Creating audit plan to support business

Assignment Help Basic Computer Science
Reference no: EM132418707

Note: Chapter 5 of the required textbook may be helpful in the completion of the assignment.

The audit planning process directly affects the quality of the outcome. A proper plan ensures that resources are focused on the right areas and that potential problems are identified early. A successful audit first outlines the objectives of the audit, the procedures that will be followed, and the required resources.

Choose an organization you are familiar with and develop an eight page IT infrastructure audit for compliance in which you:

Define the following items for an organization you are familiar with:

Scope

Goals and objectives

Frequency of the audit

Duration of the audit

Identify the critical requirements of the audit for your chosen organization and explain why you consider them to be critical requirements.

Choose privacy laws that apply to the organization, and suggest who is responsible for privacy within the organization.

Develop a plan for assessing IT security for your chosen organization by conducting the following:

Risk management

Threat analysis

Vulnerability analysis

Risk assessment analysis

Explain how to obtain information, documentation, and resources for the audit.

Analyze how each of the seven (7) domains aligns within your chosen organization.

Align the appropriate goals and objectives from the audit plan to each domain and provide a rationale for your alignment.

Develop a plan that:

Examines the existence of relevant and appropriate security policies and procedures.

Verifies the existence of controls supporting the policies.

Verifies the effective implementation and ongoing monitoring of the controls.

Identify the critical security control points that must be verified throughout the IT infrastructure, and develop a plan that includes adequate controls to meet high-level defined control objectives within this organization.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

The specific course learning outcomes associated with this assignment are:

Describe the parameters required to conduct and report on IT infrastructure audit for organizational compliance.

Describe the components and basic requirements for creating an audit plan to support business and system considerations

Develop IT compliance audit plans

Use technology and information resources to research issues in security strategy and policy formation.

Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM132418707

Questions Cloud

Difference between symmetric and asymmetric encryption : Symmetric Encryption: It is the simplest kind of encryption that involves only one secret key to cipher and decipher information.
Network-based IDS provides no protection internal threats : Network-based IDS provides no protection against internal threats. When a "pass" rule is matched in Snort, no other rules are evaluated for the packet.
United States of America versus Ross Ulbricht : Using Microsoft Word document, discuss the case involving the United States of America versus Ross Ulbricht.
Wireless network reliability : Describe in your own words on the topic - "Wireless network reliability"
Creating audit plan to support business : Describe the components and basic requirements for creating an audit plan to support business and system considerations
Discuss how integration of Identity as a Service : Discuss how integration of Identity-as-a-Service (IDaaS) can improve authentication capabilities in your chosen organization.
Information security principle of least privilege : Once user is authenticated in organization's network that user is authorized to access certain data based on information security principle of least privilege
Project proposal to relevant audience interested : The presentation should describe your project proposal to a relevant audience interested in this topic.
Project to evaluate higher education student aid data : Define and execute a process to evaluate your data warehouse data for incompleteness, nulls, and the ability to provide consistent query data.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Can objectives always be identified and scheduled

How does a project manager determine how complex to make a program plan or how many schedules to include?

  Drawbacks of having several administrators

A true database administrator has all rights and permissions on a database. Discuss the drawbacks of having just one administrator or the drawbacks of having several administrators.

  Write pseudo code for an iterator

Your pseudo code must define the standard iterator functions open(), next(), and close(). Show what state information the iterator must maintain between calls.

  Decision was based in ethics and morality

Encouraging Ethical Conduct: Did Johnson openly acknowledge that his decision was based in ethics and morality?

  Show the actual row and column

Using odd 1, show the actual row and column that the data are send and received.

  What distinguishes money from other assets in the economy

What distinguishes money from other assets in the economy. What is commodity money and fiat money, and which kind we use.

  Tradeoff between the number of cache lines

Briefly explain the tradeoff between the number of cache lines and the size of each cache line.

  Advantages and disadvantages of mobile billing system

What are the advantages and disadvantages of mobile billing system?

  Analyze predictive sdlc versus adaptive sdlc

Analyze predictive SDLC versus adaptive SDLC. Ascertain at least two advantages and two disadvantages of each approach.

  Career planning and development

You are the Chief Human Resource Officer (CHRO) at your organization. As the CHRO, one of your primary roles is to be the workforce strategist. Your organization is planning to expand business operations to your neighboring state by opening an off..

  Write a function that uses read. fwf() to read 28 text table

Write a function that uses read. Fwf () to read the 28 text tables

  What is the total number of parent pointers

Devise a series of equivalence statements for a collection of sixteen items that yields a tree of height 5 when both the weighted union rule and path compression are used. What is the total number of parent pointers followed to perform this series..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd