Security Systems Analysis Course Security Services Unit VIII Risk Management Technologies Essential Question What different security methodologies do security specialists employ to protect clients and their assets? TEKS §130.298(c) (6)(A)(B)(C) Prior Student Learning Prevention Analysis & Overall Roles of Security Systems Estimated Time 6 to 7 hours Rationale The duty of security services is to provide clients safety and protection. Services that are typically provided are guard and patrol services, such as bodyguard, guard dog, parking security, and security guard services. However, some security institutions may provide advanced special operations services if the client demands it. Examples of these services are the prevention of unauthorized activity or entry, traffic regulation, access control, and fire and theft prevention and detection. Objectives The students will be able to: 1. Summarize the purposes, types, and applications of physical and electronic access control systems, surveillance systems, and intrusion detection systems. 2. Analyze how physical and electronic systems work together as an integrated system to support an overall protection strategy. 3. Analyze the roles of security surveys, inspections, and exercises to test existing protection measures. Engage Have the class break into several small groups and discuss the questions below. Then discuss the questions as a class. Use the Discussion Rubric for assessment. What are the services that a security professional can provide? What are the names of some people and/or companies (private and public) that need security services? What are the physical threats that would require the use of security services? What are the technological threats available that would require the use of security services? Key Points I. Security Awareness A. Is an attitude held by security personnel and non-security client employees that places a high value on detecting, deterring, and reporting security exposures such as crime, safety hazards, fire hazards, theft, intrusions, and vandalism B. Requires security personnel to protect the client’s employees, property, guests, and image, and assist the client’s personnel and visitors C. Requires that non-security client employees are aware of the security program’s goals and methods and support the security program, abiding by its policies D. Founded on the concept of preventative security 1 Copyright © Texas Education Agency, 2012. All rights reserved. E. The three main security principles are 1. Availability 2. Integrity 3. Confidentiality II. Physical Security A. Two basic duties of performing physical security 1. Observe 2. Report B. Three initial steps taken with a security threat 1. Identify it 2. Report it 3. Discuss and develop a solution that eliminates the problem C. Cultivates security awareness among the clients and requires conscientious and highly visible security officers D. A priority concern of top-level management of businesses, industries, and institutions E. Has the ultimate goal of loss prevention which results in the maximum return on investments F. Requires two basic investigative skills 1. Communication skills 2. Surveillance capabilities G. Defines the primary hardware systems traditionally with 1. Locks 2. Security alarms 3. Access controls 4. Surveillance video III. Electronic Access Control Systems A. Security devices that allow the user and the system to communicate with each other; these include 1. Controller 2. Card reader 3. Door contacts 4. Control locking device B. Not security alarm systems; the two systems do have a lot in common, but are usually implemented separately C. Strategically positioned as a natural focal point for a security officer to initiate ownership of the physical security systems, systems that are traditionally supported by facilities personnel 1. The installation of an electronic access control system can be arranged the same way as a security alarm, with the access controllers positioned at a central location 2. Peripheral devices such as the door and the elevator controls, the credential readers, and the interfaces to other systems can connect to the access controllers by lengthy cabling 3. Example: a typical access control system has a controller, a credential reader, door position contacts, and a means of controlling the locking device or door operator 2 Copyright © Texas Education Agency, 2012. All rights reserved. D. Require access credentials which are used in conjunction with access controls, typically in the form of access cards and card readers 1. Access cards and card readers are paired components (a card is to a reader as a key is to a lock) 2. Card and reader technology has evolved significantly, from magnetic strips to encrypted proximity smart cards a) Reader technology now includes biometrics as a binding point between the person and the authentication credential b) Cards are routinely produced that can be embossed with bar codes and photographs E. Require communication between the card and the controller using the card data and the reader data stream 1. The card data must be readable by the reader, and the reader data stream format must be supported by the controller 2. A controller is a chip, an expansion card, or a stand-alone device that interfaces with a peripheral