CYB 320 SWOT Analysis Guidelines and Rubric
Personal Security and Home Technology
Overview
Performing a Strengths, Weaknesses, Opportunities, and Threats (SWOT) analysis is an important skill for a cybersecurity analyst because it can provide insight into planning for incident response, business continuity, and disaster recovery. This type of analysis also provides you with the foundational skills to perform risk assessment that we will explore in future courses. This type of activity draws on your systems thinking skills that you have been developing throughout the program. Often this type of exercise is performed in a group setting where different stakeholders in an organization can brainstorm together to include a diversity of opinions and perspectives. In this assignment, you will be performing a SWOT analysis on your own personal security practices and home technology. Remember to think about all aspects of technology within your home, including people and process as well as the technology itself.
Prompt
Complete the SWOT Analysis Worksheet on your personal security practices for the technology within your home. The worksheet is linked in the SWOT Analysis assignment in Module Four of your course.
You must address the critical elements listed below.
- Personal Security SWOT Analysis
- Complete quadrant for Strengths, containing between five and seven items.
- Complete quadrant for Weaknesses, containing between five and seven items.
- Complete quadrant for Opportunities, containing between five and seven items.
- Complete quadrant for Threats, containing between five and seven items.
What to Submit
Fill in the required information directly in the provided worksheet and submit it as a Word document. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.
SWOT Analysis Rubric
Criteria | Proficient (100%) | Needs Improvement (70%) | Not Evident (0%) | Value |
---|---|---|---|---|
Personal Security SWOT Analysis: Strengths | Completes quadrant for Strengths, containing between five and seven items | Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail | Does not address critical element, or response is irrelevant | 22.5 |
Personal Security SWOT Analysis: Opportunities | Completes quadrant for Weaknesses, containing between five and seven items | Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail | Does not address critical element, or response is irrelevant | 22.5 |
Personal Security SWOT Analysis: Weaknesses | Completes quadrant for Opportunities, containing between five and seven items | Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail | Does not address critical element, or response is irrelevant | 22.5 |
Personal Security SWOT Analysis: Threats | Completes quadrant for Threats, containing between five and seven items | Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail | Does not address critical element, or response is irrelevant | 22.5 |
Articulation of Response | Submission has no major errors related to citations, grammar, spelling, or organization | Submission has some errors related to citations, grammar, spelling, or organization that negatively impact readability and articulation of main ideas | Submission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas | 10 |
Total: | 100% |