You are employed with Government Security Consultants, a subsid
2. Introduction
You are employed with Government Security Consultants, a subsidiary of Largo Corporation. As a member of IT security consultant team, one of your responsibilities is to ensure the security of assets as well as provide a secure environment for customers, partners and employees. You and the team play a key role in defining, implementing and maintaining the IT security strategy in organizations.
A government agency called the Bureau of Research and Intelligence (BRI) is tasked with gathering and analyzing information to support U.S. diplomats.
In a series of New York Times articles, BRI was exposed as being the victim of several security breaches. As a follow up, the United States Government Accountability Office (GAO) conducted a comprehensive review of the agency’s information security controls and identified numerous issues.
The head of the agency has contracted your company to conduct an IT security risk assessment on its operations. This risk assessment was determined to be necessary to address security gaps in the agency’s critical operational areas and to determine actions to close those gaps. It is also meant to ensure that the agency invests time and money in the right areas and does not waste resources. After conducting the assessment, you are to develop a final report that summarizes the findings and provides a set of recommendations. You are to convince the agency to implement your recommendations.
This learning activity focuses on IT security which is an overarching concern that involves practically all facets of an organization’s activities. You will learn about the key steps of preparing for and conducting a security risk assessment and how to present the findings to leaders and convince them into taking appropriate action.
Understanding security capabilities is basic to the core knowledge, skills, and abilities that IT personnel are expected to possess. Information security is a significant concern among every organization and it may spell success or failure of its mission. Effective IT professionals are expected to be up-to-date on trends in IT security, current threats and vulnerabilities, state-of-the-art security safeguards, and security policies and procedures. IT professionals must be able to communicate effectively (oral and written) to executive level management in a non-jargon, executive level manner that convincingly justifies the need to invest in IT security improvements. This learning demonstration is designed to strengthen these essential knowledge, skills, and abilities needed by IT professionals.
3. Steps to Completion
Your instructor will form the teams. Each member is expected to contribute to the team agreement which documents the members’ contact information and sets goals and expectations for the team.
1) Review the Setting and Situation
The primary mission of the Bureau of Research and Intelligence (BRI) is to provide multiple-source intelligence to American diplomats. It must ensure that intelligence activities are consistent with U.S. foreign policy and kept totally confidential. BRI has intelligence analysts who understand U.S. foreign policy concerns as well as the type of information needed by diplomats.
The agency is in a dynamic environment in which events affecting foreign policy occur every day. Also, technology is rapidly changing and therefore new types of security opportunities and threats are emerging which may impact the agency.
Due to Congressional budget restrictions, BRI is forced to be selective in the type of security measures that it will implement. Prioritization of proposed security programs and controls based on a sound risk assessment procedure is necessary for this environment.
The following incidents involving BRI’s systems occurred and reported in the New York Times and other media outlets:
- • BRI’s network had been compromised by nation-state-sponsored attackers and that attacks are still continuing. It is believed that the attackers accessed the intelligence data used to support U.S. diplomats.
- • The chief of the bureau used his personal e-mail system for both official business purposes and for his own individual use.
- • A software defect in BRI’s human resource system – a web application – improperly allowed users to view the personal information of all BRI employees including social security numbers, birthdates, addresses, and bank account numbers (for direct deposit of their paychecks). After the breach, evidence was accidently destroyed so there was no determination of the cause of the incident or of its attackers.
- • A teleworker brought home a laptop containing classified intelligence information. It was stolen during a burglary and never recovered.
- • A disgruntled employee of a contractor for BRI disclosed classified documents through the media. He provided the media with, among other things, confidential correspondence between U.S. diplomats and the President that were very revealing.
- • Malware had infected all of the computers in several foreign embassies causing public embarrassment, security risks for personnel and financial losses to individuals, businesses and government agencies including foreign entities.
These reports prompted the U.S. Government Accountability Office to conduct a comprehensive review of BRI’s information security posture. Using standards and guidance provided by the National Institute of Standards and Technology and other parties, they had the following findings:
Identification and Authentication Controls
- • Controls over the length of passwords for certain network infrastructure devices were set to less than eight characters.
• User account passwords had no expiration dates.
• Passwords are the sole means for authentication.
