Part 2: Solution ProposalsYou now take the role of a cyber security firm who wants the business of the various organizations seeking help, and will respond to the RFPs from other groups with well-rese

Education Sector RFP Overview : We are Hope University and we want to help provide the students with a way to have the best possible experience that they can while attending. This, however, is not possible with the many issues that we are experiencing with security at our University and we want to provide the best. The objectives of this request for proposal is to make sure that our University is the most secure for our students and make sure that none of their infor mation can get stolen and be used for malicious purposes. For this reason we want to work with people that will ensure the safety of our students as well as the professors. There have been some problems with servers crashing, errors with logging in to both administrator and student accounts with both parties claiming that they knew that their information was correct and that it might be the result of their account getting hacked and we would like to reduce the risk of that. This ends up becoming an issue fo r us since this could lead to any third parties changing data to make it favorable or unfavorable for other people. We want only a select few to be able to access that certain information since most of it is classified and make sure that our servers are st able and won't be victim to any Denial of service attacks. Organization Overview : We are a university where students from different backgrounds and different nationalities study and research on different subjects. Most students in our university are trans fer students from different schools. Our university accepts students on the basis of their GPA and scholastic aptitude test. Our university was established in 1964 and every year our university security policies change. For example if we talk about 20 year s ago we could never imagine how cyber security policies are in today ’s day and age. We are the university where we communicate and do research in three different modes. Mostly we have in person sessions. But we also have asynchronous and synchronous sessi ons where people don ’t need to come to university. We have different cyber security policies for our university: 1. Network Security policy 2. Backup Policy 3. Remote access Policy 4. Physical security policy 5. Confidential Data policy 6. Guest Access Po licy 7. Virtual Private Network (VPN) 8. Email policy Technology Environment : Hope University currently uses around 100 Windows PC ’s and 100 MAC OS PC ’s, we also have tablets that the students can use as well as rentable laptops sitting at about 50 each. We also monitor our own internet and have to keep our servers running so we also have a room where we hold our routers to make sure there is a stable internet connection throughout the University. Cyber Security Assessment : The testing that would be allow ed is to check how vulnerable our databases are and see how easy it would be to get any information they want. Since we are also having trouble with our servers we want to test that as well and how easy it would be to send a denial of service our way and help prevent that. With the results of this testing it would be very beneficial to Hope University. Cost : To better provide for our students while they attend our University we have allocated approximately $1 million dollars to better our security and safe ty concerns. The $1 million dollars would be distributed to upgrading the University ’s servers, computer equipment like the PC ’s and rentable laptops to newer models and making sure there are enough for all of the students wheather or not they are asynchro nous or synchronous students. Upgrading and making sure the WiFi and Databases is secure and safe for our students and reaches all of the buildings and to prevent power outages. Upgrading all of the Firewall, software and system security so we won't be at risk for hackers and other attacks so our employees and students' important private information will remain secure. As a result of this budget an successful bidder will be engaging and managing their section of upgrading and ensuring our University is a sa fe and secure place for our employees and students. Evaluation : We will be paying close attention to the proposals and seeing what would benefit us in our security issues and make sure that they will be listening to all of our concerns and are as passion ate to help get rid of the aforementioned problems that are happening at our University.