Preview

Capstone: Security and Project Management Approach

Powerful Essays
Open Document
Open Document
1810 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Capstone: Security and Project Management Approach
ITT Technical Institute
IS4799 Information systems and Cyber-security
Capstone Project
August 26, 2013
Proprietary and confidential

REQUEST FOR PROPOSAL
-------------------------------------------------

-------------------------------------------------

Table of Contents

TEMPLATE CONTENTS 3
INTRODUCTION AND BACKGROUND 3
PURPOSE OF THE REQUEST FOR PROPOSAL 3
ADMINISTRATIVE 3
TECHNICAL CONTACT 3
CONTRACTUAL CONTACT 3
DUE DATES 3
SCHEDULE OF EVENTS 3
GUIDELINES FOR PROPOSAL PREPARATION 3
PROPOSAL SUBMISSION 3
DETAILED RESPONSE REQUIREMENTS 3
EXECUTIVE SUMMARY 3
SCOPE, APPROACH, AND METHODOLOGY 3
DELIVERABLES 3
PROJECT MANAGEMENT APPROACH 3
DETAILED AND ITEMIZED PRICING 3
APPENDIX: REFERENCES 3
APPENDIX: PROJECT TEAM STAFFING 3
APPENDIX: COMPANY OVERVIEW 3
EVALUATION FACTORS FOR AWARD 3
CRITERIA 3
SCOPE OF WORK 3
REQUIREMENTS 3
DELIVERABLES 3

INTRODUCTION AND BACKGROUND

PURPOSE OF THE REQUEST FOR PROPOSAL

The Firm is a security services provider. Our clients included organizations of various sizes, but most clients are state and federal government agencies that must demonstrate compliance with specific security-related regulations. Our firm was founded 2002, as a small corporation with only four employees. At that time, the firm’s focus was to provide database performance tuning and security services, including assessments, penetration tests, policy creation, and regulatory compliance assistance. The firm’s current annual gross sales are currently million in U.S. dollars.
The Firm is interested in conducting a security assessment that will allow it to:

* Gain a better understanding of potential corporate network vulnerabilities that may be visible from the Internet.

* Determine if the current wireless network is configured securely.

These activities are part of The Firm ongoing risk management program and are focused on identifying the risk level The Firm is currently exposed to so that an appropriate set

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Acct 504 Case Study 2

    • 1426 Words
    • 5 Pages

    Risk assessment – The organization must identify and analyze the different factors that generate risk for the business and must decide how to manage these risks. Because economic industry, regulatory and operating conditions will continue to change. (coso)…

    • 1426 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Request for Proposals

    • 26335 Words
    • 106 Pages

    INTRODUCTION Statement of Purpose The State Government, Department of Finance and Administration, hereinafter referred to as the State, has issued this Request for Proposal (RFP) to define the State's minimum service requirements; solicit proposals; detail proposal requirements; and, outline the State’s process for evaluating proposals and selecting the contractor. Through this RFP, the State seeks to buy the best services at the most favorable, competitive prices and to give ALL qualified businesses, including those that are owned by minorities, women, persons with a disability, and small business enterprises, opportunity to do business with the state as contractors and sub-contractors. The State intends to secure a contract for Information Security Assessment Services…

    • 26335 Words
    • 106 Pages
    Powerful Essays
  • Satisfactory Essays

    ISSC363 Assignment 3

    • 586 Words
    • 2 Pages

    Conducting a thorough risk assessment is certainly one of the top priorities in the overall risk management program. It is a process of identifying and evaluating the risks that can have a negative impact on an organization. Once the risks have been successfully captured, they can be assessed and prioritized according to the severity of their potential impact. While every organization should have a continuous risk management program, a risk assessment is conducted at a given moment in time, and as such should be repeated on some predetermined schedule to reevaluate the risks and adjust as appropriate. To conduct an effective risk assessment, it’s important to be able to fundamentally describe of the purpose of a risk assessment, risk scope and identify critical areas for an assessment. Additionally, a methodology that is appropriate for the risk assessment should be selected.…

