Implementation Plan

| April 27, 2015

Order Details;


Using the recommendation memo and network diagram, develop a high-level plan for implementing the changes and mitigating vulnerabilities and convergence issues. The high-level plan should include all the system development life cycle (SDLC) gates/decision points and all relevant tasks. Describe and relate the implementation solution to CIA and incorporate, people, processes and technology to this plan.

This is a combination of a paper and a detailed list of steps and resources that you would follow to implement and complete this project. Think about all of the actions, resources, and tasks that you would need in order to effect a successful implementation. These should also be included as part of the plan. The instructor may provide a template to use with this assignment. The minimum structure for this assignment is below:

    • Purpose of Plan
    • Business Goals and Objectives
    • Project Goals and Objectives
  • SCOPE:
    • Scope Definition
    • Items Beyond Scope
    • System Development Life Cycle/Schedule
    • Milestones
    • Project Assumptions
    • Project Constraints
    • Critical Project Barriers

The Plan should a minimum of a minimum 5 page, double-spaced paper using Times New Roman 12 font and APA style format. It will also include a minimum of 5 references. The Title/Cover page, illustrations (tables/charts/graphs), network diagram or references are not part of the page count but required. Also the grading rubric can provide more details to include in the paper. Make sure that you include in detail the steps you would take to secure the project.

Purpose / Goals and Objectives Expertly defines goals and objectives
Scope of Security Issues Clearly describes and relates information security and other technology issues. Synthesizes and applies material and document relationships.
Project Expenses
Costs Related to Security Effort/Solution Clearly identifies and articulates the cost of overall security solution.
SDLC Schedule Synthesizes and applies logical SDLC processes and schedule to overall solution deployment.
Solution Diagram and Illustration
Milestones Each defined milestone is directly related to overall strategy/solution and clearly mitigates the risk or issue.
Assumptions Clearly identifies security solutions and assumptions that consist of people, processes and technologies that relate to the risks. Covers all three requirements.
Constraints Clearly describes the linkage and constraints associated with solution
SDLC Tasks Clear and detailed SDLC tasks that logically leads to the proposed solutions
Prioritize Tasks Major tasks are clearly prioritized according their importance to mitigating the risks and issues found.
Define Resources Clearly defined people resources (by type) that support each task in the timeline.
Finds and Applies Knowledge
Use of Authoritative Sources Used at least 5 authoritative or scholarly sources in paper. No APA style errors in sources.
Citation of Sources All sources cited. No errors in citing material in paper.
Organization, Execution and Appearance
Formatting Prepared MS Word document, used consistent formatting, section subheadings, submitted one file, used instructor provided template, correct coversheet and separate reference page and meets minimum page count of 5 pages.
Grammar and Punctuation No grammar errors, use of first/second person, spelling or punctuation errors.


Get a 5 % discount on an order above $ 150
Use the following coupon code :
Module 3 Case
The use of ILAB


Category: Computer sciences and Information technology

Our Services:
Order a customized paper today!
Open chat
Hello, we are here to help with your assignments