Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

PLTW Computer Science Cybersecurity

Project 3.1.4 Find the Secrets Rubric

Criteria Basic Proficient Advanced

Risk Protection The student terminated some of the The student terminated most of the Using the root account, the student
LO 4.1: Select and apply appropriate following six processes: following six processes: terminated all of the following six
computational tools and techniques to • zeta’s start and infinity • zeta’s start and infinity processes:
solve a problem or create value for • epsilon’s .end and testnet • epsilon’s .end and testnet • zeta’s start and infinity
others. • root’s start and .end • root’s start and .end • epsilon’s .end and testnet
LO 4.2: Apply tools with varying levels • root’s start and .end
of abstraction within software, a
computer, a network, and the internet. The student removed one or fewer The student removed two or three The student removed all files related
files, or attempted but failed to files related to the attack: to the attack:
LO 8.3: Monitor, analyze, and manage
remove files related to the attack: • /usr/.lib/testnet • /usr/.lib/testnet
active processes on a computer or
network of computers. • /usr/.lib/testnet • /usr/.lib/explore • /usr/.lib/explore
• /usr/.lib/explore • /usr/.lib/start • /usr/.lib/start
• /usr/.lib/start • /usr/.lib/.end • /usr/.lib/.end
• /usr/.lib/.end

The student attempted but failed to The student removed most hidden The student removed all hidden files
remove the hidden files in the files in the /home/zeta and in the /home/zeta and /home/epsilon
/home/zeta and /home/epsilon /home/epsilon directories. directories.
directories.

© 2021 Project Lead The Way, Inc. 1


PLTW Computer Science Cybersecurity

Criteria Basic Proficient Advanced

Risk Detection The student identified some The student identified some or all The student identified all authorized
LO 3.2: Deconstruct a complex problem authorized users of the system but authorized users of the system and users of the system and two of the
into simpler parts. none of the malicious users. one of the malicious users. malicious users.
LO 3.1: Apply and describe the process
based on user-centered research to solve
a problem.
LO 5.1: Find patterns and test
hypotheses about digitally processed
information to gain insight and
knowledge. The student found some of the The student found most of the The student found all of the
LO 8.4: Gain understanding of how an following six processes owned by following six processes owned by following six processes owned by
operating system is structured and works users, zeta, epsilon, and root: users, zeta, epsilon, and root: users, zeta, epsilon, and root:
by navigating the file system and • Zeta’s start and infinity • Zeta’s start and infinity • Zeta’s start and infinity
modifying files, extensions, rights, and • Epsilon’s .end and testnet • Epsilon’s .end and testnet • Epsilon’s .end and testnet
visibility to better protect data. • Root’s start and .end • Root’s start and .end • Root’s start and .end

Documentation The student created an inadequate The student created an adequate but The student created a thorough and
LO 7.1: Describe the variety of or inaccurate record of the slightly inaccurate record of the accurate record of the malicious
abstractions used to represent data. malicious processes, files, and malicious processes, files, and processes, files, and directories.
directories. directories.
LO 15.2: Recognize documentation as an
indispensable part of the security The student created minimal to no The student created adequate The student created thorough
process. documentation explaining how they documentation explaining how they documentation explaining how they
analyzed and used commands to analyzed and used commands to analyzed and used commands to
trace the processes, find the files, trace the processes, find the files, trace the processes, find the files, and
and remove the threats. and remove the threats. remove the threats.

© 2021 Project Lead The Way, Inc. 2


PLTW Computer Science Cybersecurity

Criteria Basic Proficient Advanced

Collaboration The student is inconsistently The student is consistently engaged The student is consistently engaged
LO 13.1: Abide by professional, ethical, engaged and inadequately and adequately contributes to the and substantially contributes to the
and legal standards when handling data contributes to the team’s work. team’s work. team’s work.
or protecting data.
LO 14.1: Collaborate when processing
information to gain insight and
knowledge.
LO 14.2: Collaborate effectively as part
of a team. The student rarely provides The student occasionally provides The student consistently provides
constructive feedback to others and constructive feedback to others and constructive feedback to others and
LO 14.3: Apply project management
does not encourage or incorporate consistently encourages and consistently encourages and
strategies effectively as part of a team.
input from others. incorporates input from others. incorporates input from others.
LO 15.1: Communicate ideas, processes,
and products to optimize audience
perception and understanding.

Comments

© 2021 Project Lead The Way, Inc. 3

You might also like