We're Open
+44 7340 9595 39
+44 20 3239 6980

Identify requirements

Information



  • Post Date 2018-11-07T11:00:14+00:00
  • Post Category New Samples

No Plagiarism Guarantee - 100% Custom Written

Order Details

Identify requirements

Identify requirements

INSTRUCTIONS:

Project 2: Case Study—Identify Requirements

Using the case study, identify the technical requirements necessary for the successful completion of the Merging IT at DaimlerChrysler http://www.cioinsight.com/c/a/Past-News/Case-Study-Merging-IT-at-DaimlerChrysler/ .The extrapolated requirements should focus on security, interoperability, and operations.

Using the template provided, identify and prioritize 10 requirements that the newly merged IT system must meet. Additionally, note any applicable standards that govern how the requirements should be met or how the system should perform post-merge. Use NIST Special Publication 800-53a as a control guide and select one control per requirement that must be implemented in order to facilitate each requirement`s secure operation.

Step 1: Review the selected case study and choose 10 requirements related to security, interoperability, and operations.

Step 2: Prioritize the selected requirements based on immediate need, security posture, complexity, resource availability, and cost.

Step 3: Identify applicable standards (if any) that govern how the requirements must be met, implemented, or measured.

Step 4: Using NIST Special Publication 800-53a,  select one control per requirement and describe how this control enhances the security posture or facilitates the secure implementation of the requirement.

 

CONTENT:
Identify requirementsStudents:Professor:Course title:Date:Identify requirementsTechnical RequirementsPrioritization 1(Highest) – 5(Least)StandardsControl1Communication systems, Information System (IS) accounts, information systems (ISs) and integrating them ISsImmediate Need: 2Security Posture: 1Complexity: 2Resource Availability: 1Cost: 3The Gramm-Leach-Bliley Act (GLB) holds that every critical financial data must be protected from compromise by using safeguards including encryption that comply with FIPS 140-2 (Agari, 2014). AC-1: Account Management – This control will ensure that the organization manages information system accounts including communication systems accounts2Size up systems and application needs and security controlsImmediate Need: 1Security Posture: 1Complexity: 2Resource Availability: 1Cost: 2CA-2 Security Assessments – this control allows the firm to carry out an assessmen...

Price: £ 99

100% Plagiarism Free & Custom Written, Tailored to your instructions