CAPSTONE PROJECT WEEK 5
docx
keyboard_arrow_up
School
Pierce College *
*We aren’t endorsed by this school
Course
4450
Subject
Finance
Date
Jan 9, 2024
Type
docx
Pages
7
Uploaded by ngaruiyajeff
Unit 5 Course Project
A COMPREHENSIVE PROJECT SUBMITTED BY:
Jeff Ngaruiya
NAME(S) OF THE FACULTY
Professor Burdwell
Waldorf University
Tacoma, Washington
December 6, 2023
Risk Assessment Project Plan Definition.
Task #
Task Description
Required Resources
Cost
Duration
1
Software Security
Patching and software update policies and implementation, Anti-
virus scans and reports, Malware scans
and reports, and AUP’s.
$2500
3 weeks
2
Network Security
Firewalls both hardware and software,
Intrusion detection systems, and DMZ’s.
$2500
3 weeks
3
Password Security
Workstation Access, password security policy, and active directory.
$1030
1.5 weeks
4
Physical Security
Door and keypad locks,
cameras, security guards, biometric scanners, and badge scanners.
$1574
1 week
5
Human Security
Background checks, mandatory training and information meetings, mandatory contracts of acknowledgement and compliance of all applicable policies, rules, laws, standards,and or regulations.
$1700
1 week
(Department of finance, 2023)
❖
This project plan outlines and defines all necessary tasks to successfully complete a qualitative risk assessment for the IT environment of the client. This
project plan includes all required resources, cost, and duration to perform each task.
Data Security Mitigation Actions Based on Qualitative Risk Assessment.
Procedure Step
Explanation
Action
Analyze risks
The severity of each risk should be analyzed and identified.
Each risk should be ranked
in order from lowest level of severity, to highest level of severity.
Prioritize risks
Organize/Categorize the identified risks depending upon the severity of each one.
Determine the importance of each risk by ranking them from highest to lowest importance.
Cost benefit Analysis
Determine what the benefits are to responding to each risk.
A comparison between the cost of the risk vs. the cost of what the response would be, to determine response worth. Risk Response
Determine how to respond/address/mitigate the risks.
It should be determined if a
risk can be transferred, mitigated, or accepted. Once that is determined, The risk response should be implemented. (Department of finance, 2023)
❖
This procedure outline is to ensure a thorough mitigation process. This outline includes the procedure step and explanation of each while also stating the actions needed to move forward with each procedure step.
Risk Prioritization and Mitigation Project Plan Definition.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Task #
Task Description
Required Resources
Cost
Duration
1
Data collection and analysis
Risk assessment equipment, risk analysis professionals, data security requirements, RFP technical description.
$2000
2 weeks
2
Prioritize risks based upon severity and mitigation cost
Risk analysis professionals, risk prioritization matrix.
$2090
2 weeks
3
Determine mitigation recommendations and suggestions for high priority risks
Technical and risk analysis professionals, security professionals.
$2300
3 weeks
4
Document all applicable deliverables
Technical writers and editors.
$1400
1 week
5
Submit prioritized risk report
Project managers, Technical and security professionals.
$0
3 days
6
Implement mitigation recommendations
/suggestions
Risk analysis, security,
and technical professionals.
$2750
4 weeks
7
Update the Risk assessment and mitigation plan
Risk analysis, security,
and technical professionals. Technical writers and editors.
$1235
1 week
(Department of finance, 2023)
❖
This mitigation project plan thoroughly outlines each step needed to mitigate the identified risks. This project plan includes resources, equipment, professional expertise, and any other materials needed in order to successfully implement the
mitigation steps. This plan also includes the cost and duration of each step in the mitigation project plan.
Risk Mitigation Actions Based on Qualitative Risk Assessment’s Risk Prioritization. Procedure Step
Explanation
Action
Upgrade Software Security
Software that is outdated leaves room for threats to form such as security gaps, and software bugs.
Install a new update management server to administer regular routine updates for the software
Re-enforce Network Security
Weak security controls within a network leaves all things attached open to cyber attacks.
Install new and updated firewalls both hard and software, intrusion detection systems and DMZ’s
Enhance Physical Security
All physical security must be
up to date and to standard and in compliance with state
and federal laws/regulations.
Hire third-party contractors to come out and begin working on installing new physical security equipment such as key and padlocks, cameras, and scanners
Implement a New Security
Policy Specific to New Hires
To ensure proper and thorough security, all employees must undergo thorough trainings and adhere to all security and training policies.