device; this connection may be a link between two parts of a computer or a controller on an external device that manages the operation of that device a) A contact chip – a small integrated circuit which must come in contact with a reader in order for the two to communicate with each other b) A contactless chip – a small integrated circuit that functions through wireless technology (the circuit utilizes transceivers, antennas, and RFID) 3. Distinct functions of security and access control a) Identification – the method used to verify a person’s identity b) Authentication – identity confirmation c) Authorization – access to a location and/or information that is granted to a proven individual (1) Use of biometrics, passwords, passphrases, tokens, or other private information (2) Biometrics – authorization and access that is based on an individual’s unique characteristics including handprints, fingerprints, or retinal scans (3) Most common biometric systems (a) Fingerprint (b) Palm Scan (c) Hand Geometry (d) Iris Scan (e) Signature Dynamics (f) Keyboard Dynamics (g) Voice Print (h) Facial Scan (i) Hand Topography F. Access control key points and mechanisms include 3 Copyright © Texas Education Agency, 2012. All rights reserved. 1. Passwords 2. Passphrase – a statement, phrase or series of words that replaces a password and is used for access to a computer system 3. Cryptographic keys – cryptographic operations in which a string of bits are used by a cryptographic algorithm to change a string of text into a cipher resulting in information that can only be read through private keys or digital signatures 4. Centralized Access Control Administration – access control that is administered and controlled at one location 5. Preventative administrative controls – includes policies, hiring practices, and security awareness 6. Preventative physical controls – includes badges, swipe cards, guards, and fences 7. Preventative technical controls – includes passwords, encryption, and antivirus software IV. Surveillance Systems A. Many people continue to rely on old-fashioned security methods such as door and window locks, but it is more practical to invest in surveillance cameras B. Surveillance cameras 1. Currently among the most popular and in-demand security devices 2. Capable of obtaining 24-hour steady video 3. Found in various locations including a) Public highways b) Parks c) Vehicles d) Airplanes e) Ships 4. Ideal for industrial and official establishments, and individual homes 5. Commonly used for standard property monitoring 6. Used indoors and outdoors 7. Used visibly and hidden 8. Serve a variety of purposes including employee theft and monitoring children (i.e. nanny cams) 9. Found in two categories a) Hardwired (1) Effective but can easily accumulate wires b) Wireless (1) Easier to setup, install, and place anywhere (2) Clutter-free and dependable (i.e. unaffected by accidental power shutdowns and/or interruptions) V. Intrusion Detection System (IDS) A. A program that monitors a system for malicious activity and in turn reports the activity 4 Copyright © Texas Education Agency, 2012. All rights reserved. B. Designed to test/analyze network system traffic/events against a given set of parameters and send out an alert or capture data when these thresholds are met C. Uses collected information and a predefined knowledge-based systems to reason about the possibility of an intrusion D. Detects attacks as soon as possible and takes the appropriate action, but does not usually take preventive measures when an attack is detected E. Reactive rather than proactive F. Configurable to run unattended for extended periods of time G. Must recognize unusual activity and operate without unduly affecting the system’s activity H. Consists of three components or modules 1. Event generator – a data source or sensor which is responsible for capturing and sending packets to the console 2. Analysis engine or console – responsible for analyzing the packets captured by the sensor and examining the data for the symptoms of attacks or other policy violations 3. Response manager – only acts when inaccuracies (possible intrusion attacks) are found in the system; acts by notifying someone or something in the form of a response I. Types 1. Network IDS – a system that locates intrusions by investigating the network traffic and monitoring multiple hosts 2. Protocol-based IDS – a system or person that actively monitors and surveys the communication between a system and the server 3. Application Protocol-based IDS – a system or person that actively monitors and surveys the application-based communication between a system and a group of servers 4. Host-based IDS – a system on a host that detects intrusions by monitoring system calls, application logs, file-system modifications, and other host activities 5. Passive IDS – a system that alerts when unusual (suspicious or malicious) activity is detected and notifies the user when preventative action must be taken 6. Reactive IDS – a system that alerts when unusual activity (suspicious or malicious) is detected and takes action immediately by blocking the system threat J. Detection approaches 1. Signature detection a) Used to discriminate between anomalies or attack patterns (signatures) and known intrusion detection signatures b) Often used in the IDS and many anti-malware systems such as anti-virus and anti-spyware, etc. c) Scans the system against already known computer viruses, malware, or attacks d) Alerts the user if an attachment is detected 5 Copyright © Texas Education Agency, 2012. All rights reserved. 2. Statistical anomaly detection a) Monitors the normal activity of a system and then informs the user if unusual or anomalous activity is detected b) Applies statistical tests to observed user behavior to determine with a high level of confidence whether or not the behavior is legitimate c) Falls into two broad categories (1) Threshold detection – a program that records by counting the number of times that an incident occurs within a system (2) Profile-based anomaly detection – a program that monitors a system by analyzing previous system patterns and current system patterns that are highly deviated from an individual user’s activity VI. Integrated Security Systems A. Security services is one of the fastest growing areas of integrated building systems B. Demand for security services has maintained steady growth since September 11, 2001 C. Security systems inherently require an integrated approach, except for local card entry locks D. Physical access control is more than the use of a simple lock; instead the lock may be integrated with a biometrics ID system (i.e. the use of an ID card or personal identification number (PIN) in conjunction with a physical characteristic) 1. The biometric aspect of the process is to compare a stored biometric template to a real-time scan of an eye, a finger, or some other body part 2. The door lock must communicate with a server that has stored the template data in order for the biometric aspect to work E. A high-resolution digital closed circuit television (CCTV) system permits easy access to stored images and the computer analysis of the images, which aids in decision-making (i.e. to focus on an individual/location or send a warning message/alarm) F. Once data and control are connecting on a communication link, they can easily tie in with other systems, such as the fire alarm system, lighting control system, heating, ventilation and air conditioning (HVAC) system, and the computer access control system G. The projected expansion of power over Ethernet (PoE) 1. A very important development in the integration of security with other building systems 2. Makes it possible to operate door locks and cameras with the same cable that ties them into the building’s local area network (LAN) H. The installation of sophisticated access control systems in commercial buildings is a new trend toward systems convergence 6 Copyright © Texas Education Agency, 2012. All rights reserved. 1. After scanning the information, it takes a digital photo or captures the visitor’s signature 2. It then can contact the visitor’s host by phone, e-mail, or with a real-time network messaging 3. Example: scanning the photo ID, the business card or the passport ID of an arriving visitor, which instantaneously checks whether the visitor is expected or has been in the facility before, and makes sure that the visitor is not on a “watch list” I. This surveillance system integrates all critical security functions, such as alarm, fire, and access systems, allowing the security staff to simultaneously monitor all systems from the centralized security command center 1. Also the capability to control all the lights throughout the entire building, as well as the HVAC system 2. Example: if an alarm is sounded, the signal automatically activates a camera located in the affected area, where the security personnel can instantly view the incident J. Integrated security system design services include 1. Enterprise systems for local, regional, or global monitoring 2. Monitoring emergency operations center and fusion center design which manages and shares information between and across operations 3. Video surveillance systems 4. Access control systems 5. IDS 6. Physical security information management systems 7. Network design and bandwidth planning 8. Intercom systems and emergency communications 9. Door and window selection and hardware coordination 10. Conduit layouts with security power requirements 11. Lighting layouts with photometric detail 12. Design services for new construction and renovations/re-fits K. Another aspect of the recent integrated security systems is the capability to use specific notification systems that can inform the building occupants of an event/crisis and inform them of the proper reaction VII. Security Inspection A. An important step toward preventing theft, burglary, and other crimes B. Can indicate features which would make entry easy or difficult for a prospective offender when completed by trained security personnel C. Shows how a location’s security can be improved D. Requires observation of all entry points to determine what steps can reduce vulnerability E. Begins at the front door and then includes the side and rear doors, windows, locks, lights, and landscaping F. Are used by all professionals in the field of crime prevention, 7 Copyright © Texas Education Agency, 2012. All rights reserved. including both security services and law enforcement professionals G. Requires the use of standard inspection forms/checklists that indicate security weaknesses and/or hazards that require attention including 1. Front entrance 2. Side or rear entrance 3. Entrances from the garage 4. Upper floor windows 5. Garage doors and windows 6. Basement doors and windows 7. Ground floor windows 8. Recommendations and comments Activities 1. Have the students act as if they are selling a form of security services (i.e. physical security, electronic security, cameras, etc). Have them create a sales pitch using computer-based presentation software (note: you may want to expand the role play and act as the CEO of a business with the students who are not presently acting as the board members; this activity can be completed either individually or in small work groups). Use the Presentation Rubric for assessment. 