Overall Role of Security Systems Course Security Services Unit VII Risk Management Essential Question How do security professionals design security measures and establish costeffective methodologies? TEKS §130.298(c) (4)(A)(B)(C)(D) Prior Student Learning -Safety, Prevention Analysis -Role of Analysis in Crime Prevention of Homeland Security Estimated Time 5 to 6 hours Rationale Risk management is the most common method used for security control and appropriate organizational spending. Security risk analysis/assessment is fundamental to the security of any organization. It is essential to ensuring that controls and expenditures are fully commensurate with the risks to which the organization is exposed. In other words, it must be determined which security controls are appropriate and cost effective. Objectives The students will be able to: 1. Describe the sources of natural, intentional, and unintentional threats. 2. Present examples that depict potential physical, electronic, procedural, and personnel vulnerabilities. 3. Summarize the concept of risk management from a security perspective, including the importance of knowing what to protect and the consequences of loss. 4. Explain how security operations and the criminal justice field interface and rely upon each other. Engage Have the class break into several small groups and brainstorm and discuss the following questions: What do you believe the term operational audit means? Why should accounting procedures be a part of a security survey? Why are employee/company files significant in security protection planning? If a security countermeasure costs as much as, or more than, the loss being protected against, does it follow that the security measure should be discontinued because it is not cost effective? Use the Discussion Rubric for assessment. Key Points I. Risk Analysis A. The overall role of security management that includes identifying potential areas of loss and developing/instilling appropriate security countermeasures B. One part of this process is the security survey, which is used to identify potential problem areas C. Security services methodologies include 1. One-Dimensional Security – relies on a single deterring factor (i.e. guards) 2. Piecemeal Security – security systems that have individual pieces added to the loss prevention function as the need arises without a comprehensive plan 1 Copyright © Texas Education Agency, 2012. All rights reserved. 3. Reactive Security – security systems that respond only to specific events of loss 4. Packaged Security – standard security systems (equipment, personnel, or both) without a connection to any specific threats and with the assumption that packaged systems will take care of all problems D. There is a range of needs in security services 1. A small business with minimal loss potential or relative ease of defense might adequately be served by one-dimensional security (i.e. a good lock on the door and an alarm system, or a contract guard patrol) 2. As risks increase and become more complex, the effectiveness of the one-dimensional approach decreases, and a more comprehensive security program becomes necessary E. Security must be based on the analysis of the total risk potential F. In order to set up defenses against losses from crime, accidents, or natural disasters, there must first be a means of identification of the risks II. Risk Management A. Management techniques that identify, analyze, and assess risks/threats; if a risk/threat is detected, methods are employed to manage it B. Begins with threat assessment (identifying vulnerabilities) 1. Many threats to businesses are important to security 2. Specific threats are not always obvious 3. The key is to consider the specific vulnerabilities in a given situation 4. Characteristics of a good security manager are a) Awareness of all possible risks b) The ability to assess the system and policies from the perspective of a criminal in order to accurately reduce the vulnerability of company property 5. A thorough threat assessment is comprehensive and accurate, and leads to effective countermeasures 6. After a threat assessment is complete, a vulnerability analysis (aka a security survey or an audit) should be repeated on a regular basis 7. Threats to information systems are divided into three categories a) Natural Threats – global and environmental; these threats include natural disasters such as floods, earthquakes, tornadoes, hurricanes, and storms b) Intentional Threats – purposeful and deliberate crimes by an unknown person or group that results in some form of damage; these crimes include espionage, identity theft, computer hacking, and terrorism c) Unintentional Threats – occur accidentally or by chance (i.e. a person accidentally unplugging a computer cord or 2 Copyright © Texas Education Agency, 2012. All rights reserved. C. D. E. F. reformatting a computer hard disk drive) 8. No system can be truly safe from all threats, but knowing the risks and methods for prevention increases the chance of protection Requires procedures and research to help businesses avoid taking security risks Includes two alternative solutions, which should be complementary 1. Investment in loss-prevention techniques 2. Insurance/Insurance companies a) Cannot meet the security