Describe the control objective and the specific controls

Assignment Help Other Subject
Reference no: EM132445057

Assignment: You are part of a team selected by the Chief Information Officer (CIO) to perform a security audit for one of the companies explored in this course. Vampire Legends (Week 1)

• Cruisin' Fusion (Weeks 2- 3)

• Devil's Canyon (Weeks 4 - 5)

Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the results of your security audit based on the following audit process:

1. Potential Risk to be Reviewed: Describe the risk.

2. Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data.

3. Regulation and Compliance Issues: Analyze how regulations and compliance issues could impact the organization.

4. Provide a detailed analysis of regulations and compliance issues, beyond the simple explanation in score point two.

5. Regulation and Compliance Resources and Tools: Analyze what resources and/or tools are available to address regulations and compliance issues.

6. Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be more than one control that should be reviewed for a potential risk.

• Example: Determine whether anti-virus software is in use.

• Example: Determine whether virus signatures are periodically updated.

• Example: Determine whether periodic virus scans are performed.

7. Provide a detailed analysis of the resources and/or tools available, beyond the simple explanation in score point two.

8. IT Security - Processes and Methods: Differentiate between the various processes and methods involved in management of IT security resources.

9. Review the various options available to address those processes and methods previously explained, and which ones might be feasible.

10. IT Security - Measures: Analyze the various security measures that could be taken within the organization.

11. Demonstrate a detailed understanding of what the alternatives are to approach security, how much security is needed, different methods to employ, etc.

12. Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level).

• Example: 100% of servers and PCs have virus software installed.

• Example: 100% of the virus software installed is set to automatically update, including virus signatures.

• Example: 100% of the virus software installed is set to automatically perform a scan at least weekly.

Include a 1/2- to 1-page executive summary to support your presentation. Include appropriate references.

Reference no: EM132445057

Questions Cloud

Social responsibility of business : In "The Social Responsibility of Business Is to Increase its Profits," what economic idea is the author alluding to by stating that the social responsibility
How does china maintain an undervalued currency : Why would China want its own currency to be undervalued relative to the U.S. dollar? How does China maintain an undervalued currency?
Critical thinking-schoology : Can persistent U.S. deficits in the current and payments accounts be adjusted without bringing about economic recession or crisis?
Compute the present value of the tax shield : Compute the present value of the tax shield resulting from depreciation?
Describe the control objective and the specific controls : Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically.
What is the level of deadweight loss : If the market is perfectly competitive then what is the level of deadweight loss created by this tax? What if the tax was 44 per unit?
Compareand contrast ecological economics : Compareand contrast Ecological Economics and Green Economics with NeoclassicalEnvironmental Economics. How do theirgoals and principles differ?
Why is the dead weight loss different : Why is the dead weight loss different when the government taxes than when there is a negative externality?
Discussing the foundations of data mining : Write a 5-page paper discussing the "Foundations of Data Mining". The paper will compare "Data Mining" to "Traditional Business Reporting".

Reviews

Write a Review

Other Subject Questions & Answers

  How you approach working with someone from cambodia

Review the resource entitled "Cambodian Culture" in this week's Learning Resources, and consider the values that individuals from this area may hold.

  Why is iraq seemingly failing and struggling

Why is Iraq seemingly failing and struggling, why is Afghanistan corrupt, why are nearly all African nations still struggling with corruption after more than 50 years of independence?

  Describe the ethical issue and the ministry context

Describe the ethical issue and the ministry context and Describe the ethical decision-making model that can be applied to this ethical issue

  Evaluate treatment for the client in the case study

Post a description of the scale you might use to evaluate treatment for the client in the case study you selected and explain why you selected that scale.

  Research methods based on trustworthiness

What are 2 strengths and 2 weaknesses of this articles research methods based on trustworthiness?

  Difference between a high- and a low-context language

Explain the difference between a high- and a low-context language? What kinds of problems do you think that an individual from a low-context language may experience when negotiating with people from a high-context language

  Edit this and for spelling grammar and clarity

This is Josh Forwards. 34.  Web designer, photographer, and a successful entrepreneur who was born and raised in Cochise County. He has lived in Bisbee, Wilcox, Benson, and Sierra Vista and Douglas. He absolutely loves Cochise County!  Josh studie..

  Discuss job search and performance on the job

address networking, continuing education, job search and performance on the job.

  Middle east peace process and north korean nuclear

Middle East Peace process and North Korean nuclear disarmament.

  Describes his other employees before he introduces bartleby

describes his other employees before he introduces Bartleby. After that, briefly characterize his overall attitude towards/treatment of his scriveners

  Health care professionals-malpractice claims

Discuss some measures that health care professionals can take to prevent malpractice claims. Do you feel that the threat of a malpractice claim actually affects how a health care professional practices? Why or why not?

  Describe the themes emerging from the data collection

EDU671Vital to the process of collecting data is the continual alignment to your research question(s). Equally important is how you will systematically collect multiple sources of data and present the finding to arise at comprehensive conclusions ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd