CYB-610 Embedded OS Presentation Scoring Guide: Performance Level Ratings
CYB-610 Embedded OS Presentation Scoring Guide: Performance Level Ratings
CYB-610 Embedded OS Presentation Scoring Guide: Performance Level Ratings
The students clearly describes the tools used 0 pts – 6 pts 7 pts – 9 pts 10 pts
by hackers to penetrate the specified devices
and the effects of each penetration type.
The student provides insight as to how 0 pts – 6 pts 7 pts – 9 pts 10 pts
embedded operating system vendors provide
defenses against hacking attempts.
The students describes, in steps, at least one 0 pts – 6 pts 7 pts – 9 pts 10 pts
strategy used to attack embedded operating
systems.
The students describes, in steps, at least one 0 pts – 2 pts 3 pts – 4 pts 5 pts
strategy to defend against the chosen attack.
The student clearly explains innovative ideas 0 pts – 2 pts 3 pts – 4 pts 5 pts
to secure devices which host the programs.
Industry standard technical writing is correct 0 pts – 6 pts 7 pts – 9 pts 10 pts
and utilized throughout.
TOTAL /50
Instructor Feedback