challenges faced by major corporations alone b) Have found loss-prevention techniques and programs invaluable Allows risk to be handled in a logical manner by using long-held management principles Requires a good risk-management program that involves four basic steps 1. Identification of risks or specific vulnerabilities 2. Analysis and study of the risks/vulnerabilities 3. Optimization of risk management alternatives (see Section X) a) Risk Avoidance – a technique used to avoid or eliminate a risk, problem, threat, or hazard b) Risk Reduction – decreasing the threats to safety and security whenever possible c) Risk Spreading – decentralizing a procedure or operation so that a security or safety problem at one location will not cause a complete loss (Fischer and Green, 1998) d) Risk Transfer – removing the risk to the company by paying for the protection of an insurance policy (Fischer and Green, 1998) e) Self-assumption of risk – planning for the worse by creating a plan for an eventual loss without insurance 4. Ongoing study of security programs III. Security Survey A. An exhaustive physical examination of the premises and a thorough inspection of all operational systems and procedures 1. To analyze a facility to determine the existing state of its security 2. To locate weaknesses in its defenses 3. To determine the degree of protection required 4. To lead to recommendations for establishing a total security program B. Requires an examination of the procedures and routines in regular operation C. Requires an inspection of the physical plant and its environs D. Can be conducted by 1. Staff security personnel currently employed by the company 2. Qualified security specialists employed from outside of the 3 Copyright © Texas Education Agency, 2012. All rights reserved. company for this specific purpose 3. Some experts suggest that outside security personnel can provide a more complete appraisal because they are more objective and less likely to be blinded by routine E. Should be completed by persons who 1. Have training in the field 2. Have achieved a high level of ability 3. Are totally familiar with the facility and its operations F. Includes a checklist created by the survey team in preparation for the actual inspection 1. Serves as a guide for the areas that must be examined 2. Includes locations and departments to be surveyed including a) Physical location b) Personnel department c) Accounting department d) Data processing department e) Purchasing department f) Shipping and receiving department IV. Report of the Survey A. After the survey is complete a report should be written indicating the areas that have weak security and recommending solutions B. After the report is complete, a security plan may be created using it as a resource C. The plan must be revised to find the best approach for achieving acceptable security standards within the indicated limitations; compromise will be necessary in some cases D. When security directors do not receive their requests, they must work within the framework as best they can E. When security directors are denied extra personnel, they must find hardware that will compensate F. Security directors must exhaust every alternative method of coverage before going to management with an opinion that requires this kind of decision V. Operational Audits and Programmed Supervision A. An operational audit (OA) 1. Considers all aspects of the security operation on a continuing basis 2. A methodical examination, or audit, of operations 3. Threefold purpose a) To find deviations from established security standards and practices b) To find loopholes in security controls c) To consider means of improving the efficiency or control of the operation without reducing security 4. Relatively inexpensive and builds on the security survey 5. Based on the concept of programmed supervision without which the audit would become nothing more than a simple 4 Copyright © Texas Education Agency, 2012. All rights reserved. security survey a) Programmed Supervision (PS) – making sure that a supervisor or other employees go through a prescribed series of inspections that will determine whether the functions or procedures for which they are responsible are being properly executed (Fischer and Green, 1998) 6. Conducted by supervisors who are evaluating their areas of responsibility on an ongoing basis 7. Differs from a security survey which begins by developing a checklist of items that the security team believes are important 8. Conducted regularly and frequently, and once the OA begins, it continues until someone in a position of authority decides that it is no longer necessary 9. Requires supervisors to report physical conditions regularly, as opposed to the security survey which relies heavily on either the proprietary security force or a contractor 10. Uses the management resources of the company B. The security manager can develop a comprehensive security plan using the information gained from vulnerability analysis, security surveys, and OAs VI. Probability A. Involves the chance that something will happen and typically involves the use of mathematics B. After vulnerabilities are identified by the security survey or the OA, it is essential to determine the probability of loss, even though