Security Systems Analysis

advertisement
Security Systems Analysis
Course
Security
Services
Unit VIII
Risk
Management
Technologies
Essential
Question
What different
security
methodologies
do security
specialists
employ to protect
clients and their
assets?
TEKS
§130.298(c)
(6)(A)(B)(C)
Prior Student
Learning
Prevention
Analysis &
Overall Roles of
Security
Systems
Estimated Time
6 to 7 hours
Rationale
The duty of security services is to provide clients safety and protection.
Services that are typically provided are guard and patrol services, such as
bodyguard, guard dog, parking security, and security guard services.
However, some security institutions may provide advanced special operations
services if the client demands it. Examples of these services are the
prevention of unauthorized activity or entry, traffic regulation, access control,
and fire and theft prevention and detection.
Objectives
The students will be able to:
1. Summarize the purposes, types, and applications of physical and
electronic access control systems, surveillance systems, and intrusion
detection systems.
2. Analyze how physical and electronic systems work together as an
integrated system to support an overall protection strategy.
3. Analyze the roles of security surveys, inspections, and exercises to test
existing protection measures.
Engage
Have the class break into several small groups and discuss the questions
below. Then discuss the questions as a class. Use the Discussion Rubric for
assessment.
 What are the services that a security professional can provide?
 What are the names of some people and/or companies (private and
public) that need security services?
 What are the physical threats that would require the use of security
services?
 What are the technological threats available that would require the
use of security services?
Key Points
I. Security Awareness
A. Is an attitude held by security personnel and non-security client
employees that places a high value on detecting, deterring, and
reporting security exposures such as crime, safety hazards, fire
hazards, theft, intrusions, and vandalism
B. Requires security personnel to protect the client’s employees,
property, guests, and image, and assist the client’s personnel and
visitors
C. Requires that non-security client employees are aware of the
security program’s goals and methods and support the security
program, abiding by its policies
D. Founded on the concept of preventative security
1
Copyright © Texas Education Agency, 2012. All rights reserved.
E. The three main security principles are
1. Availability
2. Integrity
3. Confidentiality
II.
Physical Security
A. Two basic duties of performing physical security
1. Observe
2. Report
B. Three initial steps taken with a security threat
1. Identify it
2. Report it
3. Discuss and develop a solution that eliminates the problem
C. Cultivates security awareness among the clients and requires
conscientious and highly visible security officers
D. A priority concern of top-level management of businesses,
industries, and institutions
E. Has the ultimate goal of loss prevention which results in the
maximum return on investments
F. Requires two basic investigative skills
1. Communication skills
2. Surveillance capabilities
G. Defines the primary hardware systems traditionally with
1. Locks
2. Security alarms
3. Access controls
4. Surveillance video
III. Electronic Access Control Systems
A. Security devices that allow the user and the system to
communicate with each other; these include
1. Controller
2. Card reader
3. Door contacts
4. Control locking device
B. Not security alarm systems; the two systems do have a lot in
common, but are usually implemented separately
C. Strategically positioned as a natural focal point for a security officer
to initiate ownership of the physical security systems, systems that
are traditionally supported by facilities personnel
1. The installation of an electronic access control system can be
arranged the same way as a security alarm, with the access
controllers positioned at a central location
2. Peripheral devices such as the door and the elevator controls,
the credential readers, and the interfaces to other systems can
connect to the access controllers by lengthy cabling
3. Example: a typical access control system has a controller, a
credential reader, door position contacts, and a means of
controlling the locking device or door operator
2
Copyright © Texas Education Agency, 2012. All rights reserved.
