9
Score of Content,/ 20
Format/Grammar/Spelling/Timeliness
10 points
Student followed APA format correctly (Cover page, in text citations and reference page)
Student followed all format directions for this assignment
Student had no more than 1 grammar or spelling error
Student submitted assignment on time
Points available: 9-10
8.9 points
Student mostly used APA format correctly but does have one or more errors (Cover page, in text citations and reference page)
Student mostly followed all format directions for this assignment but has 1 or more errors.
Student submitted assignment on time
Points available: 8-8.9
7.9 points
Student did not follow APA format correctly and has more than one error (Cover page, in text citations and reference page)
Student mostly followed the format directions for this assignment but has more than 2 errors.
Student submitted assignment on time or within 2 days of the deadline passing
Points available: 7-7.9
6.9 points
Did not fulfill format/grammar/spelling/timeliness expectations for this assignment
Assignment was 5 or more days past due.
Points available D: 6-6.9
Points available F: 0-5.9
Score of Format/Grammar/Spelling/Timeliness,/ 10