Control objectives for information and related technology

Assignment Help Basic Computer Science
Reference no: EM132369132

Introduction

Ask any IT manager about the challenges in conveying IT risks in terms of business risks, or about translating business goals into IT goals. It's a common difficulty, as the worlds of business and IT do not inherently align. This lack of alignment was unresolved until ISACA developed a framework called COBIT, first released in 1996. ISACA is an IT professionals' association centered on auditing and IT governance. This lab will focus on the COBIT framework. The lab uses the latest two versions: COBIT 4.1, which is currently the most implemented version, and COBIT 5, which is the latest version released in June 2012.

Because COBIT 4.1 is freely available at the time of this writing, the lab uses this version to present handling of risk management. Presentation is done making use of a set of COBIT control objectives called P09. COBIT P09's purpose is to guide the scope of risk management for an IT infrastructure. The COBIT P09 risk management controls help organize the identified risks, threats, and vulnerabilities, enabling you to manage and remediate them. This lab will also present how COBIT shifts from the term "control objectives" to a set of principles and enablers in version 5.

In this lab, you will define COBIT P09, you will describe COBIT P09's six control objectives, you will explain how the threats and vulnerabilities align to the definition for the assessment and management of risks, and you will use COBIT P09 to determine the scope of risk management for an IT infrastructure.

Learning Objectives

Upon completing this lab, you will be able to:

Define what COBIT (Control Objectives for Information and related Technology) P09 risk management is for an IT infrastructure.

Describe COBIT P09's six control objectives that are used as benchmarks for IT risk assessment and risk management.

Explain how threats and vulnerabilities align to the COBIT P09 risk management definition for the assessment and management of IT risks.

Use the COBIT P09 controls as a guide to define the scope of risk management for an IT infrastructure.

Apply the COBIT P09 controls to help organize the identified IT risks, threats, and vulnerabilities.

Deliverables

Upon completion of this lab, you are required to provide the following deliverables to your instructor:

1. Lab Report file;

2. Lab Assessments file.

Attachment:- Threats and Vulnerabilities in IT Infrastructure.rar

Reference no: EM132369132

Questions Cloud

Describe the OSI Network Model layers : List and describe the OSI Network Model layers. Describe what is SQL injection and what is/are the countermeasure to prevent SQL injection?
Any similarities or common traits with snowden or manning : Human threats are the most difficult to control and/or predict. Any similarities or common traits with Snowden or Manning. When this occurred.
How would you go about determining accuracy : How would you ensure the highest level of accuracy with your simulation and how would you go about determining accuracy?
Essence of formulating your brief : The essence of "Formulating Your Brief" is to "identify the context in which your work will be undertaken and then define its aims.
Control objectives for information and related technology : Define what COBIT (Control Objectives for Information and related Technology) P09 risk management is for an IT infrastructure.
How e-commerce companies address privacy in its policies : How e-commerce companies address privacy in its policies? The dissertation process by creating sentence outline for a research paper.
Discuss and identify specific project management techniques : Discuss and identify specific project management techniques. Evaluate testing, reliability, and protect quality data to ensure project success.
Human threats are the most difficult to control and predict : Human Threats Are The Most Difficult To Control And/Or Predict. Role and history of the person with the compromised organization
Influence the selection of access control software-hardware : What are the factors that influence the selection of access control software and/ or hardware? Discuss all aspects of access control systems.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write functions and steps for various window applications

Write down the functions and steps involved in various window applications. What is mail merge? Enumerate the steps involved in mail merge.

  Analysis of political currents in central and south america

After an analysis of political currents in Central and South America, you conclude that future coffee prices will be lower than currently indicated by futures

  Disaster recovery plan for an organization

Disaster Recovery Plan (DRP) for an organization. Please include your references also.

  Computer is slow and they need a new one

A user reports to you their computer is slow and they need a new one. They have a project due tomorrow and the slow computer may cause them to miss.

  Discuss the generalized compilation-time

16.9 G. Cardarin and M. Melkan off. "Proving Consistency of Database Transactions." Proc. 5th International Conference on Very Large Data Bases, Rio de Janeiro.

  Displacement of the spring-mass equilibrium

In an experiment, a 5-kg mass is suspended from a spring. The displacement of the spring-mass equilibrium from the spring equilibrium is measured to be 75 cm.

  Transmission over landlines as well as wireless

What would be the impact on individual's users, businesses, and government if Internet providers switched to a tiered service model for transmission

  Programs to implement ef?ciently

In general, this problem is very hard, and no ef?cient solution is known. Write programs to implement ef?ciently the following approximation strategies:

  Concept of a numerical palindrome

For this assignment your job is to create two class application that examines the concept of a numerical palindrome.

  Single-source shortest path problem for graphs

Develop a linear-time (i.e., O(m)-time) algorithm that solves the Single-Source Shortest Path problem for graphs whose edge weights are positive integers

  The information security blueprint is the basis for design

The Information Security Blueprint is the basis for the design, selection, and implementation of all security program elements.

  What three roles does money play in the economy

What three roles does money play in the economy? What is the di?erence between commodity money and fiat money? Please provide short answers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd