Preview

Isllc Standard 2

Satisfactory Essays
Open Document
Open Document
293 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Isllc Standard 2
Running Head: BENCHMARK ASSESSMENT YELLOW GROUP

Understanding by Design: ISLLC Standard 2

Benchmark Assessment:

Deborah D. Harris

Grand Canyon University: EDA 534: Educational Administration Foundation and Framework

September 12, 2012

Unwrapping the ISLLC Standards: Standard 2

Concepts and Skills T Chart

What administrators “need to know” and “be able to do”

|Concepts (Nouns) – underline |Skills (Verbs) – highlight/circle |
|“knowledge” |“admin will be able to do” |
|List Concept (list specific knowledge of concept) |Record Skills |Level of Blooms |
| | | |
| | | |
| | | |
| | | |

Big Ideas/Enduring Understandings: Represent the main ideas, conclusions, or generalizations about the “unwrapped” concepts and skills in a focused instructional unit of study. Ask yourself: “What do is the big idea of the standard? What do I want my staff to remember long after they leave the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Penetration testing should be done to test the network for vulnerabilities. There are several types of penetration testing. “An automated port based scan is generally one of the first steps in a traditional penetration test because it helps obtain a basic overview of what may be available on the target network or host. Port based scanners check to determine whether a port on a remote host is able to receive a connection. Generally, this will involve the protocols which utilize IP (such as TCP, UDP, ICMP, etc.), However, ports on other network protocols could be present as well dependent on the environment (for example, it’s quite common in large mainframe environments for SNA to be in use). Typically, a port can have one of two possible states: open – the port is able to receive data and closed – the port is not able to receive data. A service based vulnerability scanner is one which utilizes specific protocols to communicate with open ports on a remote host, to determine…

    • 550 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Given the speeds of today’s Ethernet and the progression of the speeds, 10 to 100Gigs over 8 years and 100Gig to 1Tb since, transmission rate will double again in about 8 years. Although this seems true, I read that Ethernet fabric will rival fiber optic transmission capabilities. We must keep in might that a network is only as fast as its slowest component. This means computers will have to continue to get faster at processing requests and switches and routers will have to analyze and forward data packets at a higher speed to keep up with the evolution of Ethernet.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    We are looking for the item Brake Set, Luffing Mechanism, GUL. Please kindly quote for the following item.…

    • 67 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Manual/ White Box: In this technique, a thorough code review is performed over the whole code, which may become a very tedious and tiresome process. But in this process, logical flaws may be identified which may not be possible using automated tools, such as business logic problems. Automated tools are mostly capable of finding technical flaws such as injection attacks but may miss flaws like authorization problems. In this process, instead of going line by line through whole code base, we can concentrate on potential problems in the code. Those potential vulnerabilities can be given a high priority. For example, in C/C++, if we try to find any copying function in the code and check whether it’s using functions such as, strcpy() for performing copy function. As we know, strcpy() is known to be vulnerable to buffer overflow attacks. We may also want to check if any customized encryption is being used in the application, which automated tools may miss as they can identify standard algorithms only…

    • 813 Words
    • 4 Pages
    Better Essays
  • Good Essays

    ISSC342 Assignment5

    • 338 Words
    • 1 Page

    During the first two phases of the five step process of a cyber-attack a hacker conducts reconnaissance of the target network and scans for any vulnerabilities that could be exploited. (EC-Council, 2009) These vulnerabilities are known as a system’s attack surface. One of the core job functions of Network administrators is reducing this attack surface through a process called system hardening. There a number of techniques that can be used to harden Microsoft clients and servers such as scanning the system with nmap to find any vulnerabilities that comes from having open ports. After the initial scan the administrator should close open ports and uninstall unnecessary services. (Solomon, 2014) Administrators should also run follow up scans with nmap to make sure that there are no ports or services that they may have missed during their first run. Nmap is not the only program that can identify vulnerabilities within a server, the SCW utility should also be used when you are installing new server hardware to check for any unwanted services that may be set to run on the server as a default setting. (Solomon, 2014)…

