Determine the information technology/security gaps and develop a securitystrategy that includes issues relating to confidentiality, integrity, andavailability (CIA), and that includes the key elements relative to People,Process, and Technology.

Step 1: Describe the key issues/challenges/risks from thiscase study.

Step 2: Based on the information provided in the casestudy, describe and document the recommended security strategy to mitigate theissues/challenges identified.

Step 3: Describe the proposed security solutions andrelationship to the case study.

Step 4: Document a detailed, proposed timeline foraddressing each element of the strategy that you identify. Provide estimatesfor implementing recommended strategies, with rationale. Include what resourcesare necessary for completing each task in the timeline.

Step 5: Provide a high-level recommendation regarding thenext steps to take in mitigating risks identified.

Leave a Reply

Your email address will not be published. Required fields are marked *