Perform background checks for all employees as new hires, and then ongoing anually. Training sessions for all new hires and existing employees shall be mandatory
Override current password policies and develop/implement new ones
Old passwords and old password policies leave room open for cyber attacks.
Remove all current and any old password policies and implement the newly developed password security policies as well as hold a training/info meeting
on all new policies
Documentation
Every new implementation or change to a policy/procedure, any findings or reports must be Every employee is responsible for documenting any new implementations, new
documented and kept on record.
policies, and or changes/findings of their own under proper guidelines
(Department of finance, 2023)
❖
This procedure is for the purpose of mitigating high-priority risks for the workstation and system/applications domains in the clients information technology environment. The risk mitigation process is the testing of an IT security system to detect any gaps, holes, bugs, issues, etc, and to implement mitigation steps/strategies in order to remedy those identified risks.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
References
Department of Finance. (2023) (n.d.). STATE GOVERNMENT DEPARTMENT OF FINANCE AND ADMINISTRATION REQUEST FOR PROPOSALS FOR INFORMATION SECURITY ASSESSMENT SERVICES (ISAS) RFP NUMBER: 427.04-107-08
.
Related Documents
Related Questions
Give me right solution urgent please
arrow_forward
launching new software with in 5 months at a cost of $ 5000 can be categorized under
a.
Scope
b.
Objective
c.
Project goal
arrow_forward
Uploaded
arrow_forward
Development of a new deluxe version of a particular software product is being considered. The
activities necessary for the completion of this project are listed in the table below along with
their completion times in weeks.
Activity
A
B
с
D
E
F
G
Normal
Time
4
2
3
8
6
3
4
Immediate
Predecessor
A
A
A
B, D
C, E
F
a. Draw the Network diagram on your own paper.
b. What is the critical path and the project's expected completion time?
c. If activity B takes an additional 3 weeks, what is impact on the project?
d. If activity E takes an additional 1 week, what is impact on the project?
arrow_forward
QUESTION 6
Brianne is a project manager working for SNP Corp., a publishing company. She is currently managing a project that involves three basic activities-authoring, editing, and copyediting. She uses a
project-management tool to analyze these three activities and find out the sequence of activities that is likely to take the longest time to complete. The analysis shows that authoring would take the
maximum time to complete. It also shows that authoring is an immediate predecessor of editing and editing is an immediate predecessor of copyediting. In this scenario, Brianne takes the help of
to plan her projects effectively.
O a. poka-yokes
O b.a value chain
Oc the critical path method
O d. enterprise resource planning
arrow_forward
about:blank
Blackboard Learn
sc.edu/webapps/assessment/take/launch isp?course assessment_id=_114
Remaining Time: 1 hour, 23 minutes, 35 seconds.
Question Completion Status:
A Moving to the next question prevents changes to this answer.
Question 1
What is the Payback Period for the following investment?
Year
1
2
3
4
5
O a. 3.77
Ob. 3.73
Oc. 3.89
Od. 3.96
Cash Out
$ (1,600,000)
(710,000)
Cash In
550,000
580,000
610,000
640,000
670,000
A Moving to the next question prevents changes to this answer.
000
900
F2
F3
F4
MacBook
arrow_forward
help please answer in text form with proper workings and explanation for each and every part and steps with concept and introduction no AI no copy paste remember answer must be in proper format with all working!
arrow_forward
PEFORMING ROR ANALYSIS FOR 3D PRINTER AND IIOT TECHNOLOGY
Background
Software used in 3D printer systems manufactured by Spectrum LASER Corp. is currently able to automatically develop hollows, shells, and "tree supports" to save development time. Network printing for
use on multiple machines and at different locations globally is available. New software, called JIT II, is being beta tested that will allow lloT-type (Industrial Internet of Things) connections between machines
at distant locations. When onboard monitoring sensors detect that a part is about to fail, or it is time to replace one of several high-profile parts, the JIT II software will automatically queue the part's
manufacturing code onto a 3D printer that is detected to be locally idle or ready. The company believes it can design and produce the JIT II software, the 3D printers, and the accompanying computer
equipment necessary to place this technology in a wide variety of harsh environments-chemically toxic to humans,…
arrow_forward
Problem 19-13 (Algo)
Shoney Video Concepts produces a line of video streaming servers that are linked to personal computers for storing movies. These
devices have very fast access and large storage capacity.