    • 338 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    IS4560 part 6

    • 474 Words
    • 2 Pages

    My defense plan at AHC will include a counter attack from external and internal threats; the vulnerability and security threats that exist inside AHC IT infrastructure. In order the deal with these kinds of threats, we will need to train and create and incident report and handling plan with our IT management. I will also help them to create and implement a more secure and dependable Disaster recovery plan that will be available somewhere offsite. My team will setup an incident guideline and procedure that AHC can follow whenever the system is breach or any kind of natural disaster occurred. Some of these examples are Malware, viruses, worms, Trojans and hacking attacks take place or security breach from an inside employee. The external attackers can be counter by our Intrusion detection systems but can be block by our firewall and Intrusion prevents systems. We will fortify our application securities as well with the implementation of a strong access control list. This is an outline we will Use TCP/IP and IPsec filters for defense in depth. Configure IDS to prevent information disclosure through banner grabbing. Use IDS that can be configured to pick up foot printing patterns and reject suspicious traffic. You can put tight constraints on user inputs. But the best method of preventing SQL injection is to avoid the use of dynamically generated SQL in your code. Instead use stored or canned procedures. Raising security awareness also help members of an organization possess regarding the protection of the physical and especially, information assets of that organization. Many organizations require formal security awareness training for all workers when they join the organization and periodically thereafter, usually annually. I will set the router and firewall ACLs to block all inbound access that is not specifically required, especially to the windows specific ports. Always ensure that…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The data classification policy is intended to provide a framework for classifying a company’s data based on its level of sensitivity. Data classification entails analyzing the data an organization retains, determining its importance and value, and then assigning it to a category. Data is classified to help determine baselines for security controls in that will be implemented to protect the data.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3440 project part 1

    • 305 Words
    • 2 Pages

    The account policy for first World Bank would be a very simple and easy policy. Basically all personnel will only have one account at a time, each person will only have their account on the system that they have business being on. You can be assigned to multiple groups within the system if need be. Before anyone can be added to the system, they will have to read and sign the User Account Policy; this will make sure that no one can say that they “didn’t know”.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISCOM 305 Entire Course

    • 450 Words
    • 3 Pages

    In this work of ISCOM 305 Entire Course you will find the next docs: ISCOM-305-21st-Century-Process-Management-Article.doc ISCOM-305-Week-3-DQ-1.doc ISCOM-305-FINAL-EXAM-TEST-use-to-study.pdf ISCOM-305-FINAL-EXAM.doc ISCOM-305-Week-1-DQs.doc…

    • 450 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ssc Labelle Analysis

    • 176 Words
    • 1 Page

    SPC Labelle achieved he course standards for the XVIII Airborne Corps Basic Leaders Course with an overall GPA of 93.94%. SPC Labelle demonstrated the ability to understand the Army Writing Style through clear and concise writing. SPC Labelle is a accomplished individual who is not afraid to take charge and give purpose, direction, and motivation to his squad and team members in order to succeed in any mission. His ability to share knowledge and vast experiences allowed the entire group to develop professionally and gain a better understanding of the topic of discussion. SPC Labelle's leadership skills during the course indicate that he is a mature Leader to be emulated by his peers. His demeanor and receptive approach to leadership directly…

    • 176 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    During this five week course, there were five major concepts that were being discussed. I think that the most important concepts that were being discussed are the ones…

    • 792 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Social Studies Standards

    • 1406 Words
    • 6 Pages

    However, they can both relate in the fact that both standards have the following component in their principle: “Understand” it is an indicator throughout the Social Studies Standards. It denotes to various levels on Bloom’s taxonomy as well as it was utilized on purpose to function as an umbrella term for the cognitive demand which could be outlined by the descriptors underneath the performance meters. We must seek to the descriptors who define the cognitive level of claim for pupil performance. The social studies standards all truly denote to numerous nations, parts of the world, individuals, themes as well as historical eras. School organization components must grow local curricula which assist pupils in obtaining a coherent, wide viewpoint on diverse nations, regions, historical eras as well as durable themes. In fact, the term “Major enduring themes” applies to numerous settings in the Social Studies Standards. This term could be referred to universal subjects as well as concerns that have been related over a long course of time. Utilizing a steady set of themes could function as a wide agenda within which other theories, subjects as well as facts that could be organized. It could assist pupils create associations among events across and within historical eras as well as utilize history to…

    • 1406 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    • You must research this context and write down how the results of your investigation might be useful, e.g.…

    • 704 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Question: Describe one idea that you thought was worth learning about. Explain why it was worth learning about in the text as a whole.…

    • 990 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    8. It is the dominant idea, explanation, evaluation, or recommendation that you want to impress upon your readers.…

    • 958 Words
    • 5 Pages
    Satisfactory Essays