Determine the information technology/security gaps and develop a securitystrategy that includes issues relating to confidentiality, integrity, andavailability (CIA), and that includes the key elements relative to People,Process, and Technology.
Step 1: Describe the key issues/challenges/risks from thiscase study.
Step 2: Based on the information provided in the casestudy, describe and document the recommended security strategy to mitigate theissues/challenges identified.
Step 3: Describe the proposed security solutions andrelationship to the case study.
Step 4: Document a detailed, proposed timeline foraddressing each element of the strategy that you identify. Provide estimatesfor implementing recommended strategies, with rationale. Include what resourcesare necessary for completing each task in the timeline.
Step 5: Provide a high-level recommendation regarding thenext steps to take in mitigating risks identified.