Overall Role of Security Systems

advertisement
Overall Role of Security Systems
Course
Security
Services
Unit VII
Risk
Management
Essential
Question
How do security
professionals
design security
measures and
establish costeffective
methodologies?
TEKS
§130.298(c)
(4)(A)(B)(C)(D)
Prior Student
Learning
-Safety,
Prevention
Analysis
-Role of Analysis
in Crime
Prevention of
Homeland
Security
Estimated Time
5 to 6 hours
Rationale
Risk management is the most common method used for security control and
appropriate organizational spending. Security risk analysis/assessment is
fundamental to the security of any organization. It is essential to ensuring that
controls and expenditures are fully commensurate with the risks to which the
organization is exposed. In other words, it must be determined which security
controls are appropriate and cost effective.
Objectives
The students will be able to:
1. Describe the sources of natural, intentional, and unintentional threats.
2. Present examples that depict potential physical, electronic, procedural,
and personnel vulnerabilities.
3. Summarize the concept of risk management from a security
perspective, including the importance of knowing what to protect and
the consequences of loss.
4. Explain how security operations and the criminal justice field interface
and rely upon each other.
Engage
Have the class break into several small groups and brainstorm and discuss
the following questions:
 What do you believe the term operational audit means?
 Why should accounting procedures be a part of a security survey?
 Why are employee/company files significant in security protection
planning?
 If a security countermeasure costs as much as, or more than, the
loss being protected against, does it follow that the security measure
should be discontinued because it is not cost effective?
Use the Discussion Rubric for assessment.
Key Points
I. Risk Analysis
A. The overall role of security management that includes identifying
potential areas of loss and developing/instilling appropriate security
countermeasures
B. One part of this process is the security survey, which is used to
identify potential problem areas
C. Security services methodologies include
1. One-Dimensional Security – relies on a single deterring factor
(i.e. guards)
2. Piecemeal Security – security systems that have individual
pieces added to the loss prevention function as the need arises
without a comprehensive plan
1
Copyright © Texas Education Agency, 2012. All rights reserved.
3. Reactive Security – security systems that respond only to
specific events of loss
4. Packaged Security – standard security systems (equipment,
personnel, or both) without a connection to any specific threats
and with the assumption that packaged systems will take care
of all problems
D. There is a range of needs in security services
1. A small business with minimal loss potential or relative ease of
defense might adequately be served by one-dimensional
security (i.e. a good lock on the door and an alarm system, or a
contract guard patrol)
2. As risks increase and become more complex, the effectiveness
of the one-dimensional approach decreases, and a more
comprehensive security program becomes necessary
E. Security must be based on the analysis of the total risk potential
F. In order to set up defenses against losses from crime, accidents, or
natural disasters, there must first be a means of identification of the
risks
II.
Risk Management
A. Management techniques that identify, analyze, and assess
risks/threats; if a risk/threat is detected, methods are employed to
manage it
B. Begins with threat assessment (identifying vulnerabilities)
1. Many threats to businesses are important to security
2. Specific threats are not always obvious
3. The key is to consider the specific vulnerabilities in a given
situation
4. Characteristics of a good security manager are
a) Awareness of all possible risks
b) The ability to assess the system and policies from the
perspective of a criminal in order to accurately reduce the
vulnerability of company property
5. A thorough threat assessment is comprehensive and accurate,
and leads to effective countermeasures
6. After a threat assessment is complete, a vulnerability analysis
(aka a security survey or an audit) should be repeated on a
regular basis
7. Threats to information systems are divided into three
categories
a) Natural Threats – global and environmental; these threats
include natural disasters such as floods, earthquakes,
tornadoes, hurricanes, and storms
b) Intentional Threats – purposeful and deliberate crimes by
an unknown person or group that results in some form of
damage; these crimes include espionage, identity theft,
computer hacking, and terrorism
c) Unintentional Threats – occur accidentally or by chance
(i.e. a person accidentally unplugging a computer cord or
2
Copyright © Texas Education Agency, 2012. All rights reserved.