probability is subjective C. Then decisions must be made based on 1. How quickly a problem needs to be addressed 2. Data, such as the physical aspects of the vulnerability being assessed 3. Procedural considerations 4. History of the industry’s vulnerabilities VII. Criticality A. A term used to help separate vulnerabilities into smaller, specific categories; also means the impact of a loss as measured in dollars B. Determines how important the area, practice, or issue is to the existence of the organization C. Measures the impact of dollar loss, which includes 1. Cost of the item lost 2. Replacement cost 3. Temporary replacement 4. Downtime 5. Discounted cash 6. Insurance rate changes 7. Loss of marketplace advantage D. The expense of security services must be greater than the potential loss of money for a viable cost-benefit analysis 5 Copyright © Texas Education Agency, 2012. All rights reserved. VIII. The Probability/Criticality/Vulnerability Matrix A. Criticality, like probability, is a subjective measure, but it can be placed on a continuum B. By using the ranking generated for probability and criticality, and by devising a matrix system for the various vulnerabilities, it is possible to quantify security risks and determine which vulnerabilities merit immediate attention C. Although some areas of importance may be obvious, some security executives may be surprised to find that other areas are more critical than they first surmised D. By considering the history of loss and the number and quality of security devices present, it is possible to estimate the probability of a cash theft E. Criticality should take precedence over probability F. The security director should implement measures to reduce the threat to the improbable level whenever the measures are costeffective IX. Alternatives for optimizing risk management A. After the security probability and criticality analysis is completed, and the security problems are identified and ranked in importance, the security manager in cooperation with company executives must decide how to proceed B. There are many risk management alternatives (see Section III, F, 3) 1. Risk avoidance 2. Risk reduction 3. Risk spreading 4. Risk transfer 5. Self-assumption of risk C. It is unlikely that any evaluation can absolutely determine the cost effectiveness of any security operation D. A low crime rate can indicate that the security department is performing effectively E. Security services can also be considered insurance against unacceptable risks F. Effective security services must be adaptable, changing regularly to accommodate changing circumstances in a given facility G. Compiling pertinent information is a useful tool for keeping security services current and effective 1. The survey and the report provide a valuable evaluation that shows a detailed and current profile of the firm’s regular activities 2. Texts, periodicals, official papers, and articles in the general press related to security matters especially those with local significance a) May have immediate importance b) May eventually reveal and predict risk patterns (i.e. seasonal shifts, economic trends) 6 Copyright © Texas Education Agency, 2012. All rights reserved. 3. Litigation, particularly with issues about no or inefficient security Activities 1. Have the students design the standard operating procedures for a business (existing or created) of their own choice. Then have the students exchange their work with another group and develop a list of possible threats or vulnerabilities to their business. This activity can be completed either individually or in small work groups. Use the Individual Work Rubric and/or the Group Evaluation Rubric for assessment. 2. Have students select a location and complete a security survey. A sample security survey may be found at http://www.sonomacounty.org/crimecrushers/pdf/complete_security_survey.pdf. This activity can be completed either individually or in small work groups. Use the Individual Work Rubric and/or the Group Evaluation Rubric for assessment. 3. Divide the class into small groups. Give each student a copy of the Risk/Threat Analysis Map Activity Handout and the Risk/Threat Analysis Map. Have students follow the instructions on the Risk/Threat Analysis Map Activity Handout to analyze the Risk/Threat Analysis Map and identify ways the property can be altered to harden security and protect it from potential criminal activities. Students may make a list and/or sketch their ideas. Have the students present their suggested changes to the class. Use the Presentation Rubric for assessment. Assessments Overall Role of Security Systems Exam and Key Discussion Rubric Group Evaluation Rubric Individual Work Rubric Presentation Rubric Materials Overall Role of Security Systems computer-based presentation Overall Role of Security Systems Key Terms Risk/Threat Analysis Map Risk/Threat Analysis Map Activity Handout White board/chalk board Computers with Internet Access Resources 012382012X, Effective Security Management, Charles A. Sennewald, Security World Publishing, 2011 0205592406, Introduction to Private Security: Theory Meets Practice, Cliff Roberson and Michael L. Birzer, Prentice Hall, 2009 0750684321, Introduction to Security, Robert J. Fischer and Gion Green, Butterworth-Heinemann, 