D. Require access credentials which are used in conjunction with
access controls, typically in the form of access cards and card
readers
1. Access cards and card readers are paired components (a card
is to a reader as a key is to a lock)
2. Card and reader technology has evolved significantly, from
magnetic strips to encrypted proximity smart cards
a) Reader technology now includes biometrics as a binding
point between the person and the authentication
credential
b) Cards are routinely produced that can be embossed with
bar codes and photographs
E. Require communication between the card and the controller using
the card data and the reader data stream
1. The card data must be readable by the reader, and the reader
data stream format must be supported by the controller
2. A controller is a chip, an expansion card, or a stand-alone
device that interfaces with a peripheral device; this connection
may be a link between two parts of a computer or a controller
on an external device that manages the operation of that
device
a) A contact chip – a small integrated circuit which must
come in contact with a reader in order for the two to
communicate with each other
b) A contactless chip – a small integrated circuit that
functions through wireless technology (the circuit utilizes
transceivers, antennas, and RFID)
3. Distinct functions of security and access control
a) Identification – the method used to verify a person’s
identity
b) Authentication – identity confirmation
c) Authorization – access to a location and/or information
that is granted to a proven individual
(1) Use of biometrics, passwords, passphrases,
tokens, or other private information
(2) Biometrics – authorization and access that is based
on an individual’s unique characteristics including
handprints, fingerprints, or retinal scans
(3) Most common biometric systems
(a) Fingerprint
(b) Palm Scan
(c) Hand Geometry
(d) Iris Scan
(e) Signature Dynamics
(f) Keyboard Dynamics
(g) Voice Print
(h) Facial Scan
(i) Hand Topography
F. Access control key points and mechanisms include
3
Copyright © Texas Education Agency, 2012. All rights reserved.
1. Passwords
2. Passphrase – a statement, phrase or series of words that
replaces a password and is used for access to a computer
system
3. Cryptographic keys – cryptographic operations in which a
string of bits are used by a cryptographic algorithm to change
a string of text into a cipher resulting in information that can
only be read through private keys or digital signatures
4. Centralized Access Control Administration – access control
that is administered and controlled at one location
5. Preventative administrative controls – includes policies, hiring
practices, and security awareness
6. Preventative physical controls – includes badges, swipe cards,
guards, and fences
7. Preventative technical controls – includes passwords,
encryption, and antivirus software
IV. Surveillance Systems
A. Many people continue to rely on old-fashioned security methods
such as door and window locks, but it is more practical to invest in
surveillance cameras
B. Surveillance cameras
1. Currently among the most popular and in-demand security
devices
2. Capable of obtaining 24-hour steady video
3. Found in various locations including
a) Public highways
b) Parks
c) Vehicles
d) Airplanes
e) Ships
4. Ideal for industrial and official establishments, and individual
homes
5. Commonly used for standard property monitoring
6. Used indoors and outdoors
7. Used visibly and hidden
8. Serve a variety of purposes including employee theft and
monitoring children (i.e. nanny cams)
9. Found in two categories
a) Hardwired
(1) Effective but can easily accumulate wires
b) Wireless
(1) Easier to setup, install, and place anywhere
(2) Clutter-free and dependable (i.e. unaffected by
accidental power shutdowns and/or interruptions)
V.
Intrusion Detection System (IDS)
A. A program that monitors a system for malicious activity and in turn
reports the activity
4
Copyright © Texas Education Agency, 2012. All rights reserved.
B. Designed to test/analyze network system traffic/events against a
given set of parameters and send out an alert or capture data when
these thresholds are met
C. Uses collected information and a predefined knowledge-based
systems to reason about the possibility of an intrusion
D. Detects attacks as soon as possible and takes the appropriate
action, but does not usually take preventive measures when an
attack is detected
E. Reactive rather than proactive
F. Configurable to run unattended for extended periods of time
G. Must recognize unusual activity and operate without unduly
affecting the system’s activity
H. Consists of three components or modules
1. Event generator – a data source or sensor which is
responsible for capturing and sending packets to the console
2. Analysis engine or console – responsible for analyzing the
packets captured by the sensor and examining the data for the
symptoms of attacks or other policy violations
3. Response manager – only acts when inaccuracies (possible
intrusion attacks) are found in the system; acts by notifying
someone or something in the form of a response
I. Types
1. Network IDS – a system that locates intrusions by
investigating the network traffic and monitoring multiple hosts
2. Protocol-based IDS – a system or person that actively
monitors and surveys the communication between a system
and the server
3. Application Protocol-based IDS – a system or person that
actively monitors and surveys the application-based
communication between a system and a group of servers
4. Host-based IDS – a system on a host that detects intrusions
by monitoring system calls, application logs, file-system
modifications, and other host activities
5. Passive IDS – a system that alerts when unusual (suspicious
or malicious) activity is detected and notifies the user when
preventative action must be taken
6. Reactive IDS – a system that alerts when unusual activity
(suspicious or malicious) is detected and takes action
immediately by blocking the system threat
J. Detection approaches
1. Signature detection
a) Used to discriminate between anomalies or attack
patterns (signatures) and known intrusion detection
signatures
b) Often used in the IDS and many anti-malware systems
such as anti-virus and anti-spyware, etc.
