Interested in a PLAGIARISM-FREE paper based on these particular instructions?...with 100% confidentiality?

Order Now

Introduction & Scope AMCE Plumbing is a plumbing wholesaler located in southeastern Michigan that services Wayne and Macomb counties. ACME stocks roughly 400 different lines and delivers by truck on regular daily runs to customers. With 280 total employees, ACME is a relatively small local company and consequently their resources are extremely limited. The IT department is especially constrained with only 22 IT employees to support the central ordering service in Ferndale and five warehouses in Detroit. While executive management acknowledges “Safety and security are becoming very critical elements,” the ACME IT team has not had the manpower or knowledge needed to start implementing an appropriate information assurance program. Consequently, they have reached to the A+ expert consultants at Team KPMG to help kick start their security program. ———————— some of the sections of the project 1) Identify a very clearly defined scope for the project 2) Within the identified scope, outline the processes involved and all associated information / assets. 3) Prioritize the information / assets we want to protect. 4) Chose a threat model and identify all associated threats / risks. 5) Chose a strategic security framework (such as FIPS 200 / NIST 800-53 or CoBIT 6) Prioritize the threats / risks we want to mitigate and what risk we are willing

Introduction & Scope

AMCE Plumbing is a plumbing wholesaler located in southeastern Michigan that

services Wayne and Macomb counties. ACME stocks roughly 400 different lines and delivers

by truck on regular daily runs to customers. With 280 total employees, ACME is a relatively

small local company and consequently their resources are extremely limited. The IT department

is especially constrained with only 22 IT employees to support the central ordering service in

Ferndale and five warehouses in Detroit. While executive management acknowledges “Safety

and security are becoming very critical elements,” the ACME IT team has not had the manpower

or knowledge needed to start implementing an appropriate information assurance program.

Consequently, they have reached to the A+ expert consultants at Team KPMG to help kick start

their security program. ————————

some of the sections of the project 1) Identify a very clearly defined scope for the project 2) Within the identified scope, outline the processes involved and all associated information / assets. 3) Prioritize the information / assets we want to protect. 4) Chose a threat model and identify all associated threats / risks. 5) Chose a strategic security framework (such as FIPS 200 / NIST 800-53 or CoBIT 6) Prioritize the threats / risks we want to mitigate and what risk we are willing

Interested in a PLAGIARISM-FREE paper based on these particular instructions?...with 100% confidentiality?

Order Now