C.
D.
E.
F.
reformatting a computer hard disk drive)
8. No system can be truly safe from all threats, but knowing the
risks and methods for prevention increases the chance of
protection
Requires procedures and research to help businesses avoid taking
security risks
Includes two alternative solutions, which should be complementary
1. Investment in loss-prevention techniques
2. Insurance/Insurance companies
a) Cannot meet the security challenges faced by major
corporations alone
b) Have found loss-prevention techniques and programs
invaluable
Allows risk to be handled in a logical manner by using long-held
management principles
Requires a good risk-management program that involves four basic
steps
1. Identification of risks or specific vulnerabilities
2. Analysis and study of the risks/vulnerabilities
3. Optimization of risk management alternatives (see Section X)
a) Risk Avoidance – a technique used to avoid or eliminate a
risk, problem, threat, or hazard
b) Risk Reduction – decreasing the threats to safety and
security whenever possible
c) Risk Spreading – decentralizing a procedure or operation
so that a security or safety problem at one location will not
cause a complete loss (Fischer and Green, 1998)
d) Risk Transfer – removing the risk to the company by
paying for the protection of an insurance policy (Fischer
and Green, 1998)
e) Self-assumption of risk – planning for the worse by
creating a plan for an eventual loss without insurance
4. Ongoing study of security programs
III. Security Survey
A. An exhaustive physical examination of the premises and a thorough
inspection of all operational systems and procedures
1. To analyze a facility to determine the existing state of its
security
2. To locate weaknesses in its defenses
3. To determine the degree of protection required
4. To lead to recommendations for establishing a total security
program
B. Requires an examination of the procedures and routines in regular
operation
C. Requires an inspection of the physical plant and its environs
D. Can be conducted by
1. Staff security personnel currently employed by the company
2. Qualified security specialists employed from outside of the
3
Copyright © Texas Education Agency, 2012. All rights reserved.
company for this specific purpose
3. Some experts suggest that outside security personnel can
provide a more complete appraisal because they are more
objective and less likely to be blinded by routine
E. Should be completed by persons who
1. Have training in the field
2. Have achieved a high level of ability
3. Are totally familiar with the facility and its operations
F. Includes a checklist created by the survey team in preparation for
the actual inspection
1. Serves as a guide for the areas that must be examined
2. Includes locations and departments to be surveyed including
a) Physical location
b) Personnel department
c) Accounting department
d) Data processing department
e) Purchasing department
f) Shipping and receiving department
IV. Report of the Survey
A. After the survey is complete a report should be written indicating the
areas that have weak security and recommending solutions
B. After the report is complete, a security plan may be created using it
as a resource
C. The plan must be revised to find the best approach for achieving
acceptable security standards within the indicated limitations;
compromise will be necessary in some cases
D. When security directors do not receive their requests, they must
work within the framework as best they can
E. When security directors are denied extra personnel, they must find
hardware that will compensate
F. Security directors must exhaust every alternative method of
coverage before going to management with an opinion that requires
this kind of decision
V.
Operational Audits and Programmed Supervision
A. An operational audit (OA)
1. Considers all aspects of the security operation on a continuing
basis
2. A methodical examination, or audit, of operations
3. Threefold purpose
a) To find deviations from established security standards and
practices
b) To find loopholes in security controls
c) To consider means of improving the efficiency or control
of the operation without reducing security
4. Relatively inexpensive and builds on the security survey
5. Based on the concept of programmed supervision without
which the audit would become nothing more than a simple
4
Copyright © Texas Education Agency, 2012. All rights reserved.
security survey
a) Programmed Supervision (PS) – making sure that a
supervisor or other employees go through a prescribed
series of inspections that will determine whether the
functions or procedures for which they are responsible are
being properly executed (Fischer and Green, 1998)
6. Conducted by supervisors who are evaluating their areas of
responsibility on an ongoing basis
7. Differs from a security survey which begins by developing a
checklist of items that the security team believes are important
8. Conducted regularly and frequently, and once the OA begins, it
continues until someone in a position of authority decides that it
is no longer necessary
9. Requires supervisors to report physical conditions regularly, as
opposed to the security survey which relies heavily on either
the proprietary security force or a contractor
10. Uses the management resources of the company
B. The security manager can develop a comprehensive security plan
using the information gained from vulnerability analysis, security
surveys, and OAs
VI. Probability
A. Involves the chance that something will happen and typically
involves the use of mathematics
B. After vulnerabilities are identified by the security survey or the OA, it
is essential to determine the probability of loss, even though
probability is subjective
C. Then decisions must be made based on
1. How quickly a problem needs to be addressed
2. Data, such as the physical aspects of the vulnerability being
assessed
3. Procedural considerations
4. History of the industry’s vulnerabilities
VII. Criticality
A. A term used to help separate vulnerabilities into smaller, specific
categories; also means the impact of a loss as measured in dollars
B. Determines how important the area, practice, or issue is to the
existence of the organization
C. Measures the impact of dollar loss, which includes
1. Cost of the item lost
2. Replacement cost
3. Temporary replacement
4. Downtime
5. Discounted cash
6. Insurance rate changes
7. Loss of marketplace advantage
D. The expense of security services must be greater than the potential
loss of money for a viable cost-benefit analysis
5
Copyright © Texas Education Agency, 2012. All rights reserved.
VIII. The Probability/Criticality/Vulnerability Matrix
A. Criticality, like probability, is a subjective measure, but it can be
placed on a continuum
B. By using the ranking generated for probability and criticality, and by
devising a matrix system for the various vulnerabilities, it is possible
to quantify security risks and determine which vulnerabilities merit
immediate attention
C. Although some areas of importance may be obvious, some security
executives may be surprised to find that other areas are more
critical than they first surmised
D. By considering the history of loss and the number and quality of
security devices present, it is possible to estimate the probability of
a cash theft
E. Criticality should take precedence over probability
F. The security director should implement measures to reduce the
threat to the improbable level whenever the measures are costeffective
IX. Alternatives for optimizing risk management
A. After the security probability and criticality analysis is completed,
and the security problems are identified and ranked in importance,
the security manager in cooperation with company executives must
decide how to proceed
B. There are many risk management alternatives (see Section III, F, 3)
1. Risk avoidance
2. Risk reduction
3. Risk spreading
4. Risk transfer
5. Self-assumption of risk
C. It is unlikely that any evaluation can absolutely determine the cost
effectiveness of any security operation
D. A low crime rate can indicate that the security department is
performing effectively
E. Security services can also be considered insurance against
unacceptable risks
F. Effective security services must be adaptable, changing regularly to
accommodate changing circumstances in a given facility
G. Compiling pertinent information is a useful tool for keeping security
services current and effective
1. The survey and the report provide a valuable evaluation that
shows a detailed and current profile of the firm’s regular
activities
2. Texts, periodicals, official papers, and articles in the general
press related to security matters especially those with local
significance
a) May have immediate importance
b) May eventually reveal and predict risk patterns (i.e.
seasonal shifts, economic trends)
6
Copyright © Texas Education Agency, 2012. All rights reserved.
3. Litigation, particularly with issues about no or inefficient
security
Activities
1. Have the students design the standard operating procedures for a
business (existing or created) of their own choice. Then have the students
exchange their work with another group and develop a list of possible
threats or vulnerabilities to their business. This activity can be completed
either individually or in small work groups. Use the Individual Work Rubric
and/or the Group Evaluation Rubric for assessment.
2. Have students select a location and complete a security survey. A sample
security survey may be found at http://www.sonomacounty.org/crimecrushers/pdf/complete_security_survey.pdf. This activity
can be completed either individually or in small work groups. Use the
Individual Work Rubric and/or the Group Evaluation Rubric for
assessment.