Authorization Controls
- • BRI allowed users to have excessive privileges to the intelligence databases. Specifically, BRI did not appropriately limit the ability of users to enter commands using the user interface. As a result, users could access or change the intelligence data.
- • BRI did not appropriately configure Oracle databases running on a server that supported multiple applications. The agency configured multiple databases operating on a server to run under one account. As a result, any administrator with access to the account would have access to all of these databases; potentially exceeding his/her job duties.
- • At least twenty user accounts were active on an application’s database, although they had been requested for removal in BRI’s access request and approval system.
Data Security
- • BRI does not use any type of data encryption for data-at-rest but protects data-in-transit using VPN.
- • A division data manager can independently control all key aspects of the processing of confidential data collected through intelligence activities.
- • One employee was able to derive classified information by “aggregating” unclassified databases.
- • Hackers infiltrated transactional data located in a single repository and went ahead and corrupted it.
System Security
- • Wireless systems use the Wired Equivalent Privacy (WEP) standard for ensuring secure transmission of data.
- • The agency permitted the “Bring Your Own Device” (BYOD) concept and therefore users can utilize their personal mobile devices to connect to the agency network freely.
- • In the event of a network failure due to hacking, the data center manager has his recovery plan but has not shared it with anyone in or out of the center. He was not aware of any requirement to report incidents outside of the agency.
- • There has never been any testing of the security controls in the agency.
- • Processes for the servers have not been documented, but in the minds of the system managers.
- • Patching of key databases and system components has not been a priority. Patching systems have either been late or not performed at all. Managers explained that it takes time and effort to test patches on its applications.
- • Scanning devices connected to the network for possible security vulnerabilities are done only when the devices are returned to inventory for future use.
- • System developers involved with financial systems are allowed to develop code and access production code.
Physical Security
- • An unauthorized personnel was observed “tailgating” or closely following an official employee while entering a secure data center.
- • The monthly review process at a data center failed to identify a BI employee who had separated from BRI and did not result in the removal of her access privileges. She was still able to access restricted areas for at least three months after her separation.
End User Security
- • Users even in restricted areas are allowed to use social media such as Facebook. The argument used is that is part of the public outreach efforts of the agency.
- • Users receive a 5-minute briefing on security as part of their orientation session that occurs typically on their first day of work. There is no other mention of security during the course of employment.
- • Users are allowed to use public clouds such as Dropbox, Box, and Google Drive to store their data.
- • BRI has not performed continual background investigations on employees who operate its intelligence applications (one investigation is conducted upon initial employment).
- • There is no policy regarding the handling of classified information.
An internal audit report indicated that the organization needed several security programs including a security awareness and training program, a privacy protection program and a business continuity/disaster recovery programs. These programs will need special attention.
2) Examine Background Resources
This learning demonstration focuses on the National Institute of Standards and Technology's (NIST) “Guide for Conducting Risk Assessments”
(http://csrc.nist.gov/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf). See Pg. 23 to view the description of the risk management process.
Throughout this learning activity, feel free to use other references such as:
Other NIST publications (http://csrc.nist.gov/publications/PubsSPs.html),
SANS Reading Room (http://www.sans.org/reading-room/),
US-CERT (https://www.us-cert.gov/security-publications),
CSO Magazine (http://www.csoonline.com/),
Information Security Magazine (http://www.infosecurity-magazine.com/white-papers/),
Homeland Security News Wire (http://www.homelandsecuritynewswire.com/topics/cybersecurity)
Other useful references on security risk management include: https://books.google.com/books?id=cW1ytnWjObYC&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false
https://books.google.com/books?id=FJFCrP8vVZcC&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false
3) Prepare the Risk Assessment Plan
Using the NIST report as your guide, address the following items:
- • Purpose of the assessment,
- • Scope of the assessment,
- • Assumptions and constraints, and
- • Selected risk model and analytical approach to be used.
Document your above analysis in the “Interim Risk Assessment Planning Report.” (An interim report will be consolidated to a final deliverable in a later step.)
All interim reports should be at least 500 words long and include at least five references for each report. These reports will eventually be presented to management for their review.
4) Conduct the Assessment
Again, use the NIST report to address the following:
1) Identify threat sources and events 2) Identify vulnerabilities and predisposing conditions 3) Determine likelihood of occurrence 4) Determine magnitude of impact 5) Determine risk
You are free to make assumptions but be sure to state them in your findings.