c) Scans the system against already known computer
viruses, malware, or attacks
d) Alerts the user if an attachment is detected
5
Copyright © Texas Education Agency, 2012. All rights reserved.
2. Statistical anomaly detection
a) Monitors the normal activity of a system and then
informs the user if unusual or anomalous activity is
detected
b) Applies statistical tests to observed user behavior to
determine with a high level of confidence whether or not
the behavior is legitimate
c) Falls into two broad categories
(1) Threshold detection – a program that records by
counting the number of times that an incident
occurs within a system
(2) Profile-based anomaly detection – a program that
monitors a system by analyzing previous system
patterns and current system patterns that are
highly deviated from an individual user’s activity
VI. Integrated Security Systems
A. Security services is one of the fastest growing areas of integrated
building systems
B. Demand for security services has maintained steady growth since
September 11, 2001
C. Security systems inherently require an integrated approach, except
for local card entry locks
D. Physical access control is more than the use of a simple lock;
instead the lock may be integrated with a biometrics ID system (i.e.
the use of an ID card or personal identification number (PIN) in
conjunction with a physical characteristic)
1. The biometric aspect of the process is to compare a stored
biometric template to a real-time scan of an eye, a finger, or
some other body part
2. The door lock must communicate with a server that has stored
the template data in order for the biometric aspect to work
E. A high-resolution digital closed circuit television (CCTV) system
permits easy access to stored images and the computer analysis of
the images, which aids in decision-making (i.e. to focus on an
individual/location or send a warning message/alarm)
F. Once data and control are connecting on a communication link,
they can easily tie in with other systems, such as the fire alarm
system, lighting control system, heating, ventilation and air
conditioning (HVAC) system, and the computer access control
system
G. The projected expansion of power over Ethernet (PoE)
1. A very important development in the integration of security
with other building systems
2. Makes it possible to operate door locks and cameras with the
same cable that ties them into the building’s local area
network (LAN)
H. The installation of sophisticated access control systems in
commercial buildings is a new trend toward systems convergence
6
Copyright © Texas Education Agency, 2012. All rights reserved.
1. After scanning the information, it takes a digital photo or
captures the visitor’s signature
2. It then can contact the visitor’s host by phone, e-mail, or with a
real-time network messaging
3. Example: scanning the photo ID, the business card or the
passport ID of an arriving visitor, which instantaneously
checks whether the visitor is expected or has been in the
facility before, and makes sure that the visitor is not on a
“watch list”
I. This surveillance system integrates all critical security functions,
such as alarm, fire, and access systems, allowing the security staff
to simultaneously monitor all systems from the centralized security
command center
1. Also the capability to control all the lights throughout the entire
building, as well as the HVAC system
2. Example: if an alarm is sounded, the signal automatically
activates a camera located in the affected area, where the
security personnel can instantly view the incident
J. Integrated security system design services include
1. Enterprise systems for local, regional, or global monitoring
2. Monitoring emergency operations center and fusion center
design which manages and shares information between and
across operations
3. Video surveillance systems
4. Access control systems
5. IDS
6. Physical security information management systems
7. Network design and bandwidth planning
8. Intercom systems and emergency communications
9. Door and window selection and hardware coordination
10. Conduit layouts with security power requirements
11. Lighting layouts with photometric detail
12. Design services for new construction and renovations/re-fits
K. Another aspect of the recent integrated security systems is the
capability to use specific notification systems that can inform the
building occupants of an event/crisis and inform them of the proper
reaction
VII. Security Inspection
A. An important step toward preventing theft, burglary, and other
crimes
B. Can indicate features which would make entry easy or difficult for a
prospective offender when completed by trained security personnel
C. Shows how a location’s security can be improved
D. Requires observation of all entry points to determine what steps
can reduce vulnerability
E. Begins at the front door and then includes the side and rear doors,
windows, locks, lights, and landscaping
F. Are used by all professionals in the field of crime prevention,
7
Copyright © Texas Education Agency, 2012. All rights reserved.
