Identify requirements

Identify requirements

The primary theme of the paper is Identify requirements in which you are required to emphasize its aspects in detail. The cost of the paper starts from $99 and it has been purchased and rated 4.9 points on the scale of 5 points by the students. To gain deeper insights into the paper and achieve fresh information, kindly contact our support.

Identify requirements


Project 2: Case Study—Identify Requirements

Using the case study, identify the technical requirements necessary for the successful completion of the Merging IT at DaimlerChrysler .The extrapolated requirements should focus on security, interoperability, and operations.

Using the template provided, identify and prioritize 10 requirements that the newly merged IT system must meet. Additionally, note any applicable standards that govern how the requirements should be met or how the system should perform post-merge. Use NIST Special Publication 800-53a as a control guide and select one control per requirement that must be implemented in order to facilitate each requirement`s secure operation.

Step 1: Review the selected case study and choose 10 requirements related to security, interoperability, and operations.

Step 2: Prioritize the selected requirements based on immediate need, security posture, complexity, resource availability, and cost.

Step 3: Identify applicable standards (if any) that govern how the requirements must be met, implemented, or measured.

Step 4: Using NIST Special Publication 800-53a,  select one control per requirement and describe how this control enhances the security posture or facilitates the secure implementation of the requirement.


Identify requirementsStudents:Professor:Course title:Date:Identify requirementsTechnical RequirementsPrioritization 1(Highest) – 5(Least)StandardsControl1Communication systems, Information System (IS) accounts, information systems (ISs) and integrating them ISsImmediate Need: 2Security Posture: 1Complexity: 2Resource Availability: 1Cost: 3The Gramm-Leach-Bliley Act (GLB) holds that every critical financial data must be protected from compromise by using safeguards including encryption that comply with FIPS 140-2 (Agari, 2014). AC-1: Account Management – This control will ensure that the organization manages information system accounts including communication systems accounts2Size up systems and application needs and security controlsImmediate Need: 1Security Posture: 1Complexity: 2Resource Availability: 1Cost: 2CA-2 Security Assessments – this control allows the firm to carry out an assessmen...
100% Plagiarism Free & Custom Written
Tailored to your instructions