Identify what work products the team will have

Assignment Help Project Management
Reference no: EM131812668

Assignment

Case Study: Problem 1

JCI has hired you, a consultant, to assist them with a comprehensive look at their database and application security environment. After an initial meeting with the president and chief information officer (CIO), it was determined that your first deliverable will be twofold. First, you will identify the types of information and data processed by the company, and second, you will look at project life cycles for systems within the company and outline what security measures should be taken at each phase.

Key Assignment Overview

Throughout this course, you will work on several aspects of data and application security that will result in a Data and Applications Security Impact Analysis and Mitigation Report for a company of your choosing. This course is comprised of a series of Individual Project assignments that will contribute to a Key Assignment submission at the end of the course. Each Part, you will complete a part of a Data and Applications Security Impact Analysis and Mitigation Report. You will select an organization (real or fictitious), and apply your research to the development of the Data and Applications Security Impact Analysis and Mitigation Report that would be appropriate for implementation within the organization. The goal of this course project is to develop the policies and procedures that are necessary for the data and application security in an enterprise.

Organization and Project Selection

The first step will be to select an organization as the target for your Data and Applications Security Impact Analysis and Mitigation Report. This organization can be real or hypothetical, and it will be used as the basis for each of the assignments throughout the course. It should conform to the following guidelines:

• Sensitivity: The selected organization should be large, and it should contain sensitive data requiring the implementation of security measures.

• Familiarity: You should be familiar enough with the organization and typical security needs without significant time required for security research and education.

• Accessibility: You should have good access to security officers and management or incident response personnel in the organization because these resources will provide direction as they progress throughout the development of the report.

• Note: The selected organization may already have a security plan in place and a well-functioning project life cycle to be used as the basis for the project in this course.

Select an organization that fits these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first several days of the course. Your instructor will tell you how to submit this proposal and what notification will be given for project approval.

Assignment Details

For the assignments in this course, you will develop a comprehensive Data and Applications Security Impact Analysis and Mitigation Report structure where you must identify the security measures to be taken at the planning, requirements, design, development, integration and testing, and installation and acceptance phases of the project life cycle.

Task 1

Create the shell document for the final project deliverable that you will be working on throughout the course. As you proceed through each assignment, you will add content to each section of the final document to gradually complete the final project delivery. Appropriate research should be conducted to support the analysis in your plan, and assumptions may be made when necessary.

The overall Data and Applications Security Impact Analysis and Mitigation Report project will consist of the following deliverables:

• Part 1: Project Outline and Requirements
• Part 1: Project Life Cycle Security Measures
• Part 2: Security Vulnerability Assessment
• Part 3: Virtualization Security Impact
• Part 4: Cloud Computing Security
• Part 5: Risk Mitigation Strategies for Applications and Databases

The project outline for the complete deliverable is as follows:

Part 1: Submit Data and Applications Security Impact Analysis and Mitigation Report shell for approval.

• Use Word

o Title page
o Course number and name
o Project name
o Student name
o Date

• Table of contents (TOC)

o Use an autogenerated TOC.
o Use separate pages.
o It should be a maximum of 3 levels deep.
o Update the fields of the TOC so that it is up-to-date before submitting your project.

• Section headings (create each heading on a new page with "TBD" as the content, except for sections listed under "New content" below)

o Project Outline and Requirements
o Project Life Cycle Security Measures
o Security Vulnerability Assessment
o Virtualization Security Impact
o Cloud Computing Security
o Risk Mitigation Strategies for Applications and Databases

• New content (to be completed in this Part 1 delivery)

o Project Outline and Requirements

- Give a brief description of the company (can be hypothetical) where the Data and Applications Security Impact Analysis and Mitigation Report will be implemented. Include the types of information and data that are processed by the company, the company size, location(s), and other pertinent information.

o Project Life Cycle Security Measures

- Give a summary of the security measures to be taken at the planning, requirements, design, development, integration and testing, and installation and acceptance phases of the project life cycle to include the following:

- Planning phase: Identify what work products the team will have that will change, or are likely to change, and the functional relationships between those products.