2008 7 Copyright © Texas Education Agency, 2012. All rights reserved. Threats to Security: In Information Assurance and Security, Purdue University, The Center of Educational Research Investigator/Officer’s Personal Experience Accommodations for Learning Differences For reinforcement, the students will create a Main Idea Web illustrating the threats that are possible to a large urban shopping center. Use the Individual Work Rubric for assessment. For enrichment, the students will research, explain, and present examples of natural, intentional, and unintentional threats. Use the Presentation Rubric for assessment. State Education Standards Texas Essential Knowledge and Skills for Career and Technical Education §130.298. Security Services (One to Two Credits). (4) The student explains risk management principles as they apply to security functions for the protection of assets. The student is expected to: (A) describe the sources of natural, intentional, and unintentional threats; (B) present examples that depict potential physical, electronic, procedural, and personnel vulnerabilities; (C) summarize the concept of risk management from a security perspective, including the importance of knowing what to protect and the consequences of loss; and (D) explain how security operations and the criminal justice field interface and rely upon each other. College and Career Readiness Standards Cross-Disciplinary Standards I. Key Cognitive Skills B. Reasoning 1. Consider arguments and conclusions of self and others. 2. Construct well-reasoned arguments to explain phenomena, validate conjectures, or support positions. 8 Copyright © Texas Education Agency, 2012. All rights reserved. Overall Role of Security Systems Key Terms Criticality – a term used to help separate vulnerabilities into smaller, specific categories; also means the impact of a loss as measured in dollars Intentional Threats – purposeful and deliberate crimes by an unknown person or group that results in some form of damage; these crimes include espionage, identity theft, computer hacking and terrorism Natural Threats – global and environmental threats; these threats include natural disasters such as floods, earthquakes, tornadoes, hurricanes, and storms One-Dimensional Security – relies on a single deterring factor (i.e. guards) Operational Audit (OA) – a comprehensive and accurate analysis that leads to effective countermeasures; it consider all aspects of the security operation on a continuing basis; a methodical examination, or audit, of operations (Fischer and Green, 1998) Packaged Security – standard security systems (equipment, personnel, or both) without a connection to any specific threats and with the assumption that packaged systems will take care of all problems Piecemeal Security – security systems that have individual pieces added to the loss prevention function as the need arises, without a comprehensive plan Probability – involves the chance that something will happen and typically involves the use of mathematics Programmed Supervision (PS) – making sure that a supervisor or other employees go through a prescribed series of inspections that will determine whether the functions or procedures for which they are responsible are being properly executed (Fischer and Green, 1998) Reactive Security – security systems that respond only to specific events of loss Risk Analysis – the overall role of security management that includes identifying potential areas of loss and developing/installing appropriate security countermeasures Risk Avoidance – a technique used to avoid or eliminate a risk, problem, threat, or hazard Risk Management – management techniques that identify, analyze, and assess risks/threats; if a risk/threat is detected, methods are employed to manage it Risk Reduction – decreasing threats to safety and security whenever possible Risk Spreading – decentralizing a procedure or operation so that a security or safety problem at one location will not cause a complete loss (Fischer and Green, 1998) Risk Transfer – removing the risk to the company by paying for the protection of an insurance policy (Fischer and Green, 1998) Security Survey – an assessment used to identify potential problem areas Self-assumption of risk – planning for the worse by creating a plan for an eventual loss without insurance Unintentional Threats – occur accidentally or by chance (i.e., a person accidentally unplugging a computer cord or reformatting a computer hard drive) Vulnerability Analysis – (a.k.a. security survey) the method used to determine a threat or the vulnerability of a location 9 Copyright © Texas Education Agency, 2012. All rights reserved. Risk/Threat Analysis Map Activity Purpose: To enable you to create a security assessment with a risk/threat analysis map. Instructions: 1. Your security agency has been hired to provide security by a property management company that has a commercial property with various tenants at a single location. 2. The property under security consideration has been the target of several vehicle break-ins, particularly during the weekends. Unknown individuals have been leaving vehicles on the property with “For Sale” signs and contact information. Also, individuals have been known to loiter or trespass on the property. 