IS4799 Information systems and Cyber-security
Capstone Project
August 26, 2013
Proprietary and confidential
REQUEST FOR PROPOSAL
-------------------------------------------------
-------------------------------------------------
Table of Contents
TEMPLATE CONTENTS 3
INTRODUCTION AND BACKGROUND 3
PURPOSE OF THE REQUEST FOR PROPOSAL 3
ADMINISTRATIVE 3
TECHNICAL CONTACT 3
CONTRACTUAL CONTACT 3
DUE DATES 3
SCHEDULE OF EVENTS 3
GUIDELINES FOR PROPOSAL PREPARATION 3
PROPOSAL SUBMISSION 3
DETAILED RESPONSE REQUIREMENTS 3
EXECUTIVE SUMMARY 3
SCOPE, APPROACH, AND METHODOLOGY 3
DELIVERABLES 3
PROJECT MANAGEMENT APPROACH 3
DETAILED AND ITEMIZED PRICING 3
APPENDIX: REFERENCES 3
APPENDIX: PROJECT TEAM STAFFING 3
APPENDIX: COMPANY OVERVIEW 3
EVALUATION FACTORS FOR AWARD 3
CRITERIA 3
SCOPE OF WORK 3
REQUIREMENTS 3
DELIVERABLES 3
INTRODUCTION AND BACKGROUND
PURPOSE OF THE REQUEST FOR PROPOSAL
The Firm is a security services provider. Our clients included organizations of various sizes, but most clients are state and federal government agencies that must demonstrate compliance with specific security-related regulations. Our firm was founded 2002, as a small corporation with only four employees. At that time, the firm’s focus was to provide database performance tuning and security services, including assessments, penetration tests, policy creation, and regulatory compliance assistance. The firm’s current annual gross sales are currently million in U.S. dollars.
The Firm is interested in conducting a security assessment that will allow it to:
* Gain a better understanding of potential corporate network vulnerabilities that may be visible from the Internet.
* Determine if the current wireless network is configured securely.
These activities are part of The Firm ongoing risk management program and are focused on identifying the risk level The Firm is currently exposed to so that an appropriate set