including both security services and law enforcement professionals
G. Requires the use of standard inspection forms/checklists that
indicate security weaknesses and/or hazards that require attention
including
1. Front entrance
2. Side or rear entrance
3. Entrances from the garage
4. Upper floor windows
5. Garage doors and windows
6. Basement doors and windows
7. Ground floor windows
8. Recommendations and comments
Activities
1. Have the students act as if they are selling a form of security services (i.e.
physical security, electronic security, cameras, etc). Have them create a
sales pitch using computer-based presentation software (note: you may
want to expand the role play and act as the CEO of a business with the
students who are not presently acting as the board members; this activity
can be completed either individually or in small work groups). Use the
Presentation Rubric for assessment.
2. Have the students work in several small groups and create a security
client (i.e. shopping center, celebrity, subdivision, etc.), including the client
information and a floor plan and/or a sketch. After approximately 15
minutes have the groups exchange their client information. Then each
group must develop a means to “attack” the client. After approximately 15
minutes, have the groups return the information about the client (who is
under attack) to the original group. Next, the groups must create a
strategy to protect their client. After approximately 20 minutes, students
can present their plan to protect the client to the entire class. Use the
Presentation Rubric and the Group Evaluation Rubric for assessment.
3. Have the students complete the security inspection form of an actual
location (to find a sample form do an Internet search for the following:
“security checklist David L. Berger Forensic Consultant”). Students can
make a list and/or sketch of their ideas and present to the entire class how
the location’s security can be strengthened. Use the Individual Work
Rubric for assessment.
Assessments
Security Systems Analysis Exam and Key
Discussion Rubric
Group Evaluation Rubric
Individual Work Rubric
Presentation Rubric
Research Rubric
Materials
8
Copyright © Texas Education Agency, 2012. All rights reserved.
Security Systems Analysis computer-based presentation
Security Systems Analysis Key Terms
Computers with computer-based presentation software
White board/chalk board
Computer with Internet Access
Resources
0205592406, Introduction to Private Security: Theory Meets Practice, Cliff
Roberson and Michael L. Birzer, Prentice Hall, 2009
0750684321, Introduction to Security, Robert J. Fischer and Gion Green,
Butterworth-Heinemann, 2008
Access Control Systems & Methodology, Jeff Smith, Purdue University
Physical Access Control, Terry Martin & Alexandra Bakhto,
http://www.giac.org/cissp-papers/282.pdf
Do an Internet search of the following: security checklist David L. Berger
Forensic Consultant
Investigator/Officer’s personal experience
Accommodations for Learning Differences
For reinforcement, the students will research and explain the differences
between surveillance systems and intrusion detection systems. Use the
Individual Work Rubric for assessment.
For enrichment, the students will write a research paper regarding their choice
of electronic security system (surveillance cameras, motion detectors, etc).
Use the Research Rubric for assessment.
State Education Standards
Texas Essential Knowledge and Skills for Career and Technical Education
§130.298. Security Services (One to Two Credits).
(6)
The student analyzes security systems and their role in an
overall security strategy. The student is expected to:
(A)
summarize the purposes, types, and applications of
physical and electronic access control systems,
surveillance systems, and intrusion detection systems;
(B)
analyze how physical and electronic systems work
together as an integrated system to support an overall
protection strategy; and
(C)
analyze the roles of security surveys, inspections, and
exercises to test existing protection measures.