3. Security options could include installation of surveillance cameras, security alarms, security patrols, and on-site security (with or without driving cart). 4. Stores on the property do not open until 9:00 am, and the last tenant to leave the property departs at 11:00 pm. 5. What security countermeasures will your company suggest to the client? Include who, what, where, when, why and how they will be utilized. 6. You will have 20 minutes to read, discuss, and diagram/illustrate your business contract. 10 Copyright © Texas Education Agency, 2012. All rights reserved. Name:_________________________ Date:__________________________ Overall Role of Security Systems Exam Matching a. Criticality b. Intentional Threats c. Natural Threats d. One-Dimensional Security e. Operational Audit f. Packaged Security g. Piecemeal Security h. Probability i. Programmed Supervision j. Reactive Security k. Risk Analysis l. Risk Avoidance m. Risk Management n. Risk Reduction o. Risk Spreading p. Risk Transfer q. Security Survey r. Unintentional Threats s. Vulnerability Analysis 1. _____ an assessment used to identify potential problem areas 2. _____ security systems that respond only to specific events of loss 3. _____ decreasing the threats to safety and security whenever possible 4. _____ standard security systems (equipment, personnel or both) without a connection to any specific threats and with the assumption that packaged systems will take care of all problems 5. _____ the method used to determine a threat or vulnerability for a location 6. _____ a technique used to avoid or eliminate a risk, problem, threat, or hazard 7. _____ the chance that something will happen and typically involves the use of mathematics 8. _____ occur accidentally or by chance (i.e. a person accidentally unplugging a computer cord or reformatting a computer hard disk drive) 9. _____ management techniques that identify, analyze, and assess risks/threats; if a risk/threat is detected methods are employed to manage it 10. _____ purposeful and deliberate crimes by an unknown person or group that results in some form of damage; these crimes include espionage, identity theft, computer hacking, and terrorism 11. _____ relies on a single deterring factor (i.e. guards) 12. _____ removing the risk to the company by paying for the protection of an insurance policy 13. _____ means of making sure that a supervisor or other employees go through a prescribed series of inspections 11 Copyright © Texas Education Agency, 2012. All rights reserved. 14. _____ global and environmental; these threats include natural disasters such as floods, earthquakes, tornadoes, hurricanes, and storms 15. _____ a term used to help separate vulnerabilities into smaller, specific categories; also means the impact of a loss as measured in dollars 16. _____ a thorough analysis that is comprehensive and accurate, and leads to effective countermeasures 17. _____ security systems that have individual pieces added to the loss prevention function as the need arises without a comprehensive plan 18. _____ the overall role of security management that includes identifying potential areas of loss and developing/instilling appropriate security countermeasures 19. _____ decentralizing a procedure or operation so that a security or safety problem at one location will not cause a complete loss Multiple Choice 20. _____ Computer crimes that include espionage, identity theft and computer hacking A. Natural Threat B. Intentional Threat C. Unintentional Threat D. 21. _____ The self-assumption of risk that involves planning for an eventual loss without benefit of insurance connects to which of the following? A. Risk Spreading B. Risk Transfer C. Risk Management D. Risk Reduction 22. _____ Which of the following is an example of this type of security that occurs when a series of thefts take place at a specific location? A. One-Dimensional Security B. Packaged Security C. Piecemeal Security D. Reactive Security True or False 23. _____ The overall role of security management is to identify potential areas of loss and to develop and instill appropriate security countermeasures. A. True B. False 24. _____ Security must be based on analysis of the possible risk potential. A. True B. False 12 Copyright © Texas Education Agency, 2012. All rights reserved. 25. _____ The first step in risk analysis involves eliminating the threats. A. True B. False 26. _____ The best manager can think like a thief and is thus able to consider policies to reduce the vulnerability of company property. A. True B. False 27. _____ By considering the history of loss and the number and quality of security devices present, it is still not possible to estimate the probability of a cash theft. A. True B. False 13 Copyright © Texas Education Agency, 2012. All rights reserved. Overall Role of Security Systems Exam Key 1. Q 2. J 3. N 4. F 5. S 6. L 7. H 8. R 9. M 10. B 11. D 12. P 13. I 14. C 15. A 16. E 17. G 18. K 19. O 20. B 21. B 22. D 23. A 24. B 25. B 26. A 27. B 14 Copyright © Texas Education Agency, 2012. All rights reserved. Name_______________________________ Date________________ Group Evaluation Group 1 Did the group take the assignment seriously? No 1 2 3 4 5 6 7 8 9 Yes 10 Could you tell what the group was trying to portray? No 