Audit program for application systems for auditing

Assignment Help Computer Network Security
Reference no: EM131076337 , Length:

Question:

Information Assurance Compliance with Government Regulations

Review the "Audit Program for Application Systems for Auditing" presented in Appendix B of the Cascarino text. Also, read the following articles, located in the course shell:

. "A Framework for Health Care Information Assurance and Policy Compliance" by Sherrie Drye Cannoy and A.F. Salam

. "Information Assurance and Corporate Strategy" by Elspeth McFadzean, Jean-Noël Ezingeard, and David Birchall

. "Five Most Common Cybersecurity Mistakes" from the Toledo Business Journal

Submission Requirements

Case Study Plan

Write a six to ten (6-10) page paper in which you:

1. Discuss which employees and organizations have a deeper-level of information assurance (IA) policy compliance.

2. Examine the factors that increased the individual's level of propensity for compliance.

3. Determine the internal and external factors affecting IA policy compliance.

4. Ascertain which of the organizational requirements poses difficulty in adopting technical features to enhance security policy.

5. Discuss factors related to IA and policy compliance that are affected by government regulations.

6. Suggest a framework that could be used to address the issues described in the "Five Most Common Cybersecurity Mistakes" article, based on the "Audit Program for Application Systems for Auditing".

7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Verified Expert

Information assurance and compliance is broad topic of discussion with several issues to address to comprehend it in totality. The current discussion is about the factors responsible for the individual propensity towards IA, external and internal factors responsible, organizations and employees more concerned of IA, A frame work for IA compliance etc.

Reference no: EM131076337

Questions Cloud

State independence with insurance refers to : State independence with insurance refers to
Supreme court in hobby lobby and citizens united : Do you agree with the outcome of theH obby Lobbycase? Discuss what rights if any were given to businesses by the Supreme Court in Hobby Lobby and Citizens United. Explain how these two decisions may affect the rights of both business owners and of em..
What would be the equivalent net savings per machine hour : You have purchased a machine costing $30000. The machine will be used for 2 years, and at the end of this time, its salvage value is expected to be $18000. The machine will be used for 6,000 hours during the first year and 8000 during the second year..
Discuss the process of the medicalization : After you view the film, One Flew Over the Cuckoo’s Nest, respond to the following two questions: 1. Labeling theory refers to the idea that deviance and conformity result not so much from what people do as from how others respond to those actions. D..
Audit program for application systems for auditing : Discuss which employees and organizations have a deeper-level of information assurance (IA) policy compliance and examine the factors that increased the individual's level of propensity for compliance.
Define a class to represent a node in a doubly linked chain : In a doubly linked chain, each node can point to the previous node as well as to the next node. Figure 4-9 shows a doubly linked chain and its head pointer. Define a class to represent a node in a doubly linked chain.
All income in economy is either profit income or wage income : Firm C produces 1,000 pounds of cotton at a cost of 50 cents per pound. They sell all of the cotton to Firm S for 75 cents per pound. Firm S makes 1,000 t-shirts with the cotton for a total cost of $1.50 per t-shirt. There are no other firms in this ..
How long would it take giant tortoise to travel five meters : A giant tortoise can walk about 1/10 meter per second on land. A cooter turtle can walk about 1/2 per second on land. how long would it take a giant tortoise to travel five meters?
Case of managerial hubris : For this assignment, read the case study, "The 1920 Farrow's Bank Failure: A Case of Managerial Hubris." This case is located in the ABI/Inform Complete database found in the CSU Online Library (see reference below). Hollow, M. (2014). The 1920 Fa..

Reviews

Write a Review

Computer Network Security Questions & Answers

  What sorts of protection is provided by the bank

What sorts of protection is provided by the bank to ensure secure online banking? Justify why the bank would use these security measures.

  Improving critical infrastructure cybersecurity

Analyze the way in which CIP has or has not advanced between the releases of the DHS' NIPP and the NIST's Framework for Improving Critical Infrastructure Cybersecurity. Justify your response.

  Research in the area of information security awareness

1-2 page APA style paper summarizing research in the area of Information security awareness

  Describe the properties and usage of digital signatures

Describe the properties and usage of digital signatures. Evaluate digital signatures based on their legal ability to stand up in court

  What types of physical controls can be implemented

What types of physical controls can be implemented to protect the perimeter of a building

  What is ciphertext generated by encryption of character

A particular cipher is implemented by combining the ASCII representation of plaintext characters with pseudorandom bytes. What is the ciphertext (in binary form) generated by the encryption of the character D?

  Boot process for a windows machine

What is the boot process for a Windows machine switches through several different modes. What are they, and how do they impact security?

  Creates for system forensics investigators

Explain why you believe the trend of threats targeting large enterprises is rising and what you believe is the greatest tool these hackers have at their disposal. Provide a rationale.

  Explain what scalability means in kerberos

One of the strengths of Kerberos is its scalability. Explain what scalability means in Kerberos and how the Kerberos system facilitates scalability.

  Perform an attack against the cipher

Perform an attack against the cipher based on a letter frequency count: How many letters do you have to identify through a frequency count to recover the key? What is the cleartext?

  What firewall setup would provide the firm both flexibility

Which firewall technologies should be deployed to (a) secure the internet-facing web servers (b) to protect the link between the web servers and customer database (c) to protect the link between internal users and the customer database? Be sure to..

  Using vigene table to find key used to encrypt message

You were given the following plaintext and cipertext, and you are needed to find key used by them. plaintext: Using Vigene table, find key used by them to encrypt the message.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd