Preview

IS4799 - Team RFP Response Report

Powerful Essays
Open Document
Open Document
5023 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS4799 - Team RFP Response Report
IS4799 Information Systems And Cybersecurity Capstone Project.

1

Table of Contents
I.

Executive Summary
i.

II.

Layered Security Solution

Research
i.
ii.

III.

Review of Firm’s Qualifications
Review of Requirements and Clarification Questions

Data Analysis
i.

RFP Clarification Questions

ii.

RFP Technical Requirements and Differences from Existing Controls

iii.

Data Privacy Legal Requirements as per RFP’s Compliance

iv.

Security Assessment Project Plan Definition

v.

Risk Assessment Project Plan Definition

vi.

Risk Prioritization and Mitigation Project Plan Definition

vii.

Risk Mitigation Actions Based on Qualitative Risk Assessment’s Risk
Prioritization

IV.

Solution Design
i.

Benefits of Our Recommendations

ii.

Data Privacy Legal Requirements as per RFP’s Compliance

iii.

Procedure to Conduct a Security Assessment and Risk Identification

iv.

Data Security Mitigation Actions Based on Qualitative Risk Assessment

v.

Phased Project Approach and High-Level Project Plan Including
Prioritized Security Controls

2

V.

Evaluation Design
i.

Phased Project Approach and High-Level Project Plan Outline

ii.

High-Level Description of Current Client’s Need

iii.

IT Security Compliance and Governance Gap Analysis Plan Outline

iv.

Compliance Project Plan Definition

v.

Disaster Recovery Plan Outline

vi.

Business Continuity Plan Outline

3

Executive Summary
Layered Security Solution
To ensure the security of business-critical information, it is essential to develop a cohesive multi-layered strategy to address the threats. Traditionally, organizations focus their defensive controls at the perimeter in the belief that this makes it difficult for attackers to penetrate systems. However, once this perimeter is breached, the attackers have relatively free reign within the network. Hardened, perimeter

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 4222-307 Answers

    • 412 Words
    • 2 Pages

    I can confirm that all of the answers given in this study pack are my own work.…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    While working on a consulting engagement, a supervisor in your team has given you an assignment. The client is a regional trucking company. A new customer has approached the client with an opportunity that would require 120 trailers—20 more than the trucking company currently owns. The client is uncertain how long the relationship with the customer may last, but the deal has the potential for significant growth.…

    • 554 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    * November 8: Contact agencies that will be considered as well as agencies that will not be considered…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Exam Study Guide 006025 Orientation Electrician www.InstantAnswerPlace.com DIRECT LINK TO THIS STUDY GUIDE: http://www.instantanswerplace.com/penn-foster-exam-answers-006025-orientation-electrician/ Instantly Download! Get Better Grades in Less Time! DESCRIPTION FOR THIS STUDY GUIDE:…

    • 324 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Qualitative research assembles data that is not in numerical structure. Examples are open ended surveys, unstructured meetings and unstructured perceptions. Qualitative research is commonly enlightening information and thusly is harder to dissect than quantitative information. Qualitative research is helpful for learns at the individual level, and to figure out, inside and out, the courses in which individuals think or feel.…

    • 129 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    As one of the program outcomes for the Bachelor of Science in Information Technology program, students must apply the principles of systems analysis and design to fundamental business systems within the organization.…

    • 3278 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Mis 589 Unit 7

    • 943 Words
    • 4 Pages

    7. How do local area networks (LANs) differ from metropolitan area networks (MANs), wide area networks (WANs), and backbone networks (BNs)?…

    • 943 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Swish! The sound of a basketball falling perfectly through the net is one of the most beautiful sounds in sports. However, scoring is not the only important part of basketball. Defense is also a major part of basketball, and the full-court press is one of the most exciting aspects of playing defense. One of the most famous full court presses was created by Coach Nolan Richardson at the University of Arkansas and was known simply as “40 Minutes of Hell”. Richardson’s defensive philosophy of putting pressure on the ball handler the entire length of the court eventually lead to Arkansas winning the National Championship in 1994. The three most important things to understand about full court presses are how a man press works, how a zone press works, and the significance of proper communication both on and off the court.…

    • 740 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The reigning NBA Champs are still as strong as ever with the first big three in the league. Tony Parker, Manu Ginobili, and Tim Duncan, are still going strong being leaders for their team. These men might are in their thirties, but they are still playing like they are in their mid twenties. Other than the big three, the Spurs have some of the best offensive players in the league. Players like Danny Green, Boris Diaw, and NBA Finals MVP, Kawhi Leonard. These young men bring a lot to the Spurs franchise with speed, scoring, and defense. This team is stacked with talent and each person on the team contributes to every win. But every win is from listening to a legend on the court. The head coach Gregg Popovich. Popovich has coached the Spurs over the last 16 years("Gregg popovich," 2014). He has lead the team to four national championships and has been named NBA coach of the month 12 times in his career("Gregg popovich," 2014). Popovich’s offensive strategy is simple: make a lot of passes and cut across the court while another teammate sets a screen for you. In other words a play the Spurs perform is the ball is passed six to seven times before a shot is took. One wing player will cut across the court to the corner three point line. As the wing player cuts across the court, Tim Duncan or Boris Diaw will set a pick for the wing player so he can get…

    • 1546 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Make an effort to personally meet each of your professors at the start of the term. You need to know the locations of their offices and how to contact them. Make sure you develop a solid relationship with them. You never know when you may need their assistance, and if they like you, they are much more willing to help.…

    • 409 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Request for Proposals

    • 26335 Words
    • 106 Pages

    Section C – Technical Approach Section D – Security Gap Analysis Section E – Privacy Data Section F – Security Assessment Section G – Security Assessment Report Section H – Mitigating Risks Section I – BIA, BCP, and DRP Section J – Layered Security Solution 6.4 6.5 6.6 6.7 Cost Proposal & Scoring Guide Proposal Score Summary Matrix Reference Questionnaire Supplemental Templates…

    • 26335 Words
    • 106 Pages
    Powerful Essays
  • Good Essays

    On defense the point guard is on top of the key or plays on the elbow on the court. Most of the time the point guard plays against the best player on the court when he is on defense. But if he is playing zone he either plays a two three when he is playing zone. But when the point guard is playing man he plays on a kid his size or someone really good so the good player on offense doesn't score a point to get back into the game.…

    • 373 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 301 outcomes 1 and 2

    • 3337 Words
    • 8 Pages

    1.1. Planning your workload can help time management and can help give you a clearer understanding of what you need to do to complete tasks. Sensible planning shows you what work needs to be done in the day, and allows you to manage your time effectively to meet objectives and deadlines. You can also make sure that you have access to any resources you require and if any people working with you are available. All this makes working less stressful and means you can be more efficient and organised, and complete a task successfully and on time. If you have a set plan of your workload, it means your manager and other colleagues can see what you’re working on, and monitor your performance.…

    • 3337 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    It 460 - Unit 2 Project

    • 1159 Words
    • 5 Pages

    • Network Support – network analysis and design, office cabling and networking, remote monitoring and support, desktop support, server setup and management both Microsoft and Linux platforms, VPN setup both Microsoft and Cisco, managed support, onsite and offsite backups, after-hours help with moves, server migrations and upgrades.…

    • 1159 Words
    • 5 Pages
    Powerful Essays