In determining risk, include the assessment tables reflect BRI’s risk levels. Refer to Appendix I. on risk determination in Special Publication 800-30.
Document your analysis from this step in the “Interim Risk Assessment Findings Report.” Be sure to include the final risk evaluations in this report.
5) Identify Needed Controls and Programs
Research and specify security controls needed to close the security gaps in BRI.
Also, be sure to include a description of the following programs for securing BRI:
- • Security Awareness and Training Program (i.e., communications to employees regarding security)
- • Privacy Protection Program
- • Business Continuity/Disaster Recovery Program
You should justify the need for the agency to invest in your recommendations.
Document your findings and recommendations from this step in the “Interim Security Recommendations Report.”
6) Communicate the Overall Findings and Recommendations
Integrate of your earlier interim reports into a final management report. Be sure to address:
- • Summary of the Current Security Situation at BRI (from Step 1)
- • Risk Assessment Methodology (from Step 2)
- • Risk Assessment Plan (from Step 3)
- • Risk Assessment Findings (from Step 4)
- • Σεχυριτψ Ρεχομμενδατιονσ Ρεπορτ (φρομ Στεπ 5)
- • Χονχλυσιονσ
Also provide a presentation to management. The presentation should consist of 15-20 slides. It should include audio narration (directions are found at: https://support.office.com/en-au/article/Add-narration-to-a-presentation-0b9502c6-5f6c-40ae-b1e7-e47d8741161c). The narration should also be captured in the slide notes.
Prepare a peer evaluation report.
4. Deliverables
- • Final Management report (as described in Step 6)
- • PowerPoint Presentation
Except for the presentation, combine all of the files into one Word document. Provide an abstract, introduction, table of contents and conclusion in this one document.
Title your files using this protocol: GroupNumber_G-2_AssignmentName_Date.
In lieu of submitting the presentation, the team leader may provide a link to the presentation file.
NOTE: At the end of the project, each member of the team should email a completed Peer Evaluation form to your instructor.
Ross, R. (2014). Security and privacy controls for federal information systems and organizations. NIST Special Publication 800-53. Retrieved from http://dx.doi.org/10.6028/NIST.SP.800-53r4
Swanson, M., Wohl, A., Pope, L., Grance, T., Hash, J. & Thomas, R. (2002). Contingency planning guide for information technology systems. NIST Special Publication 800-34. Retrieved from http://ithandbook.ffiec.gov/media/22151/ex_nist_sp_800_34.pdf
Wilson, M. & Hash, J. (2003). Building an information technology security awareness and training program. NIST Special Publication 800-50. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-50/NIST-SP800-50.pdf
1
ITEC 610 PROJECT DESCRIPTIONS
(If you download this file, use Ctrl+Click on the links below to access the specific project.)
INDIVIDUAL PROJECTS
I-1: Enterprise Architecture Plan (Page 3)
I-2: Technology Management Plan (Page 10)
I-3: Technology Innovation Project (Page 17)
GROUP PROJECTS
G-1: Infrastructure Modernization Review (Page 24)
G-2: IT Security Risk Assessment (Page 30)
G-3: Health Information Technology Architecture (Page 38)
2
Individual Projects
3
Individual Project I-1
1. Title
Enterprise Architecture Plan
2. Introduction
Largo Corporation is a major multinational conglomerate corporation which specializes in a wide array
of products and services. These products and services include healthcare, finance, retail, government
services, and many more. The annual revenue is about $750 million and it has about 1,000 employees.
The parent company is headquartered in Largo, Maryland and its subsidiaries are located throughout
the United States.
The mission of the corporation is to bring the best products and services to people and businesses
throughout the world so they can then realize their full potential.
The corporate vision guides every aspect of their business to achieve sustainable, quality growth:
• Productivity: Be a highly effective, lean and fast-moving organization.
• People: Be a great place to work where people are inspired to achieve their maximum potential.
• Partners: Nurture a winning network of customers and suppliers, together we create mutual,
enduring value.
• Responsible: Be a responsible citizen that makes a difference through ethical behavior.
• Revenue: Maximize long-term return while being mindful of our overall responsibilities.
