We're Open
+44 7340 9595 39
+44 20 3239 6980

[Solved] Identify requirements

  100% Pass and No Plagiarism Guaranteed

[Solved] Identify requirements

Identify requirements

INSTRUCTIONS:

Project 2: Case Study—Identify Requirements

Using the case study, identify the technical requirements necessary for the successful completion of the Merging IT at DaimlerChrysler http://www.cioinsight.com/c/a/Past-News/Case-Study-Merging-IT-at-DaimlerChrysler/ .The extrapolated requirements should focus on security, interoperability, and operations.

Using the template provided, identify and prioritize 10 requirements that the newly merged IT system must meet. Additionally, note any applicable standards that govern how the requirements should be met or how the system should perform post-merge. Use NIST Special Publication 800-53a as a control guide and select one control per requirement that must be implemented in order to facilitate each requirement`s secure operation.

Step 1: Review the selected case study and choose 10 requirements related to security, interoperability, and operations.

Step 2: Prioritize the selected requirements based on immediate need, security posture, complexity, resource availability, and cost.

Step 3: Identify applicable standards (if any) that govern how the requirements must be met, implemented, or measured.

Step 4: Using NIST Special Publication 800-53a,  select one control per requirement and describe how this control enhances the security posture or facilitates the secure implementation of the requirement.

 CONTENT:

Identify requirementsStudents:Professor:Course title:Date:Identify requirementsTechnical RequirementsPrioritization 1(Highest) – 5(Least)StandardsControl1Communication systems, Information System (IS) accounts, information systems (ISs) and integrating them ISsImmediate Need: 2Security Posture: 1Complexity: 2Resource Availability: 1Cost: 3The Gramm-Leach-Bliley Act (GLB) holds that every critical financial data must be protected from compromise by using safeguards including encryption that comply with FIPS 140-2 (Agari, 2014). AC-1: Account Management – This control will ensure that the organization manages information system accounts including communication systems accounts2Size up systems and application needs and security controlsImmediate Need: 1Security Posture: 1Complexity: 2Resource Availability: 1Cost: 2CA-2 Security Assessments – this control allows the firm to carry out an assessment.

100% Plagiarism Free & Custom Written,
Tailored to your instructions


International House, 12 Constance Street, London, United Kingdom,
E16 2DQ

UK Registered Company # 11483120


100% Pass Guarantee

STILL NOT CONVINCED?

View our samples written by our professional writers to let you comprehend how your work is going to look like. We have categorised this into 3 categories with a few different subject domains

View Our Samples

We offer a £ 2999

If your assignment is plagiarised, we will give you £ 2999 in compensation

Recent Updates

Details

  • Title: [Solved] Identify requirements
  • Price: £ 89
  • Post Date: 2024-03-23T05:23:06+00:00
  • Category: New Samples
  • No Plagiarism Guarantee
  • 100% Custom Written

Customer Reviews

[Solved] Identify requirements [Solved] Identify requirements
Reviews: 5

A masterpiece of assignment by , written on 2020-03-12

The rates are a bit expensive for me of the essay writing service but the overall look is amazing. The references and formatting are done beautifully. So, I feel that the high rates are worth all these qualities. I want to thank you for great help.
Reviews: 5

A masterpiece of assignment by , written on 2020-03-12

I am not good at designing PowerPoint presentations so I took help from Insta Research. The format is cool and attractive. All the information is nicely placed and used. I am looking forward to presenting so that I could demonstrate my presentation and receive good comments. Thank you for help.