We're Open
+44 7340 9595 39
+44 20 3239 6980

[Solved] Identify requirements

  100% Pass and No Plagiarism Guaranteed

[Solved] Identify requirements

Identify requirements


Project 2: Case Study—Identify Requirements

Using the case study, identify the technical requirements necessary for the successful completion of the Merging IT at DaimlerChrysler http://www.cioinsight.com/c/a/Past-News/Case-Study-Merging-IT-at-DaimlerChrysler/ .The extrapolated requirements should focus on security, interoperability, and operations.

Using the template provided, identify and prioritize 10 requirements that the newly merged IT system must meet. Additionally, note any applicable standards that govern how the requirements should be met or how the system should perform post-merge. Use NIST Special Publication 800-53a as a control guide and select one control per requirement that must be implemented in order to facilitate each requirement`s secure operation.

Step 1: Review the selected case study and choose 10 requirements related to security, interoperability, and operations.

Step 2: Prioritize the selected requirements based on immediate need, security posture, complexity, resource availability, and cost.

Step 3: Identify applicable standards (if any) that govern how the requirements must be met, implemented, or measured.

Step 4: Using NIST Special Publication 800-53a,  select one control per requirement and describe how this control enhances the security posture or facilitates the secure implementation of the requirement.


Identify requirementsStudents:Professor:Course title:Date:Identify requirementsTechnical RequirementsPrioritization 1(Highest) – 5(Least)StandardsControl1Communication systems, Information System (IS) accounts, information systems (ISs) and integrating them ISsImmediate Need: 2Security Posture: 1Complexity: 2Resource Availability: 1Cost: 3The Gramm-Leach-Bliley Act (GLB) holds that every critical financial data must be protected from compromise by using safeguards including encryption that comply with FIPS 140-2 (Agari, 2014). AC-1: Account Management – This control will ensure that the organization manages information system accounts including communication systems accounts2Size up systems and application needs and security controlsImmediate Need: 1Security Posture: 1Complexity: 2Resource Availability: 1Cost: 2CA-2 Security Assessments – this control allows the firm to carry out an assessmen...

100% Plagiarism Free & Custom Written,
Tailored to your instructions

International House, 12 Constance Street, London, United Kingdom,
E16 2DQ

UK Registered Company # 11483120

100% Pass Guarantee


View our samples written by our professional writers to let you comprehend how your work is going to look like. We have categorised this into 3 categories with a few different subject domains

View Our Samples

We offer a £ 2999

If your assignment is plagiarised, we will give you £ 2999 in compensation

Recent Updates


  • Title: [Solved] Identify requirements
  • Price: £ 89
  • Post Date: 2021-10-06T09:54:02+00:00
  • Category: New Samples
  • No Plagiarism Guarantee
  • 100% Custom Written

Customer Reviews

[Solved] Identify requirements [Solved] Identify requirements
Reviews: 5

A masterpiece of assignment by , written on 2020-03-12

My order went 3 hours late and I also went mad. Then the customer support team calmed me down and offered me a flat discount of 50%. However, I did get my order and chilled out as the work was exactly what I requested. Next time I would place my order a bit sooner to save any trouble.
Reviews: 5

A masterpiece of assignment by , written on 2020-03-12

I have been taking help from Insta Research since 2015 and believe me, this place is incredible in giving the best help in assignments and essays. I also ask them to run plagiarism in my essays that I have written, and they always gave me accurate results. I am literally blessed to have a strong bonding with this site so that in any need of urgency, I contact them and find them always beside me. Thank you!