College and Career Readiness Standards
English/Language Arts Standards
III. Speaking
B. Develop effective speaking styles for both group and one-on-one
situations.
1. Participate actively and effectively in one-on-one oral communication
situations.
2. Participate actively and effectively in group discussions.
9
Copyright © Texas Education Agency, 2012. All rights reserved.
3. Plan and deliver focused and coherent presentations that convey
clear and distinct perspectives and demonstrate solid reasoning.
10
Copyright © Texas Education Agency, 2012. All rights reserved.
Security Systems Analysis Key Terms
Access controls – allow the user and the system to communicate with each other;
includes a controller, a card reader, door contacts, and a control locking device
Access credentials – used in conjunction with access controls, typically in the form of card
readers and access cards
Application Protocol-based IDS – a system or person that actively monitors and surveys
the application-based communication between a system and a group of servers
Authentication – identity confirmation
Authorization – access to a location and/or information that is granted to a proven
individual
Biometrics – authorization and access based on an individual’s unique characteristics
including handprints, fingerprints, or retinal scans
Centralized Access Control Administration – access control that is administered and
controlled from one location
Console – a control unit that an individual uses to communicate with a computer system
that also works together with sensors; includes a display and a keyboard
Contact chip – a small integrated circuit which must come in contact with a reader in order
for the two to communicate with each other
Contactless chip – a small integrated circuit that functions through wireless technology
(the circuit utilizes transceivers, antennas, and Radio Frequency Identification (RFID)
Cryptographic keys – cryptographic operations in which a string of bits are used by a
cryptographic algorithm to change a piece of text into a cipher resulting in information
that can only be read using private keys or digital signatures
Identification – a method used to verify a person’s identity
Intrusion Detection System (IDS) – a program that monitors a system for malicious activity
and in turn reports the activity
Host-based IDS – a system on a host that detects intrusions by monitoring system calls,
application logs, file-system modifications, and other host activities
Network IDS – a system that locates intrusions by investigating the network traffic and
monitoring multiple hosts
Passive IDS – a system that sounds an alert when unusual (suspicious or malicious)
activity is detected, and notifies the user when preventative action must be taken
Passphrase – a statement, phrase, or series of words that replaces a password and is
used for access to a computer system
Preventative administrative controls – include policies, hiring practices, and security
awareness
Preventative physical controls – include badges, swipe cards, guards, and fences
Preventative technical controls – include passwords, encryption, and antivirus software
Profile-based anomaly detection – a program that monitors a system by analyzing
previous system patterns and current system patterns that are highly deviated from an
individual user’s activity
Protocol-based IDS – a system or person that actively monitors and surveys the
communication between a system and the server
11
Copyright © Texas Education Agency, 2012. All rights reserved.
Reactive IDS – a system that sounds an alert when unusual activity (suspicious or
malicious) is detected, and takes action immediately by blocking the system threat
Security awareness – an attitude held by security personnel and non-security client
employees, that places a high value on detecting, deterring, and reporting security
exposures such as crime, safety hazards, fire hazards, theft, intrusions, and
vandalism
Security survey – used to identify potential security-related problem areas
Sensor – a device that detects some form of input or information (i.e. motion, light, heat)
and sends the information to the console
Signature detection – a program that scans a system against already known computer
viruses, malware, or attacks, and alerts the user if an attack in detected
Statistical anomaly detection – a program that monitors the normal activity of a system
and then informs the user if unusual or anomalous activity is detected
Surveillance cameras – are capable of obtaining 24-hour steady video
Threshold detection – a program that records by counting the number of times an incident
occurs within a system
12
Copyright © Texas Education Agency, 2012. All rights reserved.
