Scenario Assignment Module Three Guidelines and Rubric For the Module Three assi

Scenario Assignment Module Three Guidelines and Rubric
For the Module Three assi

Scenario Assignment Module Three Guidelines and Rubric
For the Module Three assignment, students will be provided multiple scenarios that contain hypothetical situations pertaining to authentication and security protocols. Each of these situations will require the student to critically assess the situation and propose appropriate actions to be taken. This allows students to make practical application of the knowledge gained pertaining to authentication protocols, which will assist in the development of statements of policy for the information assurance plan.
Prompt
Explain the threat in each of the following types of authentication and provide a solution for each scenario below:
Alice sends a password, and Bob compares it against a database of passwords.
Alice sends a password, and Bob hashes it and compares it against a database of hashed passwords.
Alice computes the hash of a password and uses it as secret key in challenge/response protocol.
Alice computes the hash of a password and sends it to Bob, who hashes it and compares it against a database of doubly-hashed passwords.
What to Submit
Your responses for each prompt must be submitted as two to three paragraphs and as a Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format.
Scenario Assignment Module Three Rubric
CriteriaExemplary (100%)Proficient (85%)Needs Improvement (55%)Not Evident (0%)Value
Threat and EnvironmentMeets “Proficient” criteria substantiated with justification to support rationaleResponse explains the threat and the likely threat environment that exists within each of the given scenariosResponse minimally explains the threat and the likely threat environment that exists within each of the given scenariosResponse does not explain the threat or the environment that exists within each of the given scenarios40
SolutionMeets “Proficient” criteria and the solution is substantiated by evidence based researchProposes a solution that will provide the highest likelihood of resolving the situationSubmission proposes a solution that will provide the highest likelihood of resolving the situation but requires more research and evaluation of the threat and/or likely threat environmentSubmission does not propose a solution that will provide the highest likelihood of resolving the situation40
Articulation of ResponseSubmission is free of errors related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy-to-read formatSubmission has no major errors related to citations, grammar, spelling, syntax, or organizationSubmission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideasSubmission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas20
Total: 100%

Struggling with your essay and deadlines⏰?

Get this or a similar paper done in as fast as 4 hours, 24/7✍.

NB: We do NOT sell prewritten papers. All essays are written from scratch according to are specific needs and instructions.

Secure Service,  Plagiarism Free,  On-time Delivery⭐.

NB: Our papers should be used for revision purposes.