Assignment part 2 | CYB206 | National University


Project Part 2: Gap Analysis Plan and Risk Assessment Methodology


After the productive team meeting, Fullsoft’s chief technology officer (CTO) wants further analysis performed and a high-level plan created to mitigate future risks, threats, and vulnerabilities. As part of this request, you and your team members will create a plan for performing a gap analysis, and then research and select an appropriate risk assessment methodology to be used for future reviews of the Fullsoft IT environment.An IT gap analysis may be a formal investigation or an informal survey of an organization’s overall IT security. The first step of a gap analysis is to compose clear objectives and goals concerning an organization’s IT security. For each objective or goal, the person performing the analysis must gather information about the environment, determine the present status, and identify what must be changed to achieve goals. The analysis most often reveals gaps in security between “where you are” and “where you want to be.”Two popular risk assessment methodologies are NIST SP 800-30 revision 1, Guide for Conducting Risk Assessments, and Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE). Your focus will be on the OCTAVE Allegro version, which is a more concise version of OCTAVE. When reviewing the methodologies, consider the following:

  • Which features or factors of each methodology are most important and relevant to Fullsoft?
  • Which methodology is easier to follow?
  • Which methodology appears to require fewer resources, such as time and staff, but still provides for a thorough assessment?


  • Create a high-level plan to perform a gap analysis.
  • Review the following two risk assessment methodologies:
    • NIST SP 800-30 rev. 1, Guide for Conducting Risk Assessments (formerly titled ” Risk Management Guide for Information Technology Systems”)
    • Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE), Allegro version
  • Create a report that includes the gap analysis plan, a brief description of each risk assessment methodology, a recommendation for which methodology Fullsoft should follow, and justification for your choice.

Required Resources

  • Textbook for this course
  • Internet access
  • Additional websites for research

Submission Requirements

  • Format: Microsoft Word or compatible
  • Font: APA Format
  • Citation Style: APA Format
  • Submit in the Group Project Part 2Assignment
  • Name the document Group-project-part-2
  • Length: 5-6 pages plus citation page

You are encouraged to respond creatively, but you should cite credible sources to support your work.

Self-Assessment Checklist

  • I created a plan for performing a gap analysis of the IT environment.
  • I evaluated and selected a risk assessment methodology.
  • I summarized each methodology, recommended which methodology Fullsoft should follow, and provided justification for my choice.
  • I conducted adequate independent research for this part of the project.
  • I followed the submission guidelines.
Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Contact Us on WhatsApp

× How can I help you?