Name:_________________________________
Date:__________________________
Security Systems Analysis Exam
Matching
a. Access controls
b. Access credentials
c. Authentication
d. Authorization
e. Biometrics
f. Centralized access control administration
g. Console
h. Contact chip
i. Contactless chip
j. Cryptographic keys
k. Identification
l. Intrusion detection system
m.
n.
o.
p.
q.
r.
s.
t.
u.
v.
w.
x.
Passphrase
Preventative administrative controls
Preventative physical controls
Preventative technical controls
Profile-based anomaly detection
Security awareness
Security survey
Sensor
Signature detection
Statistical anomaly detection
Surveillance cameras
Threshold detection
1._____ An attitude held by security personnel and by non-security client employees that
places a high value on detecting, deterring and reporting security exposures such as
crime, safety hazards, fire hazards, theft, intrusions, and vandalism
2._____ A program that monitors a system for malicious activity and in turn reports that activity
3._____ A program that monitors a system by analyzing previous system patterns and
analyzing current system patterns that are highly deviated from an individual user’s
activity
4._____ Includes policies, hiring practices, and security awareness
5._____ Cryptographic operations in which a string of bits are used by a cryptographic
algorithm to change a string of text into a cipher resulting in information that can only
be read through private keys or digital signatures
6._____ Method used to verify a person’s identity
7._____ Access to a location and/or information that is granted to a proven individual
8._____ A program that records by counting the number of times that an incident occurs within
a system
9._____ Are capable of obtaining 24-hour steady video
10._____ Used to identify potential security-related problem areas
11._____ Used in conjunction with access controls, typically in the form of card readers and
access cards
13
Copyright © Texas Education Agency, 2012. All rights reserved.
12._____ A program that monitors the normal activity of a system and then informs the user if
unusual or anomalous activity is detected
13._____ A small integrated circuit that functions through wireless technology
14._____ A program that scans a system against already known computer viruses, malware, or
attacks, and alerts the user if an attack in detected
15._____ A security device that allows the user and the system to communicate with each
other; includes a controller, a card reader, door contacts, and a control locking device
16._____ A statement, phrase or series of words that replaces a password and is used for
access to a computer system
17._____ A device that detects some form of input/information (i.e. motion, light, heat) and
sends the information to the console
18._____ Access control that is administered and controlled at one location
19._____ Identity confirmation
20._____ Includes passwords, encryption, and antivirus software
21._____ A control unit that an individual uses to communicate with a computer system that
also works together with sensors; includes a display and a keyboard
22._____ Authorization and access that is based on an individual’s unique characteristics
including handprints, fingerprints or retinal scans
23._____ Includes badges, swipe cards, guards, and fences
24._____ A small integrated circuit which must come in contact with a reader in order for the
two to communicate with each other
Multiple Choice
25.___ With security awareness, security personnel protect which of the following?
A. The client’s employees
B. The client’s property
C. The client’s image
D. All of the above
26. ___ The three initial steps taken with a security threat do not include which of the following?
A. Identify the threat
B. Ask for a second opinion on the threat
C. Report the threat
D. Discuss and develop a solution that eliminates the threat
14
Copyright © Texas Education Agency, 2012. All rights reserved.
27. ___ Although access controls can take many forms, the term as it is applied in the
traditional security industry means___________, as opposed to something such as a
fence or turnstile.
A. Physical Security
B. Intrusion Detection Systems
C. Electronic access control systems
D. Surveillance Systems
28. ___ A typical access control system has which of the following?
A. Controller
B. Credential reader
C. Door position contacts
D. All of the above
29. ___ Distinct functions of security and access control do not include which of the following?
A. Installation
B. Identification
C. Authorization
D. Authentication
30. ___ Security systems, by their very nature, use which of the following?
A. Centralization
B. Integration
C. Suspicion
D. Transmission
31. ___ Which of the following takes the place of a password?
A. Passphrase
B. Authentication
C. Signature Detection
D. Access Controls
32. ___ Which of the following contains a small integrated circuit?
A. Biometrics
B. Console
C. Contact chip
D. Cryptographic Keys
33. ___ When a match is found, an alert is sent for further actions; which of the following does
this describe?
