Developing a security operations center

Assignment Help Computer Network Security
Reference no: EM133541750 , Length: 2 Pages

Assignment:

Scenario: You have just successfully implemented an online platform at your company. The system has been in production for 6 months processing student loan applications and accepting credit card payments for books and course fees.

The IT director has been asked by the board of directors (BOD) to build a network operations center (NOC) to provide 24/7 support to customers and internal staff. The IT director begins assembling the team who will design and implement a NOC and asks you to lead the development of a security operations center (SOC) to handle security incidents that the organization may encounter. Since the internal security team already monitors security for the online loan processing platform, it's expected that developing a SOC is the next logistical step in maturing the security of the organization.

You are asked by the IT director to create a project charter and include a project scoping statement for the SOC project with a primary focus on how the SOC will comply with the various industry and government information security regulations. The IT director also points out that you need to outline how you plan to manage scheduling, cost, teams, and the quality of the project.

Part 1

Using the Wk 3 Assignment Template, complete a 2 page project charter. Develop a clear and understandable project scoping statement as it relates to the scenario.

  • Project purpose
  • Measurable projects objectives
  • High-level requirements
  • Assumptions and constraints
  • High-level project description and boundaries
  • High-level risks
  • Summary of milestone schedule
  • Summary budget
  • Stakeholder list
  • Project approval requirements
  • Assigned project manager, responsibility, and authority level
  • Name and authority of the sponsor

Detailed project scope statement:

Part 2

Write a 2 page plan in which you:

  • Describe the purpose of a project charter.
  • Outline how the triple constraints can affect a project.
  • Identify at least 3 model project management phases and describe the purpose of each phase.
  • Select one approach to manage scheduling, cost, teams, and quality of a project specifying the use of Microsoft Project or another tool.
  • Propose how you plan to resolve personnel and teamwork issues as they arise.

Reference no: EM133541750

Questions Cloud

Analysis of the risks related to financial business decision : Review of methods that can be used for appraising strategic capital expenditure projects and strategic direction.
Identify historical information for the previous fiscal year : Identify historical information for the previous fiscal year. Explain how you were able to speculate appropriate assumptions.
What is the current book value of the system : What is the current book value of the system? If the system is sold for $146,000, how much recaptured depreciation would result
What was already established for the population of people : was the expansion between the United States and Mexico was a good move? The northern frontier did have its political issues that had to be faced.
Developing a security operations center : You to lead the development of a security operations center (SOC) to handle security incidents that the organization may encounter.
Identities in a shifting border : These dynamics contributed to the eventual annexation of Texas and the broader events leading up to the Mexican American War and the Treaty of Guadalupe Hidalgo
Logical argument in support of the library : Present a succinct, logical argument in support of the library's request for additional funds for the book donations department. Limit your logical argument
What would its operating expenses need to be : If a retailer has a gross margin of $1 million, what would its operating expenses need to be for it to have an operating profit margin of $500,000
What according to grenier was the first way of war : what according to Grenier was "the first way of war" and how did it originate? what did you learn from these chapters about war and society in early America

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd