ITT Technical Institute
IS4799 Information systems and Cyber-security
Capstone Project
August 26, 2013
Proprietary and confidential
REQUEST FOR PROPOSAL
-------------------------------------------------
-------------------------------------------------
Table of Contents
TEMPLATE CONTENTS 3
INTRODUCTION AND BACKGROUND 3
PURPOSE OF THE REQUEST FOR PROPOSAL 3
ADMINISTRATIVE 3
TECHNICAL CONTACT 3
CONTRACTUAL CONTACT 3
DUE DATES 3
SCHEDULE OF EVENTS 3
GUIDELINES FOR PROPOSAL PREPARATION 3
PROPOSAL SUBMISSION 3
DETAILED RESPONSE REQUIREMENTS 3
EXECUTIVE SUMMARY 3
SCOPE, APPROACH, AND METHODOLOGY 3
DELIVERABLES 3
PROJECT MANAGEMENT APPROACH 3
DETAILED AND ITEMIZED PRICING 3
APPENDIX: REFERENCES 3
APPENDIX:
…show more content…
Project Management Approach 5. Detailed and Itemized Pricing 6. Appendix: References 7. Appendix: Project Team Staffing 8. Appendix: Company Overview
The detailed requirements for each of the above-mentioned sections are outlined below.
DETAILED RESPONSE REQUIREMENTS
EXECUTIVE SUMMARY
The Firm is a trusted information security firm. Practices include security testing services, compliance assessments and validation, education and training, and solving complex IT security problems. Our philosophy is to deliver value with every engagement, and provide results that actionable.
SCOPE, APPROACH, AND METHODOLOGY
Include detailed testing procedures and technical expertise by phase. This section should include a description of each major type of work being requested of the vendor. All information that is provided will be held in strict confidence. The proposal should reflect each of the sections listed below (examples of the types of sections that could appear are listed below – select or modify them as appropriate):
* External Network Vulnerability Assessment and Penetration Testing * Internal Network Vulnerability Assessment and Penetration Testing * Web Application Penetration Testing * Dial-In / RAS Security Testing * DMZ or Network Architecture Designs / Reviews * Wireless Network Assessment and Penetration Testing * Virtual Infrastructure Security Assessment * Server
Each team will select a topic for research and a Team Leader. Using the list of required elements for the project, each member of the team will take responsibility for researching specific aspects of the technology. The team will then produce a detailed outline for the project, noting each team member’s research sections. Please note, the list of required elements is just that – a list – and does not constitute an outline.
___________________ is a global provider of security, risk, and compliance solutions for enterprise environments. Their products include identity assurance, data loss prevention, encryption, and tokenization devices. They also provide specific training and certifications to help security professionals acquire and demonstrate the knowledge and skills to use their products effectively.
The world of cyber security continues to introduce new threats each year against network infrastructures and computer devices. In the recent years, the impact from cyber-attacks has wreaked havoc on many company brands and organizational reputations. As this issue grows so does the technology to prevent and protect against these malicious attacks. It is absolutely crucial for organizations and businesses to shift focus from defense for different types of attacks to improving safeguards to mitigate the loss of sensitive data when an attack occurs. In addition to the traditional security technology used to detect an attack, companies will have to include
For our capstone project, our group will be focusing on the examination and analysis of the newest version of the Android operating system, 8.0 or Android oreo. The ultimate goal of the project is to create a well documented and detailed source of information for forensic investigators examining Android devices running Android 8.0. Currently, there is very little forensic information about the newest version of Android, especially in terms of the newest features such as now playing, instant apps, among many others. We decided to cover this topic with the goal of keeping information current in the field of digital forensics. This is an important task, especially with the growing popularity of Android and the importance of mobile devices in
Secondly, creating tests that will ensure that the specified work product meets the specific requirements. Lastly, carry out the tests on the work product to ensure the specific requirements are achieved.
In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.
Ensure that you note any requirements that are out of scope to achieve absolute clarity about what is and is not covered by this project, and to avoid the potential for problems later on.
Over winter break, I struggled to come up with an idea for the capstone project. I was looking for a project that meant something to me, that I would want to dedicate an entire semester to working on. I was completely lost and did not know how I was going to choose one. Then I received an email from my colleague, Nathan Johnson, who asked if I was still interested in working with him for the capstone project and explained his idea. The idea was to create a depth perception system to help the blind in navigation, using convolution neural networks. I was on board right away and very excited about working on this project. The project sounded like because it seemed that it would be a project that would actually benefit society. Furthermore, my mom lost 50% of her vision in 1995, which completely changed her life and showed me how important this project could be. ...made this a
Last Tuesday, June 14,2016, was the orientation for capstone project 1 wherein students were formed into groups and the
The Firm is a medical supply corporation that has prepared a request for proposal to seek a revamp of all their office branches with state of the art information systems equipment, local/wide network infrastructure, and services provided by the contractor. Spade Networks.
In the define phase proposals are formulated, estimated and tested for feasibility. The results will be presented to the senior management in order to receive a "go" for the project which often is in the form of a contract.
Even though the price would be lowered because of the bad weather as per the tying in price and weather policy, not everyone would still want to go away. Either it needs to be explained clearly on the website that undesirable weather will not entitle any customer to a refund or to change or cancel their booking without penalty; or the policy must be clear in whatever the company decides is fair. For example, it may state that if the weather is unpleasant can change (but not cancel) the booking to another time.
The VP of marketing, Lori, selected Elliot Wood as the project manager for the Video Game Market Research Project. Elliot had previous project management and market research experience within the company, and he also was an avid video game enthusiast. He still had the Atari system he used to play in high school, and he enjoyed playing newer games with his two children. Elliot, however, was wary of doing business on the Internet and refused to make any of his own purchases online. He also did not let his grade school children use the Internet unless they were
This proposal will outline and validate the impending document generally. First the general nature of the document will be discussed; then the ensuing proposal will be outlined.
Olli Pitkänen, Risto Sarvas, Asko Lehmuskallio, Miska Simanainen, Vesa Kantola Helsinki Institute for Information Technology HIIT / Aalto University Mika Rautila, Arto Juhola, Heikki Pentikäinen VTT Technical Research Centre of Finland Ossi Kuittinen Sitra