Shoney is trying to determine a production plan for the next 12 months. The main criterion for this plan is that the employment level is
to be held constant over the period. Shoney is continuing in its R&D efforts to develop new applications and prefers not to cause any
adverse feelings with the local workforce. For the same reason, all employees should put in full workweeks, even if that is not the
lowest-cost alternative. The forecast for the next 12 months is
MONTH
FORECAST DEMAND
January
February
March
April
530
730
830
530
May
June
330
230
July
130
August
130
September
230
October
630
730
800
November
December
Manufacturing cost is $210 per server, equally divided between materials and labor. Inventory storage cost is $4 per unit per month
and is assigned based on the ending…
arrow_forward
I need help with B, C, D on the attached assignment
arrow_forward
I need help with a and b
arrow_forward
Home
Insert
Draw
Design
Layout
Mail ngs
Review
View
Help
A
Paste
Font
Paragraph
Styles
Editing
Dictate
Editor
Reuse
Files
do
Clipboard N
Styles S
Voice
Reuse Files
Editor
Problem
Initial investment (II) = $6,500, TPP = 2.5 years, required rate of return (r) = 8%
Year
Operating cash flow
1
2,000
4,000
3
3,000
1. How much is payback period (PP)? Should the project be accepted or rejected?
2. How much is discounted payback period (DPP)? Should the project be accepted or rejected?
3. How much is net present value (NPV)? Should the project be accepted or rejected?
4. How much is internal rate of return (IRR)? Should the project be accepted or rejected?
5. How much is modified internal rate of return (MIRR)? Should the project be accepted or rejected?
5
736 words
English (United States)
O Focus
7:38 PM
4/13/2022
arrow_forward
Assignment: Chapter 12 Homework
Time Remaining: 0:58:20
Questions Problem 12.08 (New Project Analysis)
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
0
eBook
Assignment Score: 78.57%
Save Submit Assignment for Grading
Question 4 of 14 ►
Check My Work
You must evaluate the purchase of a proposed spectrometer for the R&D department. The purchase price of the spectrometer including modifications is
$140,000, and the equipment will be fully depreciated at the time of purchase. The equipment would be sold after 3 years for $32,000. The equipment would
require an $8,000 increase in net operating working capital (spare parts inventory). The project would have no effect on revenues, but it should save the firm
$43,000 per year in before-tax labor costs. The firm's marginal federal-plus-state tax rate is 25%.
a. What is the initial investment outlay for the spectrometer after bonus depreciation is considered, that is, what is the Year 0 project cash flow? Enter your
answer as a positive value.…
arrow_forward
please help me
arrow_forward
Managing Quality Improvement Teams
Perform a cost-benefit analysis using the following data:
Direct cost:
10 laptops 2,000.00 each
Server 2,000.00
Network Installation 15,000.00
Software 20,000.00
Indirect costs:
Training 15,000.00
Annualized Benefits
Increased Capacity 100,000.00
Please show the full solution and analysis for this case.
Thanks
arrow_forward
Scenario
You are the project manager working on a Market Mailing project. The client informed your project team
during the project planning phase that the project must be completed on time in order to sync with the launch
of the new product. Also, the client informed you and the team that there is no cash reserve for the project so
the project has to be completed within budget. Below is the status update that two project team members
(Jennifer and Ben) put together. Based on the project's performance to date, complete the Rating Project
Risk exercise on the next page.
Task| Budgeted Actual Percent
works
Estimate Planned Planned Actual Projected| Planned
to
Actual
Resource Resource
Utilization Utilization
works
end date
work
complete complete date
start
start
date
end
cost
cost
date
to
date
60
hours
I $600
50
hours
I $500
June 15 March June 15
120
hours /
$1200
120
hours /
$1200
A
30%
90 hours
March
25%
30%
I $900
15
30
May 15
April
8
B
30%
April 1
May 30
30%
60 hours
I $600
50%
Rating…
arrow_forward
PEFORMING ROR ANALYSIS FOR 3D PRINTER AND I1OT TECHNOLOGY
Background
Software used in 3D printer systems manufactured by Spectrum LASER Corp. is currently able to automatically develop hollows, shells, and "tree
supports to save development time. Network printing for use on multiple machines and at different locations globally is available. New software,
called JIT II, is being beta tested that will allow lloT-type (Industrial Internet of Things) connections between machines at distant locations. When onb
oard monitoring sensors detect that a part is about to fail, or it is time to replace one of several high-profile parts, the JIT Il software will
automatically queue the part's manufacturing code onto a 3D printer that is detected to be locally idle or ready. The company believes it can design
and produce the JIT Il software, the 3D printers, and the accompanying computer equipment necessary to place this technology in a wide variety of
harsh environments-chemically toxic to humans,…
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you

Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning

Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L

Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Related Questions
- Development of a new deluxe version of a particular software product is being considered. The activities necessary for the completion of this project are listed in the table below along with their completion times in weeks. Activity A B с D E F G Normal Time 4 2 3 8 6 3 4 Immediate Predecessor A A A B, D C, E F a. Draw the Network diagram on your own paper. b. What is the critical path and the project's expected completion time? c. If activity B takes an additional 3 weeks, what is impact on the project? d. If activity E takes an additional 1 week, what is impact on the project?arrow_forwardQUESTION 6 Brianne is a project manager working for SNP Corp., a publishing company. She is currently managing a project that involves three basic activities-authoring, editing, and copyediting. She uses a project-management tool to analyze these three activities and find out the sequence of activities that is likely to take the longest time to complete. The analysis shows that authoring would take the maximum time to complete. It also shows that authoring is an immediate predecessor of editing and editing is an immediate predecessor of copyediting. In this scenario, Brianne takes the help of to plan her projects effectively. O a. poka-yokes O b.a value chain Oc the critical path method O d. enterprise resource planningarrow_forwardabout:blank Blackboard Learn sc.edu/webapps/assessment/take/launch isp?course assessment_id=_114 Remaining Time: 1 hour, 23 minutes, 35 seconds. Question Completion Status: A Moving to the next question prevents changes to this answer. Question 1 What is the Payback Period for the following investment? Year 1 2 3 4 5 O a. 3.77 Ob. 3.73 Oc. 3.89 Od. 3.96 Cash Out $ (1,600,000) (710,000) Cash In 550,000 580,000 610,000 640,000 670,000 A Moving to the next question prevents changes to this answer. 000 900 F2 F3 F4 MacBookarrow_forward
- help please answer in text form with proper workings and explanation for each and every part and steps with concept and introduction no AI no copy paste remember answer must be in proper format with all working!arrow_forwardPEFORMING ROR ANALYSIS FOR 3D PRINTER AND IIOT TECHNOLOGY Background Software used in 3D printer systems manufactured by Spectrum LASER Corp. is currently able to automatically develop hollows, shells, and "tree supports" to save development time. Network printing for use on multiple machines and at different locations globally is available. New software, called JIT II, is being beta tested that will allow lloT-type (Industrial Internet of Things) connections between machines at distant locations. When onboard monitoring sensors detect that a part is about to fail, or it is time to replace one of several high-profile parts, the JIT II software will automatically queue the part's manufacturing code onto a 3D printer that is detected to be locally idle or ready. The company believes it can design and produce the JIT II software, the 3D printers, and the accompanying computer equipment necessary to place this technology in a wide variety of harsh environments-chemically toxic to humans,…arrow_forwardProblem 19-13 (Algo) Shoney Video Concepts produces a line of video streaming servers that are linked to personal computers for storing movies. These devices have very fast access and large storage capacity. Shoney is trying to determine a production plan for the next 12 months. The main criterion for this plan is that the employment level is to be held constant over the period. Shoney is continuing in its R&D efforts to develop new applications and prefers not to cause any adverse feelings with the local workforce. For the same reason, all employees should put in full workweeks, even if that is not the lowest-cost alternative. The forecast for the next 12 months is MONTH FORECAST DEMAND January February March April 530 730 830 530 May June 330 230 July 130 August 130 September 230 October 630 730 800 November December Manufacturing cost is $210 per server, equally divided between materials and labor. Inventory storage cost is $4 per unit per month and is assigned based on the ending…arrow_forward
- I need help with B, C, D on the attached assignmentarrow_forwardI need help with a and barrow_forwardHome Insert Draw Design Layout Mail ngs Review View Help A Paste Font Paragraph Styles Editing Dictate Editor Reuse Files do Clipboard N Styles S Voice Reuse Files Editor Problem Initial investment (II) = $6,500, TPP = 2.5 years, required rate of return (r) = 8% Year Operating cash flow 1 2,000 4,000 3 3,000 1. How much is payback period (PP)? Should the project be accepted or rejected? 2. How much is discounted payback period (DPP)? Should the project be accepted or rejected? 3. How much is net present value (NPV)? Should the project be accepted or rejected? 4. How much is internal rate of return (IRR)? Should the project be accepted or rejected? 5. How much is modified internal rate of return (MIRR)? Should the project be accepted or rejected? 5 736 words English (United States) O Focus 7:38 PM 4/13/2022arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,

Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning

Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L

Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,