The company’s culture is reflected in their corporate values:
• Leadership: Courage to shape a better future.
• Collaboration: Leverage collective intelligence.
• Accountability: Own up to your responsibility.
• Passion: Committed to excellence.
• Diversity: Provide new perspectives into our business.
• Quality: We will want quality as part of our brand.
The corporation consists of the parent company and the following subsidiaries:
• Healthcare – Suburban Independent Clinic, Inc. (medical services)
• Finance – Largo Capital (financial services)
• Retail – Rustic Americana (arts and crafts), Super-Mart (office products)
• Government Services – Government Security Consultants (information security)
• Automotive – New Breed (electric cars)
• Systems Integration – Solutions Delivery, Inc. (communications)
4
• Media Design – Largo Media (website and app design)
The organization is headed by CEO Tara Johnson who completed her Master’s degree at UMUC and
eager to make worthwhile improvements to the corporation. She rose through the ranks of Largo
Corporation starting with systems integration, then retail and her last position before becoming CEO
was in finance.
The corporation is in a highly competitive environment so the CEO wants savvy employees at many
levels to make wise judgments and take an aggressive approach and deliver results towards improving
the bottom line yet maintaining corporate social responsibility.
Corporate Issues Ms. Johnson is aware of the many enterprise wide problems Largo Corporation and its subsidiaries are facing which include:
• The complexity of IT is constantly increasing
• Many disparate systems do not interoperate among the parent company and the subsidiaries and among the business units
• Many duplicate systems across different business units which perform the same function
• Each part of the organization has their own unique technology standards
• It is a major challenge to integrate technology into the daily operations of the organization
Because of these problems, IT systems in the corporation often failed to meet organizational goals and objectives. A Potential Solution A few months ago, Ms. Johnson attended a symposium for CEOs and other senior executives and learned about enterprise architecture and how it can enable business-IT alignment and agility. Upon her return, she floated the idea with the board of directors, her direct reports and vetted the idea with IT Operations head Mr. Sculley. With strong support from the board and Mr. Sculley, Ms. Johnson created an enterprise architect position reporting directly to her with dotted line reporting to all area heads. You have been handpicked to serve as the new Chief Enterprise Architect for Largo Corporation. Your assignment is to craft an enterprise architecture vision and explain how the vision enables business goals. Among other things, you need to justify the implementation of an enterprise architecture at Largo Corporation. According to the U.S. Government Accountability Office, “an enterprise architecture (EA) is an integral part of the IT investment management process. An EA provides a clear and comprehensive picture of the structure of an entity. This picture consists of snapshots of its current and proposed technical environments, and a roadmap for transitioning from the current to the target environment. When properly managed, an EA can help optimize the relationships among an organization's business operations and the IT infrastructure and applications supporting them.”
5
You will learn about the EA concept, various EA frameworks and apply one to the Largo Corporation. You will learn how to migrate the corporation to a well-defined enterprise architecture vision. As part of the migration effort you will need to identify the governance structure for the architecture. As an enterprise architect, your ability to understand and apply enterprise architecture principles and methodology enables the organization to achieve a business-IT aligned, agile and scalable IT asset. This in turn enables the organization to leverage IT as a competitive strategy to respond quickly to changing market conditions in a global economy. Additionally, you must be able to communicate effectively (oral and written) to executive level management in a non-jargon, executive level manner. This learning demonstration is designed to strengthen these essential knowledge, skills, and abilities needed by enterprise architects.
3. Steps to Completion
1) Understand the Enterprise Architecture Concept
You need to first understand the foundational concepts of an EA including what it is and why it is
needed. Conduct research to gain an understanding of the concept and determine how it might apply to
Largo Corporation.
An informative reference book is “An Introduction to Enterprise Architecture: Third Edition” by Scott A.
Bernard (start at Pg. 29).
https://books.google.com/books?id=OkNMFI3_L_YC&printsec=frontcover&dq=enterprise+architecture
&hl=en&sa=X&ei=WttEVc7mOoWhNsSMgMgG&ved=0CDkQ6AEwAQ#v=onepage&q=enterprise%20arch
itecture&f=false
The role of an enterprise architect is captured well in this article:
https://www.cio.com/article/2438311/enterprise-architecture/enterprise-architect.html
Deliverable: Prepare an interim report for corporate executives explaining the enterprise architecture
concept and discuss its applicability to Largo Corporation. Minimum 400 words and include at least 3
references. (An interim report will be consolidated to a final deliverable in a later step.)