3. Divide the class into small groups. Give each student a copy of the
Risk/Threat Analysis Map Activity Handout and the Risk/Threat Analysis
Map. Have students follow the instructions on the Risk/Threat Analysis
Map Activity Handout to analyze the Risk/Threat Analysis Map and identify
ways the property can be altered to harden security and protect it from
potential criminal activities. Students may make a list and/or sketch their
ideas. Have the students present their suggested changes to the class.
Use the Presentation Rubric for assessment.
Assessments
Overall Role of Security Systems Exam and Key
Discussion Rubric
Group Evaluation Rubric
Individual Work Rubric
Presentation Rubric
Materials
Overall Role of Security Systems computer-based presentation
Overall Role of Security Systems Key Terms
Risk/Threat Analysis Map
Risk/Threat Analysis Map Activity Handout
White board/chalk board
Computers with Internet Access
Resources
012382012X, Effective Security Management, Charles A. Sennewald,
Security World Publishing, 2011
0205592406, Introduction to Private Security: Theory Meets Practice, Cliff
Roberson and Michael L. Birzer, Prentice Hall, 2009
0750684321, Introduction to Security, Robert J. Fischer and Gion Green,
Butterworth-Heinemann, 2008
7
Copyright © Texas Education Agency, 2012. All rights reserved.
Threats to Security: In Information Assurance and Security, Purdue
University, The Center of Educational Research
Investigator/Officer’s Personal Experience
Accommodations for Learning Differences
For reinforcement, the students will create a Main Idea Web illustrating the
threats that are possible to a large urban shopping center. Use the Individual
Work Rubric for assessment.
For enrichment, the students will research, explain, and present examples of
natural, intentional, and unintentional threats. Use the Presentation Rubric for
assessment.
State Education Standards
Texas Essential Knowledge and Skills for Career and Technical Education
§130.298. Security Services (One to Two Credits).
(4)
The student explains risk management principles as they apply
to security functions for the protection of assets. The student is
expected to:
(A)
describe the sources of natural, intentional, and
unintentional threats;
(B)
present examples that depict potential physical,
electronic, procedural, and personnel vulnerabilities;
(C)
summarize the concept of risk management from a
security perspective, including the importance of knowing
what to protect and the consequences of loss; and
(D)
explain how security operations and the criminal justice
field interface and rely upon each other.
College and Career Readiness Standards
Cross-Disciplinary Standards
I. Key Cognitive Skills
B. Reasoning
1. Consider arguments and conclusions of self and others.
2. Construct well-reasoned arguments to explain phenomena, validate
conjectures, or support positions.
8
Copyright © Texas Education Agency, 2012. All rights reserved.
Overall Role of Security Systems Key Terms
Criticality – a term used to help separate vulnerabilities into smaller, specific categories;
also means the impact of a loss as measured in dollars
Intentional Threats – purposeful and deliberate crimes by an unknown person or group
that results in some form of damage; these crimes include espionage, identity
theft, computer hacking and terrorism
Natural Threats – global and environmental threats; these threats include natural
disasters such as floods, earthquakes, tornadoes, hurricanes, and storms
One-Dimensional Security – relies on a single deterring factor (i.e. guards)
Operational Audit (OA) – a comprehensive and accurate analysis that leads to effective
countermeasures; it consider all aspects of the security operation on a continuing
basis; a methodical examination, or audit, of operations (Fischer and Green,
1998)
Packaged Security – standard security systems (equipment, personnel, or both) without
a connection to any specific threats and with the assumption that packaged
systems will take care of all problems
Piecemeal Security – security systems that have individual pieces added to the loss
prevention function as the need arises, without a comprehensive plan
Probability – involves the chance that something will happen and typically involves the
use of mathematics
Programmed Supervision (PS) – making sure that a supervisor or other employees go
through a prescribed series of inspections that will determine whether the
functions or procedures for which they are responsible are being properly
executed (Fischer and Green, 1998)
Reactive Security – security systems that respond only to specific events of loss
Risk Analysis – the overall role of security management that includes identifying
potential areas of loss and developing/installing appropriate security
countermeasures
Risk Avoidance – a technique used to avoid or eliminate a risk, problem, threat, or
hazard
Risk Management – management techniques that identify, analyze, and assess
risks/threats; if a risk/threat is detected, methods are employed to manage it
Risk Reduction – decreasing threats to safety and security whenever possible
Risk Spreading – decentralizing a procedure or operation so that a security or safety
problem at one location will not cause a complete loss (Fischer and Green, 1998)
Risk Transfer – removing the risk to the company by paying for the protection of an
insurance policy (Fischer and Green, 1998)
Security Survey – an assessment used to identify potential problem areas
Self-assumption of risk – planning for the worse by creating a plan for an eventual loss
without insurance
Unintentional Threats – occur accidentally or by chance (i.e., a person accidentally
unplugging a computer cord or reformatting a computer hard drive)
Vulnerability Analysis – (a.k.a. security survey) the method used to determine a threat
or the vulnerability of a location
9
Copyright © Texas Education Agency, 2012. All rights reserved.