2. Have the students work in several small groups and create a security client (i.e. shopping center, celebrity, subdivision, etc.), including the client information and a floor plan and/or a sketch. After approximately 15 minutes have the groups exchange their client information. Then each group must develop a means to “attack” the client. After approximately 15 minutes, have the groups return the information about the client (who is under attack) to the original group. Next, the groups must create a strategy to protect their client. After approximately 20 minutes, students can present their plan to protect the client to the entire class. Use the Presentation Rubric and the Group Evaluation Rubric for assessment. 3. Have the students complete the security inspection form of an actual location (to find a sample form do an Internet search for the following: “security checklist David L. Berger Forensic Consultant”). Students can make a list and/or sketch of their ideas and present to the entire class how the location’s security can be strengthened. Use the Individual Work Rubric for assessment. Assessments Security Systems Analysis Exam and Key Discussion Rubric Group Evaluation Rubric Individual Work Rubric Presentation Rubric Research Rubric Materials 8 Copyright © Texas Education Agency, 2012. All rights reserved. Security Systems Analysis computer-based presentation Security Systems Analysis Key Terms Computers with computer-based presentation software White board/chalk board Computer with Internet Access Resources 0205592406, Introduction to Private Security: Theory Meets Practice, Cliff Roberson and Michael L. Birzer, Prentice Hall, 2009 0750684321, Introduction to Security, Robert J. Fischer and Gion Green, Butterworth-Heinemann, 2008 Access Control Systems & Methodology, Jeff Smith, Purdue University Physical Access Control, Terry Martin & Alexandra Bakhto, http://www.giac.org/cissp-papers/282.pdf Do an Internet search of the following: security checklist David L. Berger Forensic Consultant Investigator/Officer’s personal experience Accommodations for Learning Differences For reinforcement, the students will research and explain the differences between surveillance systems and intrusion detection systems. Use the Individual Work Rubric for assessment. For enrichment, the students will write a research paper regarding their choice of electronic security system (surveillance cameras, motion detectors, etc). Use the Research Rubric for assessment. State Education Standards Texas Essential Knowledge and Skills for Career and Technical Education §130.298. Security Services (One to Two Credits). (6) The student analyzes security systems and their role in an overall security strategy. The student is expected to: (A) summarize the purposes, types, and applications of physical and electronic access control systems, surveillance systems, and intrusion detection systems; (B) analyze how physical and electronic systems work together as an integrated system to support an overall protection strategy; and (C) analyze the roles of security surveys, inspections, and exercises to test existing protection measures. College and Career Readiness Standards English/Language Arts Standards III. Speaking B. Develop effective speaking styles for both group and one-on-one situations. 1. Participate actively and effectively in one-on-one oral communication situations. 2. Participate actively and effectively in group discussions. 9 Copyright © Texas Education Agency, 2012. All rights reserved. 3. Plan and deliver focused and coherent presentations that convey clear and distinct perspectives and demonstrate solid reasoning. 10 Copyright © Texas Education Agency, 2012. All rights reserved. Security Systems Analysis Key Terms Access controls – allow the user and the system to communicate with each other; includes a controller, a card reader, door contacts, and a control locking device Access credentials – used in conjunction with access controls, typically in the form of card readers and access cards Application Protocol-based IDS – a system or person that actively monitors and surveys the application-based communication between a system and a group of servers Authentication – identity confirmation Authorization – access to a location and/or information that is granted to a proven individual Biometrics – authorization and access based on an individual’s unique characteristics including handprints, fingerprints, or retinal scans Centralized Access Control Administration – access control that