Primary Task Response: Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas:

Some information technology (IT) security requirements are almost considered commodities. Their support is handled in standard ways. Virus updating and e-mail support are examples, and the support for these services is often a candidate for outsourced work. In addition to justifying outsourced work, the type of outsourcing, (e.g., on-site or off-shore) must be studied.

  • Identify 3 types of outsourcing that are often used within IT.
    • For each, provide an example of IT work with rationalization of trade-offs by listing pros and cons.
  • Please use by the following format for your answers:
    • (Outsourcing_type)
    • IT_example:
    • Pros:
    • Cons:
  • State a general summary of the proposed use of outsourcing in IT for the project.
  • Compare and contrast role differences in the IT organization between an in-house strategy and an outsourced strategy for IT services.
    • Some roles, such as development and support service needs, may become unncessary, but new roles may arise with needs to plan, manage, and monitor outsourced work.
    • Identify role changes with regard to impacts from outsourcing.
  • Predict the business impact from each change.

Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:

  • What did you learn from your classmate’s posting?
  • What additional questions do you have after reading the posting?
  • What clarification do you need regarding the posting?
  • What differences or similarities do you see between your posting and other classmates’ postings?


Continue development of the Comprehensive Security Management Plan. This second section will be 2–3 pages to assess security business requirements. After a summary of the capability maturity model integration (CMMI), the process area (PA) of the CMMI model that is considered to have the highest importance to the project security requirements will be identified and defended. The PA, its goals, the specific practices, and the generic practices will be part of the justification.

The project deliverables are the following:

  • Update the Comprehensive Security Management Plan document title page with the new date.
  • Update the previously completed sections based on the instructor’s feedback.
  • Use the subtitle “Security Business Requirements.”
    • Summarize the CMMI.
    • Identify and defend the PA of the CMMI model for your chosen organization.
      • The PA, its goals, the specific practices, and the generic practices will be part of the justification.
  • Be sure to update your table of contents before submission.
  • Name the document “yourname_CS654_IP2.doc.”

"Looking for a Similar Assignment? Order now and Get a Discount!

Place New Order
It's Free, Fast & Safe

"Looking for a Similar Assignment? Order now and Get a Discount!

Hey, wait!You Don't want to miss this offer!

Before you go, let us offer you a 20% discount coupon for your next purchase.