A. Threshold detection
B. Profile based anomaly detection
C. Centralized Access Control Administration
D. Signature Detection
15
Copyright © Texas Education Agency, 2012. All rights reserved.
34. ___ Which of the following has a controller, credential reader, door position contacts, and
means of controlling the locking device or door operator?
A. Surveillance Cameras
B. Access Controls
C. Contactless Chip
D. Sensor
35. ___ Which of the following is technology that has moved into the mainstream with the
development of RFID, which uses RF induction and transmission?
A. Contactless chip
B. Cryptographic Keys
C. Sensor
D. Surveillance Cameras
16
Copyright © Texas Education Agency, 2012. All rights reserved.
Security Systems Analysis Exam Key
1. R
2. L
3. Q
4. N
5. J
6. K
7. D
8. X
9. W
10. S
11. B
12. V
13. I
14. U
15. A
16. M
17. T
18. F
19. C
20. P
21. G
22. E
23. O
24. H
25. D
26. B
27. C
28. D
29. A
30. B
31. A
32. C
33. D
34. B
35. A
17
Copyright © Texas Education Agency, 2012. All rights reserved.
Name_______________________________
Date________________
Group Evaluation
Group 1
Did the group take the assignment seriously?
No
1
2
3
4
5
6
7
8
9
Yes
10
Could you tell what the group was trying to portray?
No
1
2
3
4
5
6
7
8
9
Yes
10
9
Yes
10
9
Yes
10
Was the group portrayal creative?
No
1
2
3
4
5
6
7
Did the group include the correct elements?
No
1
2
3
4
5
6
7
8
8
Would you like to see this group demonstrate their talent for you in the future?
No
Yes
1
2
3
4
5
6
7
8
9
10
Total Score_______
Group 2
Did the group take the assignment seriously?
No
1
2
3
4
5
6
7
8
Could you tell what the group was trying to portray?
No
1
2
3
4
5
6
7
8
Was the group portrayal creative?
No
1
2
3
4
5
6
7
Did the group include the correct elements?
No
1
2
3
4
5
6
7
8
8
9
Yes
10
9
Yes
10
9
Yes
10
9
Yes
10
Would you like to see this group demonstrate their talent for you in the future?
No
Yes
1
2
3
4
5
6
7
8
9
10
Total Score_______
18
Copyright © Texas Education Agency, 2012. All rights reserved.
Group 3
Did the group take the assignment seriously?
No
1
2
3
4
5
6
7
8
9
Yes
10
Could you tell what the group was trying to portray?
No
1
2
3
4
5
6
7
8
9
Yes
10
Was the group portrayal creative?
No
1
2
3
4
5
6
8
9
Yes
10
8
9
Yes
10
7
Did the group include the correct elements?
No
1
2
3
4
5
6
7
Would you like to see this group demonstrate their talent for you in the future?
No
Yes
1
2
3
4
5
6
7
8
9
10
Total Score_______
Group 4
Did the group take the assignment seriously?
No
1
2
3
4
5
6
7
8
9
Yes
10
Could you tell what the group was trying to portray?
No
1
2
3
4
5
6
7
8
9
Yes
10
Was the group portrayal creative?
No
1
2
3
4
5
6
8
9
Yes
10
8
9
Yes
10
7
Did the group include the correct elements?
No
1
2
3
4
5
6
7
Would you like to see this group demonstrate their talent for you in the future?
No
Yes
1
2
3
4
5
6
7
8
9
10
Total Score_______
19
Copyright © Texas Education Agency, 2012. All rights reserved.
Group 5
Did the group take the assignment seriously?
No
1
2
3
4
5
6
7
8
9
Yes
10
Could you tell what the group was trying to portray?
No
1
2
3
4
5
6
7
8
9
Yes
10
Was the group portrayal creative?
No
1
2
3
4
5
6
8
9
Yes
10
8
9
Yes
10
7
Did the group include the correct elements?
No
1
2
3
4
5
6
7
Would you like to see this group demonstrate their talent for you in the future?