2) Review EA Frameworks
Research various enterprise architecture frameworks. Examples include The Open Group Architecture
Framework (TOGAF), the Federal Enterprise Architecture (FEA), and the Zachman Framework. Compare
and contrast these frameworks. A good starting point is this article by Roger Sessions:
http://www3.cis.gsu.edu/dtruex/courses/CIS8090/2013Articles/A%20Comparison%20of%20the%20Top
%20Four%20Enterprise-Architecture%20Methodologies.html
A variety of frameworks are also mentioned in this source (parting on Page 11):
https://books.google.com/books?id=Fs5bMNBXLEMC&printsec=frontcover&dq=enterprise+architecture
6
+frameworks&hl=en&sa=X&ei=fdxEVZ32HYqXNtitgXg&ved=0CDYQ6AEwAQ#v=onepage&q=enterprise%
20architecture%20frameworks&f=false
Deliverable: Compare and contrast at four different major architectural frameworks based on various
attributes and report your findings in a summary table. Include brief descriptions and sources of your
information. Include at least 3 references.
3) Understand the TOGAF Framework
For this project we will use the TODAF architectural framework described starting at the Introduction
(http://pubs.opengroup.org/architecture/togaf9-doc/arch/chap01.html). Use the “Next>>>” link (upper
right hand corner and lower right hand corner) to advance to the next topic “Core Concepts.” Explore
this resource.
Next read “TOGAF as an Enterprise Architecture Framework”:
http://pubs.opengroup.org/architecture/togaf8-doc/arch/chap02.html
4) Execute the preliminary phase of the architecture development process.
Start by reviewing the Architecture Development Method (ADM) beginning at:
(http://pubs.opengroup.org/architecture/togaf8-doc/arch/chap03.html)
Walk through the Preliminary Phase (http://pubs.opengroup.org/architecture/togaf8-
doc/arch/chap04.html).
Deliverables for this step include: (a) Define the architectural framework in the form of a diagram
specific to Largo. (b) Identify at architectural principles you feel are applicable to Largo Corporation. (c)
Create the future vision diagram for the company. Details on each deliverable are defined below.
(a) The framework diagram needs to be organization-specific. This architecture vision should
take into account the “corporate issues” identified in the Introduction of this learning activity.
You are free to make assumptions and hypothetical scenarios behind your architectural vision.
Examples of frameworks can be found at: http://pubs.opengroup.org/architecture/togaf8-
doc/arch/chap37.html
(b) Provide architecture principles for the following domains: business, data, application, and
technology for Largo Corporation. Examples can be found at:
http://pubs.opengroup.org/architecture/togaf8-doc/arch/chap29.html#tag_30_06
Your principles should try to address the problems identified in the Introduction section of this
learning activity.
Identify at least 3 principles for each domain and explain its applicability to Largo Corporation.
7
To document your principles, you may use the template at:
https://www2.opengroup.org/ogsys/jsp/publications/PublicationDetails.jsp?catalogno=i
093 (You will need to set up an account if you have not previously). Download the zip
file and open: TOGAF_9_Templates > Deliverables > Architecture Principles and open
the Word document.
(c) To define the future vision, you can create a solution concept or a value chain diagram. This
is an important step that articulates your perspective of the future architecture of Largo
Corporation. Include an explanation for your vision including why it is appropriate for the
company.
Templates that you may use are downloadable from:
https://www2.opengroup.org/ogsys/jsp/publications/PublicationDetails.jsp?catalogno=i093
(You will need to set up an account). Download the zip file and open: TOGAF_9_Templates >
Artifacts > Core Diagrams > Architecture Vision and open the two PowerPoint presentations.
5) Prepare a Migration Plan
Research migration planning resources such as: http://pubs.opengroup.org/architecture/togaf8-
doc/arch/chap12.html
Another way to articulate the migration plan is through an Enterprise Direction Diagram – an example is
shown at:
https://www.flickr.com/photos/[email protected]/3642403169/
Another example is Slide 23 in this slide presentation:
https://www.slideshare.net/wintonjkt/enterprise-architecture-for-dummies-togaf-9-enterprise-
architecture-overview
Deliverable: Outline a plan and include an Enterprise Direction Diagram or similar graphic to address
migrating to the target architecture as defined in the architectural vision. In other words, this plan
should address how the organization will move from the “as-is” to the “to-be” state.
