Gap Analysis

[ad_1]
turnitin proof!Instructions Read the Case Study posted for this assignment (see file attached to the assignment folder entry). Determine the information technology/security gaps and develop a security strategy that includes issues relating to confidentiality, integrity, and availability (CIA), and that includes the key elements relative to People, Process, and Technology. Step by Step: Step 1: Describe the key issues/challenges/risks from this case study. Step 2: Based on the information provided in the case study, describe and document the recommended security strategy to mitigate the issues/challenges identified. Step 3: Describe the proposed security solutions and relationship to the case study. Step 4: Document a detailed, proposed timeline for addressing each element of the strategy that you identify. Provide estimates for implementing recommended strategies, with rationale. Include what resources are necessary for completing each task in the timeline. Step 5: Provide a high-level recommendation regarding the next steps to take in mitigating risks identified. Additional Information Consult the grading rubric for specific content and formatting requirements for this assignment.Your 5 – 8 page Gap Analysis paper should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper. Your paper should use standard terms and definitions for cybersecurity. See Course Content > Cybersecurity Concepts Review for recommended resources.The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,Nov2014).docx. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count.You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.). Technology Issues10 pointsIdentifies at least 10 security or technology issues based on the case study.Security Issues10 pointsClearly describes and relates information security and other technology issues to confidentiality, integrity and availability (CIA). Synthesizes and applies material and document relationships.ID Risks and Challenges5 pointsApply Risk ID10 pointsSynthesizes and applies risk identification and challenges. Derives new paradigms appropriately based on research and lessons learned.Define Strategy5 pointsRelate Solutions10 pointsClearly identifies security solutions that consist of people, processes and technologies that relate to the risks. Covers all three requirements.Defines Tasks5 pointsClear and detailed timeline that summarizes at least 10 of the technology solutions being recommended. Includes clear and defined tasks for each solution. Prioritize Tasks5 pointsMajor tasks are clearly prioritized according their importance to mitigating the risks and issues found.Define Resources5 pointsClearly defined people resources (by type) that support each task in the timeline.Mitigation5 pointsClearly describes and discusses high level plans that mitigate all technology issues identified. Provides clear detail and rationale to mitigate issues identified.Next Steps5 pointsClearly describes next steps that must be taken to resolve all issues identified.Use of Authoritative Sources5 pointsCited and used at least 5 authoritative or scholarly sources in paper. Citation of Sources5 pointsWork contains a reference list containing entries for all cited resources. Sufficient information is provided to allow a reader to find and retrieve the cited sources. Reference list entries and in-text citations are consistently and correctly formatted using an appropriate citation style (APA, MLA, etc.).Formatting5 pointsPrepared MS Word document, used consistent formatting, section subheadings, submitted one file, used instructor provided template, correct coversheet and separate reference page and meets minimum page count of 5 pages.Grammar and Punctuation5 pointsNo grammar errors, use of first/second person, spelling or punctuation errors.
[ad_2]Source link
 
“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."

"Order a Custom Paper on Similar Assignment! No Plagiarism! Enjoy 20% Discount"