VCE Computing: Software Development: Performance ...
VCE Applied Computing: Performance DescriptorsSOFTWARE DEVELOPMENT UNIT 4 OUTCOME 2SCHOOL-ASSESSED COURSEWORKPerformance DescriptorsUnit 4Outcome 2Respond to a teacher-provided case study to examine the current software development security strategies of an organisation, identify the risks and the consequences of ineffective strategies and recommend a risk management plan to improve current security practices.DESCRIPTOR: typical performance in each rangeVery lowLowMediumHighVery highLimited discussion of the current security controls used to protect software development practices and to protect software and data.Some analysis and discussion of the current security controls used to protect software development practices and to protect software and data.Sound analysis and discussion of the current security controls used to protect software development practices and to protect software and data.Detailed analysis and discussion on the current security controls used to protect software development practices and to protect software and prehensive analysis and discussion of the current security controls used to protect software development practices and to protect software and data.Limited identification or discussion of the potential risks to software and data security.Some identification and discussion of the potential risks to software and data security.Sound identification and discussion of the potential risks to software and data security.Detailed identification and discussion of the potential risks to software and data prehensive identification and discussion of the potential risks to software and data security.Limited relevant evaluation criteria to measure the effectiveness of the current security practices are proposed.Some relevant evaluation criteria to measure the effectiveness of the current security practices are proposed.Sound range of relevant evaluation criteria to measure the effectiveness of the current security practices are proposed and applied.Detailed set of relevant evaluation criteria to measure the effectiveness of the current security practices are proposed and prehensive set of relevant evaluation criteria to measure the effectiveness of the current security practices are proposed and applied.Limited identification of the possible legal or ethical consequences of ineffective security practices.Some understanding of the possible legal or and ethical consequences of ineffective security practices.Sound understanding of the possible legal and ethical consequences of ineffective security practices.Detailed understanding of the possible legal and ethical consequences of ineffective security prehensive understanding of the possible legal and ethical consequences of ineffective security practices.Few recommendations are made to improve the current security practices as part of a risk management plan.Some recommendations are made and justified to improve the current security practices as part of a risk management plan.Sound recommendations are made and justified to improve the current security practices as part of an effective risk management plan.Detailed recommendations are made and justified to improve the current security practices as part of an effective risk management prehensive recommendations are made and justified to improve the current security practices as part of an effective risk management plan.KEY to marking scale based on the Outcome contributing 100 marksVery Low 1–20Low 21–40Medium 41–60High 61–80Very High 81–100 ................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- organizing for successful software development
- software development plan
- overview of software development environments
- software development procedure
- principles and practices of software development
- software development life cycle sdlc
- an introduction to software development
- introduction to software development
- sample policy from the software development procedures
- sample software architecture document
Related searches
- software development business plan template
- software development plan example word
- types of software development models
- software development process models
- types of software development processes
- software development plan example
- sample software development plan
- software development plan template excel
- software development policy example
- software development plan template government
- software development plan template word
- software development project plan template