No
Yes
1
2
3
4
5
6
7
8
9
10
Total Score_______
Group 6
Did the group take the assignment seriously?
No
1
2
3
4
5
6
7
8
9
Yes
10
Could you tell what the group was trying to portray?
No
1
2
3
4
5
6
7
8
9
Yes
10
Was the group portrayal creative?
No
1
2
3
4
5
6
8
9
Yes
10
8
9
Yes
10
7
Did the group include the correct elements?
No
1
2
3
4
5
6
7
Would you like to see this group demonstrate their talent for you in the future?
No
Yes
1
2
3
4
5
6
7
8
9
10
Total Score_______
20
Copyright © Texas Education Agency, 2012. All rights reserved.
Name_______________________________________
Date_______________________________
Discussion Rubric
4 pts.
Excellent
Objectives
3 pts.
Good
2 pts. Needs Some
Improvement
1 pt. Needs Much
Improvement
N/A
Pts.
Participates in group discussion
Encourages others to join the
conversation
Keeps the discussion progressing
to achieve goals
Shares thoughts actively while
offering helpful recommendations to
others
Gives credit to others for their ideas
Respects the opinions of others
Involves others by asking questions
or requesting input
Expresses thoughts and ideas
clearly and effectively
Total Points (32 pts.)
Comments:
21
Copyright © Texas Education Agency, 2012. All rights reserved.
Name______________________________________
Date_______________________________________
Individual Work Rubric
4 pts.
Excellent
Objectives
3 pts.
Good
2 pts. Needs Some
Improvement
1 pt. Needs Much
Improvement
N/A
Pts.
Follows directions
Student completed the work as directed,
following the directions given, in order and to the
level of quality indicated
Time management
Student used time wisely and remained on task
100% of the time
Organization
Student kept notes and materials in a neat,
legible, and organized manner. Information was
readily retrieved
Evidence of learning
Student documented information in his or her
own words and can accurately answer questions
related to the information retrieved
*Research/Gathering information (if relevant)
Student used a variety of methods and sources
to gather information. Student took notes while
gathering information
Total Points (20 pts.)
Comments:
22
Copyright © Texas Education Agency, 2012. All rights reserved.
Name:____________________________________
Date:_____________________________
Presentation Rubric
4 pts.
Excellent
Objectives
3 pts.
Good
2 pts. Needs Some
Improvement
1 pt. Needs Much
Improvement
N/A
Pts.
Topic/Content
 Topic discussed completely and in-depth
 Includes properly cited sources (if used)
Creativity/Neatness
 Integrates a variety of multimedia effects to
create a professional presentation (transition
and graphics) or appropriate visual aid used
 Title slide, table of contents, bibliography are
included, using acceptable format
Mechanics
 Grammar, spelling, punctuation, and
capitalization are correct
 Image and font size are legible to the entire
audience
Oral Presentation
 Communicates with enthusiasm and eye
contact
 Voice delivery and projection are dynamic
and audible
Audience Interaction
 Presentation holds audience’s attention and
relates a clear message
 Clearly and effectively communicates the
content throughout the presentation
Total Points (20 pts.)
Comments:
23
Copyright © Texas Education Agency, 2012. All rights reserved.
Name______________________________________
Date_______________________________________
Research Rubric
4 pts.
Excellent
Objectives
3 pts.
Good
2 pts. Needs Some
Improvement
1 pt. Needs Much
Improvement
N/A
Pts.
Question/goal
Student identified and communicated a question
or goal of the research
Research/Gathering information (if relevant)
Student used a variety of methods and sources
to gather information. Student took notes while
gathering information
Conclusion/Summary
Student drew insightful conclusions and
observations from the information gathered.
Information is organized in a logical manner
Communication
Student communicated the information gathered
and summary or conclusions persuasively.
Student demonstrated skill in the use of media
used to communicate the results of research
Reflection
Student reflected on the importance of the
research and its potential application
Total Points (20 pts.)
Comments:
24
Copyright © Texas Education Agency, 2012. All rights reserved.
Download