Merging IT and Daimler Chrysler
Merging IT and Daimler Chrysler-http://www.cioinsight.com/c/a/Past-News/Case-Study-Merging-IT-at-DaimlerChrysler/
Using the case study, identify the technical requirements necessary for the successful completion of the DaimlerChrysler merger. The extrapolated requirements should focus on security, interoperability, and operations.
Using the template provided, identify and prioritize 10 requirements that the newly merged IT system must meet. Additionally, note any applicable standards that govern how the requirements should be met or how the system should perform post-merge. Use NIST Special Publication 800-53 Rev 4 as a control guide and select one control per requirement that must be implemented in order to facilitate each requirement’s secure operation.
Step 1: Review the selected case study and choose 10 requirements related to security, interoperability, and operations.
Step 2: Prioritize the selected requirements based on immediate need, security posture, complexity, resource availability, and cost.
Step 3: Identify applicable standards (if any) that govern how the requirements must be met, implemented, or measured.
Step 4: Using NIST Special Publication 800-53a, select one control per requirement and describe how this control enhances the security posture or facilitates the secure implementation of the requirement.
The template below is the example the professor gave to us. Please use as guidance.
The delivery for this case study will be a completed requirements template. My example that I provide does not count as part of the count. Example below:
Encrypt data at rest on mobile devices, workstations, servers and backup devices
1(Highest) – 5(Least)
Immediate Need: 1
Security Posture: 1
Complexity: 5 should be easy to use
Resource Availability: 2
Cost: 5 should not factor into this essential requirement
Gramm-Leach-Bliley Act directs that all sensitive financial information be protected from compromise through the use of safeguards such as encryption that are FIPS 140-2 compliant.
MP-5 MEDIA TRANSPORT: This control will ensure that any data residing on media such as hard disks and magnetic media while outside the confines of a secure area are safeguarded. All data on media of any kind must be encrypted using approved encryption algorithms
PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT 🙂
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more