    • 586 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 244 Ap C

    • 466 Words
    • 2 Pages

    Due in Week One: Give an overview of the company and the security goals to be achieved.…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    In t fid en tia l ity The CIA Triad Co n y rit eg Availability NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Powerful Essays

    is3110 project

    • 1406 Words
    • 9 Pages

    This activity allows you to fulfill the role of an employee participating in the risk management process in a…

    • 1406 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    REQUIREMENTS WORK PLAN Claim Management System Implementation Project Alberta Benefit Plan Ltd. Prepared By Daniel Price November, 15, 2010 DMIT228 Section C CONTENTS CONTENTS 2 INTRODUCTION 4 Document Purpose 4 Document Overview 4 Project Overview 5 ORGANIZATION 6 Organization Structure 6 Requirements Roles and Responsibilities 6 Requirements Schedule 7 Requirements Resourcing 8 Budget 8 Tools, Techniques, and Methodologies 9 REQUIREMENTS REPOSITORY 9 Requirements Artefacts 9 Requirements Types 9 Requirements Attributes 10 Requirements Traceability 10 RISK MANAGEMENT PLAN 10 Purpose 10 Risk Management Strategy 11 Responsibility and Accountability 11 Risk List 11 REQUIREMENTS ACCEPTANCE PLAN 12 Purpose 12 Requirements Acceptance Responsibilities 12 Requirements Acceptance Criteria 12 Requirements Acceptance Schedule 13 CHANGE MANAGEMENT PLAN 13 Purpose 13 Change Request Roles and Responsibilities 13 Change Request Procedure 14 Emergency Change Request Procedure 14 Elements of the Change Request 14 Elements of the Change Request Log 14 Plan for Communicating Change 15 REQUIREMENTS MANAGEMENT METRICS PLAN 15 Purpose 15 Requirements Management Goals 15 COMMUNICATIONS MANAGEMENT PLAN 16…

    • 4739 Words
    • 19 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In my own words I think in any target environment security should know the ins and outs of which they are hired to protect, and the ongoing actions that occur on a daily basic. Because if I was security in a target environment I would not like surprise, but we all know that surprises comes with the territory of being in any type of security field line of work.…

    • 276 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Week 10 Technical Paper

    • 2283 Words
    • 10 Pages

    Every organization is faced with some risk or potential threat that could cause an interruption to the organization’s operations. These risks and threats can come from within or outside of the organization. To prepare for the worst that could happen, organizations must focus their attention on how to assess different types of risks to protect the organization from the possible negative effects to the daily operations. Performing a risk assessment is one of the most important steps in the risk management process (eHow, 2011).…

    • 2283 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Implementing documented processes for managing risk that supports the organization’s mission and goals aids leaders give employees and consumers self-assurance in the organization. Directors and senior leadership benefit from fostering functional collaboration promoting accomplishment of its programs among departments (Jones & Cotta, 2009). Risk management allows a facility to nurture a work environment that encourages growth through training and education reduces risk. Organizational strength demonstrates innovative decision-making and openness to change. Nurturing a work environment that encourages growth through training and education reduces risk (Chee, Kamal, & Wingender, 2011).…

    • 1687 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nvq Assessor

    • 1210 Words
    • 5 Pages

    All activities have an element of risk, some more so than others. It is the assessor’s responsibility to assess the level of the risk, establish practices to minimize risk and record such activities.…

    • 1210 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Innovation Management

    • 3601 Words
    • 15 Pages

    This report will examine the fictitious acquisition of a security systems business by a data networking organisation, to determine their corporate wide programme for new products entering into an emerging market. Both organisations presented forthwith, currently operate within the United Kingdom, and any information within this assignment has no reflection on the negative or positive aspects of either company.…

    • 3601 Words
    • 15 Pages
    Good Essays