View the step-by-step solution to: I don't understand what they are asking.

I don't understand what they are asking.
This question was answered on Nov 08, 2013. View the Answer
I don't understand what they are asking.
IS4799.docx

IS4799: Unit 3 Assignment 1: RFP Technical Requirements and
Differences from Existing Controls
© ITT Educational Services Page 1
Learning Objectives and Outcomes
You will learn how to identify the differences between the description of the Request for Proposal (RFP)
of the clients current information technology (IT) security policy framework and the environment that will
be the result of the work requested in the RFP. After identifying differences, you will learn how to create a
report that documents any gaps.
Assignment Requirements
In this assignment, you need to review the RFPs description of the clients current IT security policy
framework. Then, review the RFPs technical description of what changes are requested. Compare these
two descriptions and prepare a list of differences where existing controls do not provide the desired level
of protection. Each difference is a gap in the clients current IT security policy framework.
You will be graded on your ability to analyze the clients current IT security policy framework as described
in the RFP and identify any gaps that exist between the existing framework and the desired final
framework. You should be able to correlate the gaps with work that must be accomplished to satisfy the
RFP. At a high level, the gap analysis provides a list of specific objectives that a firms proposal will
address to satisfy the RFP.
Required Resources
RFP
Worksheet: IT Security Policy Framework/RFP Requirements
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style
Length: 12 pages
Self-Assessment Checklist
I have reviewed the RFPs description of the clients current IT security policy framework.
I have reviewed the RFPs technical description of what changes are requested.
I have compared these two descriptions and prepared a list of differences or gaps.

IS4799: Unit 3 IT Security Policy Framework/RFP Requirements
Worksheet
© ITT Educational Services Page 2
Instructions: Review the Request
for Proposal (RFP) information
technology (IT) Security
Framework Requirements. For
each identified requirement, find
the corresponding controls that
address the requirement in the
clients current environment. Note

Existing Control(s)

any requirements that have no
existing controls. RFP
Requirement

View the entire interaction

Fi... View the full answer

Security.zip - Preview not available

Why Join Course Hero?

Course Hero has all the homework and study help you need to succeed! We’ve got course-specific notes, study guides, and practice tests along with expert tutors and customizable flashcards—available anywhere, anytime.

-

Educational Resources
  • -

    Study Documents

    Find the best study resources around, tagged to your specific courses. Share your own to gain free Course Hero access or to earn money with our Marketplace.

    Browse Documents
  • 890,990,898

    Question & Answers

    Get one-on-one homework help from our expert tutors—available online 24/7. Ask your own questions or browse existing Q&A threads. Satisfaction guaranteed!

    Ask a Question
  • 890,990,898

    Flashcards

    Browse existing sets or create your own using our digital flashcard system. A simple yet effective studying tool to help you earn the grade that you want!

    Browse Flashcards