Levels Tought:
University
Teaching Since: | Apr 2017 |
Last Sign in: | 344 Weeks Ago, 1 Day Ago |
Questions Answered: | 9562 |
Tutorials Posted: | 9559 |
bachelor in business administration
Polytechnic State University Sanluis
Jan-2006 - Nov-2010
CPA
Polytechnic State University
Jan-2012 - Nov-2016
Professor
Harvard Square Academy (HS2)
Mar-2012 - Present
IS4799: Unit 3 Assignment 1: RFP Technical Requirements and
Differences from Existing Controls
© ITT Educational Services Page 1
Learning Objectives and Outcomes
ï‚§ï€ You will learn how to identify the differences between the description of the Request for Proposal (RFP)
of the client’s current information technology (IT) security policy framework and the environment that will
be the result of the work requested in the RFP. After identifying differences, you will learn how to create a
report that documents any gaps.
Assignment Requirements
In this assignment, you need to review the RFP’s description of the client’s current IT security policy
framework. Then, review the RFP’s technical description of what changes are requested. Compare these
two descriptions and prepare a list of differences where existing controls do not provide the desired level
of protection. Each difference is a gap in the client’s current IT security policy framework.
You will be graded on your ability to analyze the client’s current IT security policy framework as described
in the RFP and identify any gaps that exist between the existing framework and the desired final
framework. You should be able to correlate the gaps with work that must be accomplished to satisfy the
RFP. At a high level, the gap analysis provides a list of specific objectives that a firm’s proposal will
address to satisfy the RFP.
-----------