**CASE STUDY ATTACHED**
This assignment requires that you adapt the analysis done for P1/P2/P3/P4 to a new environment. Use your prior work, i.e. the recommendation memo and network diagram, to develop a high-level plan for implementing the required controls, changes, etc. to mitigate vulnerabilities and convergence issues in the new environment. You may need to do additional analysis to address issues specific to the second case studyâ€™s environment. Your high-level plan should include all the system development life cycle (SDLC) gates/decision points and all relevant tasks. Describe and relate the implementation solution to CIA and incorporate, people, processes and technology to this plan.
This is a combination of a paper and a detailed list of steps and resources that you would follow to implement and complete this project. Think about all of the actions, resources, and tasks that you would need in order to effect a successful implementation. These should also be included as part of the plan. The instructor may provide a template to use with this assignment. The minimum structure for this assignment is below:
- Purpose of Plan
- GOALS AND OBJECTIVES
- Business Goals and Objectives
- Project Goals and Objectives
- Scope Definition
- Items Beyond Scope
- PROJECTED EXPENSES
- System Development Life Cycle/Schedule
- Project Assumptions
- Project Constraints
- Critical Project Barriers
The Plan will be a minimum 5 page, double-spaced paper using Times New Roman 12 font and APA style formatting for citations and references. It will also include a minimum of 5 references. The Title/Cover page, illustrations (tables/charts/graphs), network diagram, and references are not part of the page count but are required for the assignment. The grading rubric provides additional details as to what should be included in the paper. Your instructor may provide an APA style template to use for this paper.
*** Make sure that you include in detail the steps you would take to secure the project.
Purpose / Goals and Objectives 10 points
Expertly defines goals and objectives
Scope of Security Issues 10 points
Clearly describes and relates information security and other technology issues. Synthesizes and applies material and document relationships.
Costs Related to Security Effort/Solution 5 points
Clearly identifies and articulates the cost of overall security solution.
SDLC Schedule 10 points
Synthesizes and applies logical SDLC processes and schedule to overall solution deployment.
Use of Network diagram and illustrations 10 points
Network diagram and accompanying illustration are strongly linked to proposed solution and content
Milestones 5 points
Each defined milestone is directly related to overall strategy/solution and clearly mitigates the risk or issue.
Assumptions 10 points
Clearly identifies security solutions and assumptions that consist of people, processes and technologies that relate to the risks. Covers all three requirements.
Constraints 5 points
Clearly describes the linkage and constraints associated with solution
SDLC Tasks 5 points
Clear and detailed SDLC tasks that logically leads to the proposed solutions
Prioritize Tasks 5 points
Major tasks are clearly prioritized according their importance to mitigating the risks and issues found.
Define Resources 5 points
Clearly defined people resources (by type) that support each task in the timeline.
Use of Authoritative Sources5 points
Used at least 5 authoritative or scholarly sources in paper. No APA style errors in sources
Citation of Sources 5 points
All sources cited. No errors in citing material in paper.
Formatting 5 points
Prepared MS Word document, used consistent formatting, section subheadings, submitted one file, used instructor provided template, correct coversheet and separate reference page and meets minimum page count of 5 pages.
No grammar errors, use of first/second person, spelling or punctuation errors.