Risk/Threat Analysis Map Activity
Purpose:
To enable you to create a security assessment with a risk/threat analysis map.
Instructions:
1. Your security agency has been hired to provide security by a property management
company that has a commercial property with various tenants at a single location.
2. The property under security consideration has been the target of several vehicle break-ins,
particularly during the weekends. Unknown individuals have been leaving vehicles on the
property with “For Sale” signs and contact information. Also, individuals have been known to
loiter or trespass on the property.
3. Security options could include installation of surveillance cameras, security alarms, security
patrols, and on-site security (with or without driving cart).
4. Stores on the property do not open until 9:00 am, and the last tenant to leave the property
departs at 11:00 pm.
5. What security countermeasures will your company suggest to the client? Include who, what,
where, when, why and how they will be utilized.
6. You will have 20 minutes to read, discuss, and diagram/illustrate your business contract.
10
Copyright © Texas Education Agency, 2012. All rights reserved.
Name:_________________________
Date:__________________________
Overall Role of Security Systems Exam
Matching
a. Criticality
b. Intentional Threats
c. Natural Threats
d. One-Dimensional Security
e. Operational Audit
f. Packaged Security
g. Piecemeal Security
h. Probability
i. Programmed Supervision
j. Reactive Security
k. Risk Analysis
l. Risk Avoidance
m. Risk Management
n. Risk Reduction
o. Risk Spreading
p. Risk Transfer
q. Security Survey
r. Unintentional Threats
s. Vulnerability Analysis
1.
_____ an assessment used to identify potential problem areas
2.
_____ security systems that respond only to specific events of loss
3.
_____ decreasing the threats to safety and security whenever possible 4.
_____ standard security systems (equipment, personnel or both) without a connection to
any specific threats and with the assumption that packaged systems will take care of
all problems
5.
_____ the method used to determine a threat or vulnerability for a location
6.
_____ a technique used to avoid or eliminate a risk, problem, threat, or hazard
7.
_____ the chance that something will happen and typically involves the use of mathematics
8.
_____ occur accidentally or by chance (i.e. a person accidentally unplugging a computer
cord or reformatting a computer hard disk drive) 9.
_____ management techniques that identify, analyze, and assess risks/threats; if a
risk/threat is detected methods are employed to manage it
10. _____ purposeful and deliberate crimes by an unknown person or group that results in
some form of damage; these crimes include espionage, identity theft, computer
hacking, and terrorism
11. _____ relies on a single deterring factor (i.e. guards)
12. _____ removing the risk to the company by paying for the protection of an insurance policy
13. _____ means of making sure that a supervisor or other employees go through a prescribed
series of inspections
11
Copyright © Texas Education Agency, 2012. All rights reserved.
14. _____ global and environmental; these threats include natural disasters such as floods,
earthquakes, tornadoes, hurricanes, and storms
15. _____ a term used to help separate vulnerabilities into smaller, specific categories; also
means the impact of a loss as measured in dollars
16. _____ a thorough analysis that is comprehensive and accurate, and leads to effective
countermeasures
17. _____ security systems that have individual pieces added to the loss prevention function as
the need arises without a comprehensive plan
18. _____ the overall role of security management that includes identifying potential areas of
loss and developing/instilling appropriate security countermeasures
19. _____ decentralizing a procedure or operation so that a security or safety problem at one
location will not cause a complete loss
Multiple Choice
20. _____ Computer crimes that include espionage, identity theft and computer hacking
A. Natural Threat
B. Intentional Threat
C. Unintentional Threat
D.
21. _____ The self-assumption of risk that involves planning for an eventual loss without benefit
of insurance connects to which of the following?
A. Risk Spreading
B. Risk Transfer
C. Risk Management
D. Risk Reduction
22. _____ Which of the following is an example of this type of security that occurs when a
series of thefts take place at a specific location?
A. One-Dimensional Security
B. Packaged Security
C. Piecemeal Security
D. Reactive Security
True or False
23. _____ The overall role of security management is to identify potential areas of loss and to
develop and instill appropriate security countermeasures.
A. True
B. False
24. _____ Security must be based on analysis of the possible risk potential.
A. True
B. False
12
Copyright © Texas Education Agency, 2012. All rights reserved.
25. _____ The first step in risk analysis involves eliminating the threats.
A. True
B. False
26. _____ The best manager can think like a thief and is thus able to consider policies to reduce
the vulnerability of company property.
A. True
B. False
27. _____ By considering the history of loss and the number and quality of security devices
present, it is still not possible to estimate the probability of a cash theft.
A. True
B. False
13
Copyright © Texas Education Agency, 2012. All rights reserved.
Overall Role of Security Systems Exam Key
1. Q
2. J
3. N
4. F
5. S
6. L
7. H
8. R
9. M
10. B
11. D
12. P
13. I
14. C
15. A
16. E
17. G
18. K
19. O
20. B
21. B
22. D
23. A
24. B
25. B
26. A
27. B
14
Copyright © Texas Education Agency, 2012. All rights reserved.
Name_______________________________
Date________________
Group Evaluation
Group 1
Did the group take the assignment seriously?
No
1
2
3
4
5
6
7
8
9
Yes
10
Could you tell what the group was trying to portray?
No
1
2
3
4
5
6
7
8
9
Yes
10
9
Yes
10
9
Yes
10
Was the group portrayal creative?
No
1
2
3
4
5
6
7
Did the group include the correct elements?
No
1
2
3
4
5
6
7
8
8
Would you like to see this group demonstrate their talent for you in the future?
No
Yes
1
2
3
4
5
6
7
8
9
10
Total Score_______
Group 2
Did the group take the assignment seriously?
No
1
2
3
4
5
6
7
8
Could you tell what the group was trying to portray?
No
1
2
3
4
5
6
7
8
Was the group portrayal creative?
No
1
2
3
4
5
6
7
Did the group include the correct elements?
No
1
2
3
4
5
6
7
8
8
9
Yes
10
9
Yes
10
9
Yes
10
9
Yes
10
Would you like to see this group demonstrate their talent for you in the future?
No
Yes
1
2
3
4
5
6
7
8
9
10
Total Score_______
15
Copyright © Texas Education Agency, 2012. All rights reserved.
Group 3
Did the group take the assignment seriously?
No
1
2
3
4
5
6
7
8
Could you tell what the group was trying to portray?
No
1
2
3
4
5
6
7
8
Was the group portrayal creative?
No
1
2
3
4
5
6
7
Did the group include the correct elements?
No
1
2
3
4
5
6
7
8
8
9
Yes
10
9
Yes
10
9
Yes
10
9
Yes
10
Would you like to see this group demonstrate their talent for you in the future?
No
Yes
1
2
3
4
5
6
7
8
9
10
Total Score_______
Group 4
Did the group take the assignment seriously?
No
1
2
3
4
5
6
7
8
Could you tell what the group was trying to portray?
No
1
2
3
4
5
6
7
8
Was the group portrayal creative?
No
1
2
3
4
5
6
7
Did the group include the correct elements?