is administered and controlled from one location Console – a control unit that an individual uses to communicate with a computer system that also works together with sensors; includes a display and a keyboard Contact chip – a small integrated circuit which must come in contact with a reader in order for the two to communicate with each other Contactless chip – a small integrated circuit that functions through wireless technology (the circuit utilizes transceivers, antennas, and Radio Frequency Identification (RFID) Cryptographic keys – cryptographic operations in which a string of bits are used by a cryptographic algorithm to change a piece of text into a cipher resulting in information that can only be read using private keys or digital signatures Identification – a method used to verify a person’s identity Intrusion Detection System (IDS) – a program that monitors a system for malicious activity and in turn reports the activity Host-based IDS – a system on a host that detects intrusions by monitoring system calls, application logs, file-system modifications, and other host activities Network IDS – a system that locates intrusions by investigating the network traffic and monitoring multiple hosts Passive IDS – a system that sounds an alert when unusual (suspicious or malicious) activity is detected, and notifies the user when preventative action must be taken Passphrase – a statement, phrase, or series of words that replaces a password and is used for access to a computer system Preventative administrative controls – include policies, hiring practices, and security awareness Preventative physical controls – include badges, swipe cards, guards, and fences Preventative technical controls – include passwords, encryption, and antivirus software Profile-based anomaly detection – a program that monitors a system by analyzing previous system patterns and current system patterns that are highly deviated from an individual user’s activity Protocol-based IDS – a system or person that actively monitors and surveys the communication between a system and the server 11 Copyright © Texas Education Agency, 2012. All rights reserved. Reactive IDS – a system that sounds an alert when unusual activity (suspicious or malicious) is detected, and takes action immediately by blocking the system threat Security awareness – an attitude held by security personnel and non-security client employees, that places a high value on detecting, deterring, and reporting security exposures such as crime, safety hazards, fire hazards, theft, intrusions, and vandalism Security survey – used to identify potential security-related problem areas Sensor – a device that detects some form of input or information (i.e. motion, light, heat) and sends the information to the console Signature detection – a program that scans a system against already known computer viruses, malware, or attacks, and alerts the user if an attack in detected Statistical anomaly detection – a program that monitors the normal activity of a system and then informs the user if unusual or anomalous activity is detected Surveillance cameras – are capable of obtaining 24-hour steady video Threshold detection – a program that records by counting the number of times an incident occurs within a system 12 Copyright © Texas Education Agency, 2012. All rights reserved. Name:_________________________________ Date:__________________________ Security Systems Analysis Exam Matching a. Access controls b. Access credentials c. Authentication d. Authorization e. Biometrics f. Centralized access control administration g. Console h. Contact chip i. Contactless chip j. Cryptographic keys k. Identification l. Intrusion detection system m. n. o. p. q. r. s. t. u. v. w. x. Passphrase Preventative administrative controls Preventative physical controls Preventative technical controls Profile-based anomaly detection Security awareness Security survey Sensor Signature detection Statistical anomaly detection Surveillance cameras Threshold detection 1._____ An attitude held by security personnel and by non-security client employees that places a high value on detecting, deterring and reporting security exposures such as crime, safety hazards, fire hazards, theft, intrusions, and vandalism 2._____ A program that monitors a system for malicious activity and in turn reports that activity 3._____ A program that monitors a system by analyzing previous system patterns and analyzing current system patterns that are highly deviated from an individual user’s activity 4._____ Includes policies, hiring practices, and security awareness 5._____ Cryptographic operations in which a string of bits are used by a cryptographic algorithm to change a string of text into a cipher resulting in information that can only be read through private keys or digital signatures 6._____ Method used to verify a person’s identity 7._____ Access to a location and/or information that is granted to a proven individual 8._____ A program that records by counting the number of times that an incident occurs within a system 9._____ Are capable of obtaining 24-hour steady video 10._____ Used to identify potential security-related problem areas 11._____ Used in conjunction with access controls, typically in the form of card readers and access cards 13 Copyright © Texas Education Agency, 2012. All rights reserved. 