CAPSTONE PROJECT WEEK 5

docx

School

Pierce College *

*We aren’t endorsed by this school

Course

4450

Subject

Finance

Date

Jan 9, 2024

Type

docx

Pages

7

Uploaded by ngaruiyajeff

Report
Unit 5 Course Project A COMPREHENSIVE PROJECT SUBMITTED BY: Jeff Ngaruiya NAME(S) OF THE FACULTY Professor Burdwell Waldorf University Tacoma, Washington December 6, 2023
Risk Assessment Project Plan Definition. Task # Task Description Required Resources Cost Duration 1 Software Security Patching and software update policies and implementation, Anti- virus scans and reports, Malware scans and reports, and AUP’s. $2500 3 weeks 2 Network Security Firewalls both hardware and software, Intrusion detection systems, and DMZ’s. $2500 3 weeks 3 Password Security Workstation Access, password security policy, and active directory. $1030 1.5 weeks 4 Physical Security Door and keypad locks, cameras, security guards, biometric scanners, and badge scanners. $1574 1 week 5 Human Security Background checks, mandatory training and information meetings, mandatory contracts of acknowledgement and compliance of all applicable policies, rules, laws, standards,and or regulations. $1700 1 week (Department of finance, 2023) This project plan outlines and defines all necessary tasks to successfully complete a qualitative risk assessment for the IT environment of the client. This
project plan includes all required resources, cost, and duration to perform each task. Data Security Mitigation Actions Based on Qualitative Risk Assessment. Procedure Step Explanation Action Analyze risks The severity of each risk should be analyzed and identified. Each risk should be ranked in order from lowest level of severity, to highest level of severity. Prioritize risks Organize/Categorize the identified risks depending upon the severity of each one. Determine the importance of each risk by ranking them from highest to lowest importance. Cost benefit Analysis Determine what the benefits are to responding to each risk. A comparison between the cost of the risk vs. the cost of what the response would be, to determine response worth. Risk Response Determine how to respond/address/mitigate the risks. It should be determined if a risk can be transferred, mitigated, or accepted. Once that is determined, The risk response should be implemented. (Department of finance, 2023) This procedure outline is to ensure a thorough mitigation process. This outline includes the procedure step and explanation of each while also stating the actions needed to move forward with each procedure step. Risk Prioritization and Mitigation Project Plan Definition.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Task # Task Description Required Resources Cost Duration 1 Data collection and analysis Risk assessment equipment, risk analysis professionals, data security requirements, RFP technical description. $2000 2 weeks 2 Prioritize risks based upon severity and mitigation cost Risk analysis professionals, risk prioritization matrix. $2090 2 weeks 3 Determine mitigation recommendations and suggestions for high priority risks Technical and risk analysis professionals, security professionals. $2300 3 weeks 4 Document all applicable deliverables Technical writers and editors. $1400 1 week 5 Submit prioritized risk report Project managers, Technical and security professionals. $0 3 days 6 Implement mitigation recommendations /suggestions Risk analysis, security, and technical professionals. $2750 4 weeks 7 Update the Risk assessment and mitigation plan Risk analysis, security, and technical professionals. Technical writers and editors. $1235 1 week (Department of finance, 2023) This mitigation project plan thoroughly outlines each step needed to mitigate the identified risks. This project plan includes resources, equipment, professional expertise, and any other materials needed in order to successfully implement the mitigation steps. This plan also includes the cost and duration of each step in the mitigation project plan.
Risk Mitigation Actions Based on Qualitative Risk Assessment’s Risk Prioritization. Procedure Step Explanation Action Upgrade Software Security Software that is outdated leaves room for threats to form such as security gaps, and software bugs. Install a new update management server to administer regular routine updates for the software Re-enforce Network Security Weak security controls within a network leaves all things attached open to cyber attacks. Install new and updated firewalls both hard and software, intrusion detection systems and DMZ’s Enhance Physical Security All physical security must be up to date and to standard and in compliance with state and federal laws/regulations. Hire third-party contractors to come out and begin working on installing new physical security equipment such as key and padlocks, cameras, and scanners Implement a New Security Policy Specific to New Hires To ensure proper and thorough security, all employees must undergo thorough trainings and adhere to all security and training policies. Perform background checks for all employees as new hires, and then ongoing anually. Training sessions for all new hires and existing employees shall be mandatory Override current password policies and develop/implement new ones Old passwords and old password policies leave room open for cyber attacks. Remove all current and any old password policies and implement the newly developed password security policies as well as hold a training/info meeting on all new policies Documentation Every new implementation or change to a policy/procedure, any findings or reports must be Every employee is responsible for documenting any new implementations, new
documented and kept on record. policies, and or changes/findings of their own under proper guidelines (Department of finance, 2023) This procedure is for the purpose of mitigating high-priority risks for the workstation and system/applications domains in the clients information technology environment. The risk mitigation process is the testing of an IT security system to detect any gaps, holes, bugs, issues, etc, and to implement mitigation steps/strategies in order to remedy those identified risks.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
References Department of Finance. (2023) (n.d.). STATE GOVERNMENT DEPARTMENT OF FINANCE AND ADMINISTRATION REQUEST FOR PROPOSALS FOR INFORMATION SECURITY ASSESSMENT SERVICES (ISAS) RFP NUMBER: 427.04-107-08 .