1 2 3 4 5 6 7 8 9 Yes 10 9 Yes 10 9 Yes 10 Was the group portrayal creative? No 1 2 3 4 5 6 7 Did the group include the correct elements? No 1 2 3 4 5 6 7 8 8 Would you like to see this group demonstrate their talent for you in the future? No Yes 1 2 3 4 5 6 7 8 9 10 Total Score_______ Group 2 Did the group take the assignment seriously? No 1 2 3 4 5 6 7 8 Could you tell what the group was trying to portray? No 1 2 3 4 5 6 7 8 Was the group portrayal creative? No 1 2 3 4 5 6 7 Did the group include the correct elements? No 1 2 3 4 5 6 7 8 8 9 Yes 10 9 Yes 10 9 Yes 10 9 Yes 10 Would you like to see this group demonstrate their talent for you in the future? No Yes 1 2 3 4 5 6 7 8 9 10 Total Score_______ 15 Copyright © Texas Education Agency, 2012. All rights reserved. Group 3 Did the group take the assignment seriously? No 1 2 3 4 5 6 7 8 Could you tell what the group was trying to portray? No 1 2 3 4 5 6 7 8 Was the group portrayal creative? No 1 2 3 4 5 6 7 Did the group include the correct elements? No 1 2 3 4 5 6 7 8 8 9 Yes 10 9 Yes 10 9 Yes 10 9 Yes 10 Would you like to see this group demonstrate their talent for you in the future? No Yes 1 2 3 4 5 6 7 8 9 10 Total Score_______ Group 4 Did the group take the assignment seriously? No 1 2 3 4 5 6 7 8 Could you tell what the group was trying to portray? No 1 2 3 4 5 6 7 8 Was the group portrayal creative? No 1 2 3 4 5 6 7 Did the group include the correct elements? No 1 2 3 4 5 6 7 8 8 9 Yes 10 9 Yes 10 9 Yes 10 9 Yes 10 Would you like to see this group demonstrate their talent for you in the future? No Yes 1 2 3 4 5 6 7 8 9 10 Total Score_______ 16 Copyright © Texas Education Agency, 2012. All rights reserved. Group 5 Did the group take the assignment seriously? No 1 2 3 4 5 6 7 8 Could you tell what the group was trying to portray? No 1 2 3 4 5 6 7 8 Was the group portrayal creative? No 1 2 3 4 5 6 7 Did the group include the correct elements? No 1 2 3 4 5 6 7 8 8 9 Yes 10 9 Yes 10 9 Yes 10 9 Yes 10 Would you like to see this group demonstrate their talent for you in the future? No Yes 1 2 3 4 5 6 7 8 9 10 Total Score_______ Group 6 Did the group take the assignment seriously? No 1 2 3 4 5 6 7 8 Could you tell what the group was trying to portray? No 1 2 3 4 5 6 7 8 Was the group portrayal creative? No 1 2 3 4 5 6 7 Did the group include the correct elements? No 1 2 3 4 5 6 7 8 8 9 Yes 10 9 Yes 10 9 Yes 10 9 Yes 10 Would you like to see this group demonstrate their talent for you in the future? No Yes 1 2 3 4 5 6 7 8 9 10 Total Score_______ 17 Copyright © Texas Education Agency, 2012. All rights reserved. Name_______________________________________ Date_______________________________ Discussion Rubric Objectives 4 pts. Excellent 3 pts. Good 2 pts. Needs Some Improvement 1 pt. Needs Much Improvement N/A Pts. Participates in group discussion Encourages others to join the conversation Keeps the discussion progressing to achieve goals Shares thoughts actively while offering helpful recommendations to others Gives credit to others for their ideas Respects the opinions of others Involves others by asking questions or requesting input Expresses thoughts and ideas clearly and effectively Total Points (32 pts.) Comments: 18 Copyright © Texas Education Agency, 2012. All rights reserved. Name______________________________________ Date_______________________________________ Individual Work Rubric 4 pts. Excellent Objectives 3 pts. Good 2 pts. Needs Some Improvement 1 pt. Needs Much Improvement N/A Pts. Follows directions Student completed the work as directed, following the directions given, in order and to the level of quality indicated Time management Student used time wisely and remained on task 100% of the time Organization Student kept notes and materials in a neat, legible, and organized manner. Information was readily retrieved Evidence of learning Student documented information in his or her own words and can accurately answer questions related to the information retrieved *Research/Gathering information (if relevant) Student used a variety of methods and sources to gather information. Student took notes while gathering information Total Points (20 pts.) Comments: 19 Copyright © Texas Education Agency, 2012. All rights reserved. Name:____________________________________ Date:_____________________________ Presentation Rubric 4 pts. Excellent Objectives 3 pts. Good 2 pts. Needs Some Improvement 1 pt. Needs Much Improvement N/A Pts. Topic/Content Topic discussed completely and in-depth Includes properly cited sources (if used) Creativity/Neatness Integrates a variety of multimedia effects to create a professional presentation (transition and graphics) or appropriate visual aid used Title slide, table of contents, bibliography are included, using acceptable format Mechanics Grammar, spelling, punctuation, and capitalization are correct Image and font size are legible to the entire audience Oral Presentation Communicates with enthusiasm and eye contact Voice delivery and projection are dynamic and audible Audience Interaction Presentation holds audience’s attention and relates a clear message Clearly and effectively communicates the content throughout the presentation Total Points (20 pts.) Comments: 20 Copyright © Texas Education Agency, 2012. All rights reserved.