Interested in a PLAGIARISM-FREE paper based on these particular instructions?...with 100% confidentiality?

Order Now

ITT Technical Institute IS4799 Information systems and Cyber-security Capstone Project August 26, 2013 Proprietary and confidential REQUEST FOR PROPOSAL ————————————————- ————————————————- Table of Contents TEMPLATE CONTENTS 3 INTRODUCTION AND BACKGROUND 3 PURPOSE OF THE REQUEST FOR PROPOSAL 3 ADMINISTRATIVE 3 TECHNICAL CONTACT 3 CONTRACTUAL CONTACT 3 DUE DATES 3 SCHEDULE OF EVENTS 3 GUIDELINES FOR PROPOSAL PREPARATION 3 PROPOSAL SUBMISSION 3 DETAILED RESPONSE REQUIREMENTS 3 EXECUTIVE SUMMARY 3 SCOPE, APPROACH, AND METHODOLOGY 3 DELIVERABLES 3 PROJECT MANAGEMENT APPROACH 3 DETAILED AND ITEMIZED PRICING 3 APPENDIX: REFERENCES 3 APPENDIX: PROJECT TEAM STAFFING 3 APPENDIX: COMPANY OVERVIEW 3 EVALUATION FACTORS FOR AWARD 3 CRITERIA 3 SCOPE OF WORK 3 REQUIREMENTS 3 DELIVERABLES 3 INTRODUCTION AND BACKGROUND PURPOSE OF THE REQUEST FOR PROPOSAL The Firm is a security services provider. Our clients included organizations of various sizes, but most clients are state and federal government agencies that must demonstrate compliance with specific security-related regulations. Our firm was founded 2002, as a small corporation with only four employees. At that time, the firm’s focus was to provide database performance tuning and security services, including assessments, penetration tests, policy creation, and regulatory compliance assistance. The firm’s current annual gross sales are currently million in U.S. dollars. The Firm is interested in conducting a security assessment that will allow it to: Gain a better understanding of potential corporate network vulnerabilities that may be visible from the Internet. Determine if the current wireless network is configured securely. These activities are part of The Firm ongoing risk management program and are focused on identifying the risk level The Firm is currently exposed to so that an appropriate

REQUEST FOR PROPOSAL ————————————————-

————————————————-

Table of Contents

TEMPLATE CONTENTS 3 INTRODUCTION AND BACKGROUND 3 PURPOSE OF THE REQUEST FOR PROPOSAL 3 ADMINISTRATIVE 3 TECHNICAL CONTACT 3 CONTRACTUAL CONTACT 3 DUE DATES 3 SCHEDULE OF EVENTS 3 GUIDELINES FOR PROPOSAL PREPARATION 3 PROPOSAL SUBMISSION 3 DETAILED RESPONSE REQUIREMENTS 3 EXECUTIVE SUMMARY 3 SCOPE, APPROACH, AND METHODOLOGY 3 DELIVERABLES 3 PROJECT MANAGEMENT APPROACH 3 DETAILED AND ITEMIZED PRICING 3 APPENDIX: REFERENCES 3 APPENDIX: PROJECT TEAM STAFFING 3 APPENDIX: COMPANY OVERVIEW 3 EVALUATION FACTORS FOR AWARD 3 CRITERIA 3 SCOPE OF WORK 3 REQUIREMENTS 3 DELIVERABLES 3

INTRODUCTION AND BACKGROUND

PURPOSE OF THE REQUEST FOR PROPOSAL

The Firm is a security services provider. Our clients included organizations of various sizes, but most clients are state and federal government agencies that must demonstrate compliance with specific security-related regulations. Our firm was founded 2002, as a small corporation with only four employees. At that time, the firm’s focus was to provide database performance tuning and security services, including assessments, penetration tests, policy creation, and regulatory compliance assistance. The firm’s current annual gross sales are currently million in U.S. dollars. The Firm is interested in conducting a security assessment that will allow it to:

  • Gain a better understanding of potential corporate network vulnerabilities that may be visible from the Internet.
  • Determine if the current wireless network is configured securely.

Interested in a PLAGIARISM-FREE paper based on these particular instructions?...with 100% confidentiality?

Order Now