Ask Project Management Expert

Assignment

Case Study: Problem 1

JCI has hired you, a consultant, to assist them with a comprehensive look at their database and application security environment. After an initial meeting with the president and chief information officer (CIO), it was determined that your first deliverable will be twofold. First, you will identify the types of information and data processed by the company, and second, you will look at project life cycles for systems within the company and outline what security measures should be taken at each phase.

Key Assignment Overview

Throughout this course, you will work on several aspects of data and application security that will result in a Data and Applications Security Impact Analysis and Mitigation Report for a company of your choosing. This course is comprised of a series of Individual Project assignments that will contribute to a Key Assignment submission at the end of the course. Each Part, you will complete a part of a Data and Applications Security Impact Analysis and Mitigation Report. You will select an organization (real or fictitious), and apply your research to the development of the Data and Applications Security Impact Analysis and Mitigation Report that would be appropriate for implementation within the organization. The goal of this course project is to develop the policies and procedures that are necessary for the data and application security in an enterprise.

Organization and Project Selection

The first step will be to select an organization as the target for your Data and Applications Security Impact Analysis and Mitigation Report. This organization can be real or hypothetical, and it will be used as the basis for each of the assignments throughout the course. It should conform to the following guidelines:

• Sensitivity: The selected organization should be large, and it should contain sensitive data requiring the implementation of security measures.

• Familiarity: You should be familiar enough with the organization and typical security needs without significant time required for security research and education.

• Accessibility: You should have good access to security officers and management or incident response personnel in the organization because these resources will provide direction as they progress throughout the development of the report.

• Note: The selected organization may already have a security plan in place and a well-functioning project life cycle to be used as the basis for the project in this course.

Select an organization that fits these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first several days of the course. Your instructor will tell you how to submit this proposal and what notification will be given for project approval.

Assignment Details

For the assignments in this course, you will develop a comprehensive Data and Applications Security Impact Analysis and Mitigation Report structure where you must identify the security measures to be taken at the planning, requirements, design, development, integration and testing, and installation and acceptance phases of the project life cycle.

Task 1

Create the shell document for the final project deliverable that you will be working on throughout the course. As you proceed through each assignment, you will add content to each section of the final document to gradually complete the final project delivery. Appropriate research should be conducted to support the analysis in your plan, and assumptions may be made when necessary.

The overall Data and Applications Security Impact Analysis and Mitigation Report project will consist of the following deliverables:

• Part 1: Project Outline and Requirements
• Part 1: Project Life Cycle Security Measures
• Part 2: Security Vulnerability Assessment
• Part 3: Virtualization Security Impact
• Part 4: Cloud Computing Security
• Part 5: Risk Mitigation Strategies for Applications and Databases

The project outline for the complete deliverable is as follows:

Part 1: Submit Data and Applications Security Impact Analysis and Mitigation Report shell for approval.

• Use Word

o Title page
o Course number and name
o Project name
o Student name
o Date

• Table of contents (TOC)

o Use an autogenerated TOC.
o Use separate pages.
o It should be a maximum of 3 levels deep.
o Update the fields of the TOC so that it is up-to-date before submitting your project.

• Section headings (create each heading on a new page with "TBD" as the content, except for sections listed under "New content" below)

o Project Outline and Requirements
o Project Life Cycle Security Measures
o Security Vulnerability Assessment
o Virtualization Security Impact
o Cloud Computing Security
o Risk Mitigation Strategies for Applications and Databases

• New content (to be completed in this Part 1 delivery)

o Project Outline and Requirements

- Give a brief description of the company (can be hypothetical) where the Data and Applications Security Impact Analysis and Mitigation Report will be implemented. Include the types of information and data that are processed by the company, the company size, location(s), and other pertinent information.

o Project Life Cycle Security Measures

- Give a summary of the security measures to be taken at the planning, requirements, design, development, integration and testing, and installation and acceptance phases of the project life cycle to include the following:

- Planning phase: Identify what work products the team will have that will change, or are likely to change, and the functional relationships between those products.

- Requirements phase: Identify the requirements and the functional software verifying the identity of a user. Provide any requirements that are applicable to your cryptographic module. FIPS PBU140-2 Security Requirements for CryptographicModules can be used as a guideline.

- Design phase: Describe how the design team ensures that the software component has trusted modules.

- Development phase: Describe how developers will ensure that the application being developed for the cryptographic algorithm will be secure and protective of sensitive data.

- Integration and test phase: Identify what will be tested during this phase and the general integration and test procedures that will be used.

- Installation and acceptance phase: Identify the purpose of the installation and acceptance phase for both the user and the organization.

Project Management, Management Studies

  • Category:- Project Management
  • Reference No.:- M92641033
  • Price:- $35

Priced at Now at $35, Verified Solution

Have any Question?


Related Questions in Project Management

Presentation and written assessment -the argumentative

Presentation and Written Assessment - The argumentative essay must be 1500 words in length. The presentation is about 10-15 minutes long depending on the size of the group. Task Description: The objective of this assignm ...

Topic - identifying the ways to overcome the communication

Topic - Identifying the ways to overcome the communication barriers of international project management students at central Queensland University. Literature review (1000 words) References would be needed in this section ...

Case study continuous improvementintroductionprecision

Case study: Continuous Improvement Introduction Precision Engineering Works Private Limited (PEW) is an original equipment manufacturer specialising in plastic moulding parts for the telecommunication industry. They have ...

Advanced project risk managementaimthe aim of this

Advanced Project Risk Management Aim: The aim of this assignment is to: demonstrate the understanding of Decision Tree/Expected Monetary Value and the use of the software Precision Tree schedule a project using Oracle Pr ...

Critical analysis reportthis is a group assessment for face

Critical Analysis Report This is a group assessment for face to face students and individual assessment for distance students The primary purpose of this assessment is to help you to develop and demonstrate your skills i ...

Project managment1explain what is meant by the following

Project managment 1. Explain what is meant by the following: "The project scope statement should not be built in isolation." 2. Discuss project management related problems created due to "scope creep." Each question shou ...

Project management for business assignment -enabling a

Project Management for Business Assignment - Enabling a Customer-Centric Experience through Project Management (Case Study Adapted from Project Management Institutes) Organization: Du Telecom and Huawei Technologies Co. ...

Principles of project management minor case study

Principles of Project Management Minor Case Study Assignment - Assignment objective - You are required to investigate a Project Management scenario, using information given to develop a written report and presentation to ...

Project management assessment - research studypurpose of

Project Management Assessment - Research Study Purpose of the assessment - Develop skills in Project communication planning. Communication is Key to Successful Project Management. The cases illustrate different approache ...

Assessmentthis assignment involves the portfolio of

Assessment This assignment involves the Portfolio of Materials and Team Charter 1. Description and justification of the innovation process used. A 1-page plan/outline that explains how social media will be used A short b ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As