No
1
2
3
4
5
6
7
8
8
9
Yes
10
9
Yes
10
9
Yes
10
9
Yes
10
Would you like to see this group demonstrate their talent for you in the future?
No
Yes
1
2
3
4
5
6
7
8
9
10
Total Score_______
16
Copyright © Texas Education Agency, 2012. All rights reserved.
Group 5
Did the group take the assignment seriously?
No
1
2
3
4
5
6
7
8
Could you tell what the group was trying to portray?
No
1
2
3
4
5
6
7
8
Was the group portrayal creative?
No
1
2
3
4
5
6
7
Did the group include the correct elements?
No
1
2
3
4
5
6
7
8
8
9
Yes
10
9
Yes
10
9
Yes
10
9
Yes
10
Would you like to see this group demonstrate their talent for you in the future?
No
Yes
1
2
3
4
5
6
7
8
9
10
Total Score_______
Group 6
Did the group take the assignment seriously?
No
1
2
3
4
5
6
7
8
Could you tell what the group was trying to portray?
No
1
2
3
4
5
6
7
8
Was the group portrayal creative?
No
1
2
3
4
5
6
7
Did the group include the correct elements?
No
1
2
3
4
5
6
7
8
8
9
Yes
10
9
Yes
10
9
Yes
10
9
Yes
10
Would you like to see this group demonstrate their talent for you in the future?
No
Yes
1
2
3
4
5
6
7
8
9
10
Total Score_______
17
Copyright © Texas Education Agency, 2012. All rights reserved.
Name_______________________________________
Date_______________________________
Discussion Rubric
Objectives
4 pts.
Excellent
3 pts.
Good
2 pts. Needs Some
Improvement
1 pt. Needs Much
Improvement
N/A
Pts.
Participates in group discussion
Encourages others to join the
conversation
Keeps the discussion progressing
to achieve goals
Shares thoughts actively while
offering helpful recommendations to
others
Gives credit to others for their ideas
Respects the opinions of others
Involves others by asking questions
or requesting input
Expresses thoughts and ideas
clearly and effectively
Total Points (32 pts.)
Comments:
18
Copyright © Texas Education Agency, 2012. All rights reserved.
Name______________________________________
Date_______________________________________
Individual Work Rubric
4 pts.
Excellent
Objectives
3 pts.
Good
2 pts. Needs Some
Improvement
1 pt. Needs Much
Improvement
N/A
Pts.
Follows directions
Student completed the work as directed,
following the directions given, in order and to the
level of quality indicated
Time management
Student used time wisely and remained on task
100% of the time
Organization
Student kept notes and materials in a neat,
legible, and organized manner. Information was
readily retrieved
Evidence of learning
Student documented information in his or her
own words and can accurately answer questions
related to the information retrieved
*Research/Gathering information (if relevant)
Student used a variety of methods and sources
to gather information. Student took notes while
gathering information
Total Points (20 pts.)
Comments:
19
Copyright © Texas Education Agency, 2012. All rights reserved.
Name:____________________________________
Date:_____________________________
Presentation Rubric
4 pts.
Excellent
Objectives
3 pts.
Good
2 pts. Needs Some
Improvement
1 pt. Needs Much
Improvement
N/A
Pts.
Topic/Content
 Topic discussed completely and in-depth
 Includes properly cited sources (if used)
Creativity/Neatness
 Integrates a variety of multimedia effects to
create a professional presentation (transition
and graphics) or appropriate visual aid used
 Title slide, table of contents, bibliography are
included, using acceptable format
Mechanics
 Grammar, spelling, punctuation, and
capitalization are correct
 Image and font size are legible to the entire
audience
Oral Presentation
 Communicates with enthusiasm and eye
contact
 Voice delivery and projection are dynamic
and audible
Audience Interaction
 Presentation holds audience’s attention and
relates a clear message
 Clearly and effectively communicates the
content throughout the presentation
Total Points (20 pts.)
Comments:
20
Copyright © Texas Education Agency, 2012. All rights reserved.
Download