CSIA 485 Project #5 Detailed Assignment Description This assignment requires that you adapt the analysis done for P1/P2/P3/P4 to a new environment. Use your prior work, i.e. the recommendation memo and network diagram, to develop a high-level plan for implementing the required controls, changes, etc. to mitigate vulnerabilities and convergence issues in the new environment. You may need to do additional analysis to address issues specific to the second case study’s environment. Your high-level plan should include all the system development life cycle (SDLC) gates/decision points and all relevant tasks. Describe and relate the implementation solution to CIA and incorporate, people, processes and technology to this plan. This is a combination of a paper and a detailed list of steps and resources that you would follow to implement and complete this project. Think about all of the actions, resources, and tasks that you would need in order to effect a successful implementation. These should also be included as part of the plan. The instructor may provide a template to use with this assignment. The minimum structure for this assignment is below: INTRODUCTION Purpose of Plan GOALS AND OBJECTIVES Business Goals and Objectives Project Goals and Objectives SCOPE Scope Definition Items Beyond Scope PROJECTED EXPENSES System Development Life Cycle/Schedule Milestones ASSUMPTIONS Project Assumptions CONSTRAINTS Project Constraints Critical Project Barriers The Plan will be a minimum 5 page, double-spaced paper using Times New Roman 12 font and APA style formatting for citations and references. It will also include a minimum of 5 references. The Title/Cover page, illustrations, and references are not part of the page count but are required for the assignment. A network diagram is also required. The grading rubric provides additional details as to what should be included in the paper. Your instructor may provide an APA style template to use for this paper. *** Make sure that you include in detail the steps you would take to secure the project.

    Implementation Plan

    Introduction

    Both private and public companies have become an easy target for cybercriminals since they deal with tones of personal information and they lack the budgetary muscle to install the best cybersecurity measures.  Turn Key University has not been an exception as it has been attacked in the recent past. The attack resulted to a large scale student information theft. The attack appeared to have been facilitated by a fundamental lapse and inadequacy of the university’s information security system coupled with the fact threat the information culture adopted by the institutions was wanting. The attack fundamentally tainted the reputation of the institution ranging from angry students and disappointed parents. Furthermore, the institution suffered a

    OR