Minimum length is 400 words.
6) Define the Architecture Governance Process and Structure
Architecture governance is defined as the set of activities an organization uses to manage and control its
enterprise architectures and other architectures. This process institutionalizes decision making and
ensures accountability. More at: http://pubs.opengroup.org/architecture/togaf8-doc/arch/chap26.html
8
Research this topic and for the Largo Corporation enterprise architecture, define the “who”, “what” and
“where” associated with this process. For example, who is responsible for governance (e.g., establish an
architectural governance board?), what will be managed and controlled and where in the organization
will controls be applied.
Deliverable: Summarize your findings in an interim architectural governance document. Minimum
length is 400 words.
7) Communicate the Architectural Vision.
The final deliverable is a narrated PowerPoint presentation that summarizes all of the key findings and
recommendations from the previous steps. The target audience is the CEO and other executives in the
organization. Be sure to address the following information:
– Introduction – Describe the issues facing the corporation then define an enterprise architecture
and explain why it is needed for Largo Corporation. Provide a short summary of the architectural
frameworks and explain why TOGAF is applicable to Largo Corporation. (From Steps 1, 2)
– Architecture Vision: Describe the architectural framework, architectural principles and future
vision specific to the corporation. (From Step 4)
– Migration Plan: Outline the steps needed to transition from the current state to the desired state
(From Step 5)
– Architectural governance structure: Provide highlights from the architectural governance
document. (From Step 6)
The presentation should consist of 10-15 slides. It should include audio narration (directions are found
at: https://support.office.com/en-au/article/Add-narration-to-a-presentation-0b9502c6-5f6c-40ae-
b1e7-e47d8741161c). The narration should also be captured in the slide notes.
4. Deliverables
1) Interim Report on the EA concept
2) Summary matrix on architectural frameworks
3) Architectural framework for Largo Corporation
4) Architectural principles
5) Future vision diagram
6) Migration plan
7) Architecture governance process and structure
8) Architectural vision final presentation
Except for the presentation, combine all of the files into one Word document. Provide an abstract,
introduction, table of contents and conclusion in this one document.
9
Title your files using this protocol: LastName_FirstName_I-1_AssignmentName_Date.
In lieu of submitting the presentation, you may provide a link to your presentation file.
5. Rubrics
Criteria Weight
Score
Define the enterprise architecture concept and identify key architectural
frameworks used in practice
20
Formulate an architectural framework for a given organization and
identify applicable architectural principles relevant for that organization
20
Design and develop an enterprise architecture vision that
accommodates components of the enterprise
30
Create a migration strategy in transforming an enterprise architecture 10
Evaluate the role of architectural governance in managing enterprise
systems
10
Exhibit communication skills 10
Total 100
10
Individual Project I-2
1. Title
Technology Management Plan
2. Introduction
You have been selected to be the acting CIO for a subsidiary of Largo Corporation called Rustic
Americana. Its primary products include arts and crafts that reflect the history, geography, folklore and
cultural heritage of the United States. It specializes in direct marketing and sales through its call center.
Sales are through a web store, a brick and mortar store, and a direct mail catalogue. All services are
housed under one roof that include warehousing, order fulfillment, shipping, corporate management
and operations, and the call center. The success of the company hinges on its eye-catching direct mail
catalogue and the unique product line.
Unfortunately, annual sales have declined over the years due largely due to internal issues. The previous
CIO was terminated some say due to incompetence primarily related to the underperforming call center.
In addition, speculation swirled around the activities of the CIO. He was often absent from the building.
He secluded himself behind the closed door of his office. Associated rumors mounted, and it was
believed that he was running a consulting business on company time. When the Rustic Americana CEO
asked him about this during a formal review, the CIO answered that it was a weekend hobby that kept
him abreast of emerging technologies. The CEO asked him if one of their competitors was a client and he
vehemently denied the accusation. She was certain that the CIO was not being entirely truthful wit
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.