Which features or factors of each methodology are most important and relevant to Fullsoft?

– Which features or factors of each methodology are most important and relevant to Fullsoft?
-Which methodology is easier to follow?
– Which methodology appears to require fewer resources, such as time and staff, but still provides for a thorough assessment?
Tasks
-Create a high-level plan to perform a gap analysis.
-Review the following two risk assessment methodologies:
– NIST SP 800-30 rev. 1, Guide for Conducting Risk Assessments (formerly titled ” Risk Management Guide for Information Technology Systems”)
Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE), Allegro
version
-Create a report that includes the gap analysis plan, a brief description of each risk assessment methodology, a recommendation for which methodology Fullsoft should follow, and justification for your choice.
Required Resources Textbook for this course
Internet access
Additional websites for research
Submission Requirements Format:
Microsoft Word or compatible
Font: APA Format
Citation Style: APA Format
Submit in the Individual Project Part 2 Assignment
Name the document lastname-project-part-2
Length: 3–4 pages plus citation page
You are encouraged to respond creatively, but you must cite credible sources to support your work.
Self-Assessment Checklist
– I created a plan for performing a gap analysis of the IT environment.
-I evaluated and selected a risk assessment methodology.
-I summarized each methodology, recommended which methodology Fullsoft should follow, and provided justification for my choice.
-I conducted adequate independent research for this part of the project.
I followed the submission guidelines.

Textbook name: Fundamentals of Information Systems Security (4th edition) by David Kim and Michael G. Solomon

Last Completed Projects

topic title academic level Writer delivered