- Requirements phase: Identify the requirements and the functional software verifying the identity of a user. Provide any requirements that are applicable to your cryptographic module. FIPS PBU140-2 Security Requirements for CryptographicModules can be used as a guideline.

- Design phase: Describe how the design team ensures that the software component has trusted modules.

- Development phase: Describe how developers will ensure that the application being developed for the cryptographic algorithm will be secure and protective of sensitive data.

- Integration and test phase: Identify what will be tested during this phase and the general integration and test procedures that will be used.

- Installation and acceptance phase: Identify the purpose of the installation and acceptance phase for both the user and the organization.

Reference no: EM131812668

Questions Cloud

What are your overall thoughts on pbl : What are your overall thoughts on PBL? What ideas and plans do you have about approaching each of the 3 main phases and related tasks?
Prepare the necessary journal entries to summarize : Prepare a production cost worksheet if spoilage is recognized and the weighted-average method is used
Determine whether or not hc and m are mutually exclusive : Assuming all outcomes are equally likely, find P (H n M), P (H ? M), and P (Hc). Determine whether or not H c and M are mutually exclusive.
How organizations must identify vulnerabilities : How organizations must identify vulnerabilities and isolate and remove threats affecting databases and applications in financial institutions?
Identify what work products the team will have : Identify what work products the team will have that will change, or are likely to change, and the functional relationships between those products.
State complement of the event in the simplest possible terms : For each of the following events in the experiment of selecting a three-child family at random, state the complement of the event in the simplest possible.
What is paul net operating loss for 2016 : Paul has a loss from business operations in 2016 of $100,000 not including (a) $5,000 of state income taxes properly accrued for the year on the operations
Describe the principal activities of the myers company : BUS103 Accounting for Managers Team Assignment. Describe the principal activities of the company? Define the revenue recognition criteria of the company
What is the company breakeven point in units : What is the company's breakeven point in units, assuming that the given sales mix is maintained?

Reviews

Write a Review

Project Management Questions & Answers

  Analyze your project in terms of project completion

Analyze your project in terms of project completion, critical path, and slack / float. Specifically, be sure to answer the following: When will the project be completed? What is the critical path for the project?

  What challenges are entrepreneurs faced

Who comes to mind when you think of present-day entrepreneurs?- Does today's economic and political environment promote or retard entrepreneurial efforts?

  Which has the lowest total cost of production

The factory will have an annual production capacity of 10,000 steel utensils and in the initial years, it will operate at 75%efficiency. Find the best location option, Which has the lowest total cost of production.

  Compare aon and gert techniques

Essay Question:  You are the project manager working on your project’s schedule. You are reviewing leads and lags. What are leads and lags? Please provide an example of each

  Classify personal possessions into managing operations

Using the ABC inventory analysis method classify some of your personal possessions into the Managing Operations three categories.

  What are the levels of accuracy for the sample sizes

What are the levels of accuracy for the sample sizes allowable for each data collection method?- Comment on the inappropriateness of using cost as the only means of determining sample size.

  Discuss characteristics of different phases of a project

Determine both the role of and means by which Operations Management can lead to organisations being successful in managing its operations both efficiently and effectively - Distinguish the core concepts involved in project management and under..

  Processes and projectsdefine processes and project

processes and projectsdefine processes and project management and provide one example of each from your own work

  Explain how customer final approval will be received

How customer final approval will be received. Criteria to be met for the customer to agree that the project is successfully completed.

  Explain general plan and steps involved to project success

Explain the general plan and the steps involved to achieve project success and show the critical elements of the plan and what the key success factors will be for the project success.

  Project management concepts and applications paper

Choose a current or past project you have been involved with in your organization or community and prepare a paper that includes the elements.

  Assignment - project planning tools

Reflect on your readings for this unit and familiarise yourself with the project planning tools explored and pay specific attention to the Work Breakdown Structure and Gantt chart from your Resources.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd