Determine whether anti-virus software is in use

Assignment Help Computer Engineering
Reference no: EM132407630

Assignment: You are part of a team selected by the Chief Information Officer (CIO) to perform a security audit for the Devil's Canyon company.

Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the results of your security audit based on the following audit process:

• Potential Risk to be Reviewed:Describe the risk.

• Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data.

• Regulation and Compliance Issues:Analyze how regulations and compliance issues could impact the organization.

• Provide a detailed analysis of regulations and compliance issues, beyond the simple explanation in score point two.

• Regulation and Compliance Resources and Tools: Analyze what resources and/or tools are available to address regulations and compliance issues.

• Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be more than one control that should be reviewed for a potential risk.

• Example: Determine whether anti-virus software is in use.

• Example: Determine whether virus signatures are periodically updated.

• Example: Determine whether periodic virus scans are performed.

• Provide a detailed analysis of the resources and/or tools available, beyond the simple explanation in score point two.

• IT Security - Processes and Methods: Differentiate between the various processes and methods involved in management of IT security resources.

• Review the various options available to address those processes and methods previously explained, and which ones might be feasible.

• IT Security - Measures: Analyze the various security measures that could be taken within the organization.

• Demonstrate a detailed understanding of what the alternatives are to approach security, how much security is needed, different methods to employ, etc.

• Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level).

• Example: 100% of servers and PCs have virus software installed.

• Example: 100% of the virus software installed is set to automatically update, including virus signatures.

• Example: 100% of the virus software installed is set to automatically perform a scan at least weekly.

Include a 1/2- to 1-page executive summary to support your presentation. Include appropriate references.

Reference no: EM132407630

Questions Cloud

Information security and risk management : How the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.
Each corresponding array element placed into linked list : Create a new linked list from two given arrays with the greater element from each corresponding array element placed into the linked list.
It security policy framework approaches : How to use IT Security Policy Framework to help with the alignment of IT security in your organization.
Prepare a schedule for each speaker for national conferece : Prepare a schedule for each speaker for the national conference being hosted next year on your campus. She wants to mail the schedules to the speakers.
Determine whether anti-virus software is in use : Determine whether anti-virus software is in use. Provide a detailed analysis of the resources and/or tools available, beyond the simple explanation in score.
Identify strategy, risks that may apply like strategic : Identify strategy, risks that may apply like strategic , financial compliance and operational.
Differences between sdlc and the security life cycle : In 175 words or more, discuss the differences between the systems development life cycle (SDLC) and the security life cycle. Include in your discussion.
STC5002 Research and Data Analytics Assignment : STC5002 Research and Data Analytics Assignment Help and Solution, Hang Seng University - Assessment Writing Service - Arrangement for Fulfillment of Requirement
MIS500 Reflective Portfolio Assignment Problem : MIS500 Foundations of Information Systems Assignment Help and Solution, Reflective Portfolio, Laureate International Universities, Australia

Reviews

Write a Review

Computer Engineering Questions & Answers

  Which symbol is not used in a context diagram

What is the relationship between a context diagram and diagram 0, and which symbol is not used in a context diagram?

  Calculate the batting average

A walk does not count as either a hit or a time at bat when you calculate the batting average. Which solution is best?

  Prepare an application with a method that accepts a string

Prepare an application with a method that accepts a string as an argument and returns the number of vowels that the string contains.

  What presentation issues on this machine have to addressed

Strings are represented as five packed 7 - bit characters perword. what presentation issues on this machine have to be addressed for it to exchange integer and string data with the rest of the world?

  Questiongenerate a new java project in eclipse and complete

questiongenerate a new java project in eclipse and complete following requirements based on the threads. some threads

  Discussion about the business intelligence and big data

Choose a topic in which you are interested and in which you have prior knowledge. Research best company practices for the particular topic.

  Determine the outlet temperatures of the two fluids

A single-pass cross-flow heat exchanger is constructed using the circular fine surface designated as #CF-8.72(c), Fig. The dimensions of the heat exchanger.

  Write a small test program that gets ten valid integers

Write a small test program that gets 10 valid integers from the user and stores the numeric values in an array.

  What are the causes of a security breach in an application

Name a minimum of two applications used in your organization for day to day business operation, and what step does your organization take to harden them.

  Osi layered structure and different protocols

List and discuss major de-merits of the layered approach to protocols in scholarly detail.Explain why data network communication and distributed applications.

  Provide an fidm authentication system that you have used

Provide an FIdM authentication system that you have used (being subjet to).

  Discuss hackers use not only computerized methods to steal

Hackers use not only computerized methods to steal your data but also social methods to prey on your emotions to obtain confidential data

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd