Describe the control objective and the specific controls

Assignment Help Computer Engineering
Reference no: EM132492920

Assignment: You are part of a team selected by the Chief Information Officer (CIO) to perform a security audit for one of the companies explored in this course. Vampire Legends (Week 1)

• Cruisin' Fusion (Weeks 2- 3)

• Devil's Canyon (Weeks 4 - 5)

Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the results of your security audit based on the following audit process:

• Potential Risk to be Reviewed:Describe the risk.

• Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data.

• Regulation and Compliance Issues:Analyze how regulations and compliance issues could impact the organization.

• Provide a detailed analysis of regulations and compliance issues, beyond the simple explanation in score point two.

• Regulation and Compliance Resources and Tools: Analyze what resources and/or tools are available to address regulations and compliance issues.

• Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be more than one control that should be reviewed for a potential risk.

• Example: Determine whether anti-virus software is in use.

• Example: Determine whether virus signatures are periodically updated.

• Example: Determine whether periodic virus scans are performed.

• Provide a detailed analysis of the resources and/or tools available, beyond the simple explanation in score point two.

• IT Security - Processes and Methods: Differentiate between the various processes and methods involved in management of IT security resources.

• Review the various options available to address those processes and methods previously explained, and which ones might be feasible.

• IT Security - Measures: Analyze the various security measures that could be taken within the organization.

• Demonstrate a detailed understanding of what the alternatives are to approach security, how much security is needed, different methods to employ, etc.

• Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level).

• Example: 100% of servers and PCs have virus software installed.

• Example: 100% of the virus software installed is set to automatically update, including virus signatures.

• Example: 100% of the virus software installed is set to automatically perform a scan at least weekly.

Include a 1/2- to 1-page executive summary to support your presentation. Include appropriate references.

Reference no: EM132492920

Questions Cloud

Sources important in academic writing and research : Why is source evaluation so important in academic writing and research?
Describe the basic concepts of association analysis : Write a minimum of 2.5-page paper that describes the basic concepts of Association Analysis. Also, describe the market basket analysis with examples.
What security methodologies can an organization apply : Do you believe such tools in the enterprise offer work productivity and efficiency? What security methodologies, including blockchain can an organization apply.
Design and simulate of DC Power Supply Assignment : ELE-2404 Design and simulate of DC Power Supply Assignment help and solution, Sharjah Higher Colleges of Technology - assessment writing service
Describe the control objective and the specific controls : Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be.
Create a comprehensive proposal and training document : Create a comprehensive proposal and training document for your company. You will need to include the following items within your proposal
Create a list of stakeholders for the ir planning committee : Assume that you have been tasked by your employer to develop an incident response plan. Create a list of stakeholders for the IR planning committee.
Discuss about impact on it and economic globalization : Research and create a 3000 word paper on your thoughts for the great impact(s) on IT and Economic Globalization. This paper must be an MS Word document in APA.
Analyzes the key aspects of the case : Compose a 1500 word report that analyzes the key aspects of the Case and responds to the questions found on page 376. Your report should be submitted.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd