Posted: June 9th, 2014

Merging IT and Daimler Chrysler

Merging IT and Daimler Chrysler

Project description
Merging IT and Daimler Chrysler-http://www.cioinsight.com/c/a/Past-News/Case-Study-Merging-IT-at-DaimlerChrysler/

Using the case study, identify the technical requirements necessary for the successful completion of the DaimlerChrysler merger. The extrapolated requirements should focus on security, interoperability, and operations.

Using the template provided, identify and prioritize 10 requirements that the newly merged IT system must meet. Additionally, note any applicable standards that govern how the requirements should be met or how the system should perform post-merge. Use NIST Special Publication 800-53 Rev 4 as a control guide and select one control per requirement that must be implemented in order to facilitate each requirement’s secure operation.

Step 1: Review the selected case study and choose 10 requirements related to security, interoperability, and operations.

Step 2: Prioritize the selected requirements based on immediate need, security posture, complexity, resource availability, and cost.

Step 3: Identify applicable standards (if any) that govern how the requirements must be met, implemented, or measured.

Step 4: Using NIST Special Publication 800-53a, select one control per requirement and describe how this control enhances the security posture or facilitates the secure implementation of the requirement.

The template below is the example the professor gave to us. Please use as guidance.
The delivery for this case study will be a completed requirements template. My example that I provide does not count as part of the count. Example below:

Technical Requirements
Encrypt data at rest on mobile devices, workstations, servers and backup devices

Prioritization
1(Highest) – 5(Least)
Immediate Need: 1
Security Posture: 1
Complexity: 5 should be easy to use
Resource Availability: 2
Cost: 5 should not factor into this essential requirement

 

Standards-
Gramm-Leach-Bliley Act directs that all sensitive financial information be protected from compromise through the use of safeguards such as encryption that are FIPS 140-2 compliant.
Control-
MP-5 MEDIA TRANSPORT: This control will ensure that any data residing on media such as hard disks and magnetic media while outside the confines of a secure area are safeguarded. All data on media of any kind must be encrypted using approved encryption algorithms

PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT 🙂

 

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Live Chat+1-631-333-0101EmailWhatsApp