12._____ A program that monitors the normal activity of a system and then informs the user if unusual or anomalous activity is detected 13._____ A small integrated circuit that functions through wireless technology 14._____ A program that scans a system against already known computer viruses, malware, or attacks, and alerts the user if an attack in detected 15._____ A security device that allows the user and the system to communicate with each other; includes a controller, a card reader, door contacts, and a control locking device 16._____ A statement, phrase or series of words that replaces a password and is used for access to a computer system 17._____ A device that detects some form of input/information (i.e. motion, light, heat) and sends the information to the console 18._____ Access control that is administered and controlled at one location 19._____ Identity confirmation 20._____ Includes passwords, encryption, and antivirus software 21._____ A control unit that an individual uses to communicate with a computer system that also works together with sensors; includes a display and a keyboard 22._____ Authorization and access that is based on an individual’s unique characteristics including handprints, fingerprints or retinal scans 23._____ Includes badges, swipe cards, guards, and fences 24._____ A small integrated circuit which must come in contact with a reader in order for the two to communicate with each other Multiple Choice 25.___ With security awareness, security personnel protect which of the following? A. The client’s employees B. The client’s property C. The client’s image D. All of the above 26. ___ The three initial steps taken with a security threat do not include which of the following? A. Identify the threat B. Ask for a second opinion on the threat C. Report the threat D. Discuss and develop a solution that eliminates the threat 14 Copyright © Texas Education Agency, 2012. All rights reserved. 27. ___ Although access controls can take many forms, the term as it is applied in the traditional security industry means___________, as opposed to something such as a fence or turnstile. A. Physical Security B. Intrusion Detection Systems C. Electronic access control systems D. Surveillance Systems 28. ___ A typical access control system has which of the following? A. Controller B. Credential reader C. Door position contacts D. All of the above 29. ___ Distinct functions of security and access control do not include which of the following? A. Installation B. Identification C. Authorization D. Authentication 30. ___ Security systems, by their very nature, use which of the following? A. Centralization B. Integration C. Suspicion D. Transmission 31. ___ Which of the following takes the place of a password? A. Passphrase B. Authentication C. Signature Detection D. Access Controls 32. ___ Which of the following contains a small integrated circuit? A. Biometrics B. Console C. Contact chip D. Cryptographic Keys 33. ___ When a match is found, an alert is sent for further actions; which of the following does this describe? A. Threshold detection B. Profile based anomaly detection C. Centralized Access Control Administration D. Signature Detection 15 Copyright © Texas Education Agency, 2012. All rights reserved. 34. ___ Which of the following has a controller, credential reader, door position contacts, and means of controlling the locking device or door operator? A. Surveillance Cameras B. Access Controls C. Contactless Chip D. Sensor 35. ___ Which of the following is technology that has moved into the mainstream with the development of RFID, which uses RF induction and transmission? A. Contactless chip B. Cryptographic Keys C. Sensor D. Surveillance Cameras 16 Copyright © Texas Education Agency, 2012. All rights reserved. Security Systems Analysis Exam Key 1. R 2. L 3. Q 4. N 5. J 6. K 7. D 8. X 9. W 10. S 11. B 12. V 13. I 14. U 15. A 16. M 17. T 18. F 19. C 20. P 21. G 22. E 23. O 24. H 25. D 26. B 27. C 28. D 29. A 30. B 31. A 32. C 33. D 34. B 35. A 17 Copyright © Texas Education Agency, 2012. All rights reserved. Name_______________________________ Date________________ Group Evaluation Group 1 Did the group take the assignment seriously? No 1 2 3 4 5 6 7 8 9 Yes 10 Could you tell what the group was trying to portray? No 1 2 3 4 5 6 7 8 9 Yes 10 9 Yes 10 9 Yes 10 Was the group portrayal creative? No 1 2 3 4 5 6 7 Did the group include the correct elements? No 1 2 3 4 5 6 7 8 8 Would you like to see this group demonstrate their talent for you in the future? No Yes 1 2 3 4 5 6 7 8 9 10 Total Score_______ Group 2 Did the group take the assignment seriously? No 1 2 3 4 5 6 7 8 Could you tell what the group was trying to portray? No 1 2 3 4 5 6 7 8 Was the group portrayal creative? No 1 2 3 4 5 6 7 Did the group include the correct elements? No 1 2 3 4 5 6 7 8 8 9 Yes 10 9 Yes 10 9 Yes 10 9 Yes 10 Would you like to see this group demonstrate their talent for you in the future? No Yes 1 2 3 4 5 6 7 8 9 10 Total Score_______ 18 Copyright © Texas Education Agency, 2012. All rights reserved. Group 3 Did the group take the assignment seriously? No 1 2 3 4 5 6 7 8 9 Yes 10 Could you tell what the group was trying to portray? No 1 2 3 4 5 6 7 8 9 Yes 10 Was the group portrayal creative? No 1 2 3 4 5 6 8 9 Yes 10 8 9 Yes 10 7 Did the group include the correct elements? No 1 2 3 4 5 6 7 Would you like to see this group demonstrate their talent for you in the future? No Yes 1 2 3 4 5 6 7 8 9 10 Total Score_______ Group 4 Did the group take the assignment seriously? No 1 2 3 4 5 6 7 8 9 Yes 10 Could you tell what the group was trying to portray? No 1 2 3 4 5 6 7 8 9 Yes 10 Was the group portrayal creative? No 1 2 3 4 5 6 8 9 Yes 10 8 9 Yes 10 7 Did the group include the correct elements? No 1 2 3 4 5 6 7 Would you like to see this group demonstrate their talent for you in the future? No Yes 1 2 3 4 5 6 7 8 9 10 Total Score_______ 19 Copyright © Texas Education Agency, 2012. All rights reserved. Group 5 Did the group take the assignment seriously? No 1 2 3 4 5 6 7 8 9 Yes 10 Could you tell what the group was trying to portray? No 1 2 3 4 5 6 7 8 9 Yes 10 Was the group portrayal creative? No 1 2 3 4 5 6 8 9 Yes 10 8 9 Yes 10 7 Did the group include the correct elements? No 1 2 3 4 5 6 7 Would you like to see this group demonstrate their talent for you in the future? No Yes 1 2 3 4 5 6 7 8 9 10 Total Score_______ Group 6 Did the group take the assignment seriously? No 1 2 3 4 5 6 7 8 9 Yes 10 Could you tell what the group was trying to portray? No 1 2 3 4 5 6 7 8 9 Yes 10 Was the group portrayal creative? No 1 2 3 4 5 6 8 9 Yes 10 8 9 Yes 10 7 Did the group include the correct elements? No 1 2 3 4 5 6 7 Would you like to see this group demonstrate their talent for you in the future? No Yes 1 2 3 4 5 6 7 8 9 10 Total Score_______ 20 Copyright © Texas Education Agency, 2012. All rights reserved. Name_______________________________________ Date_______________________________ Discussion Rubric 4 pts. Excellent Objectives 3 pts. Good 2 pts. Needs Some Improvement 1 pt. Needs Much Improvement N/A Pts. Participates in group discussion Encourages others to join the conversation Keeps the discussion progressing to achieve goals Shares thoughts actively while offering helpful recommendations to others Gives credit to others for their ideas Respects the opinions of others Involves others by asking questions or requesting input Expresses thoughts and ideas clearly and effectively Total Points (32 pts.) Comments: 21 Copyright © Texas Education Agency, 2012. All rights reserved. Name______________________________________ Date_______________________________________ Individual Work Rubric 4 pts. Excellent Objectives 3 pts. Good 2 pts. Needs Some Improvement 1 pt. Needs Much Improvement N/A Pts. Follows directions Student completed the work as directed, following the directions given, in order and to the level of quality indicated Time management Student used time wisely and remained on task 100% of the time Organization Student kept notes and materials in a neat, legible, and organized manner. Information was readily retrieved Evidence of learning Student documented information in his or her own words and can accurately answer questions related to the information retrieved *Research/Gathering information (if relevant) Student used a variety of methods and sources to gather information. Student took notes while gathering information Total Points (20 pts.) Comments: 22 Copyright © Texas Education Agency, 2012. All rights reserved. Name:____________________________________ Date:_____________________________ Presentation Rubric 4 pts. Excellent Objectives 3 pts. Good 2 pts. Needs Some Improvement 1 pt. Needs Much Improvement N/A Pts. Topic/Content Topic discussed completely and in-depth Includes properly cited sources (if used) Creativity/Neatness Integrates a variety of multimedia effects to create a professional presentation (transition and graphics) or appropriate visual aid used Title slide, table of contents, bibliography are included, using acceptable format Mechanics Grammar, spelling, punctuation, and capitalization are correct Image and font size are legible to the entire audience Oral Presentation Communicates with enthusiasm and eye contact Voice delivery and projection are dynamic and audible Audience Interaction Presentation holds audience’s attention and relates a clear message Clearly and effectively communicates the content throughout the presentation Total Points (20 pts.) Comments: 23 Copyright © Texas Education Agency, 2012. All rights reserved. Name______________________________________ Date_______________________________________ Research Rubric 4 pts. Excellent Objectives 3 pts. Good 2 pts. Needs Some Improvement 1 pt. Needs Much Improvement N/A Pts. Question/goal Student identified and communicated a question or goal of the research Research/Gathering information (if relevant) Student used a variety of methods and sources to gather information. Student took notes while gathering information Conclusion/Summary Student drew insightful conclusions and observations from the information gathered. Information is organized in a logical manner Communication Student communicated the information gathered and summary or conclusions persuasively. Student demonstrated skill in the use of media used to communicate the results of research Reflection Student reflected on the importance of the research and its potential application Total Points (20 pts.) Comments: 24 Copyright © Texas Education Agency, 2012. All rights reserved.