Develop a plan for assessing it security

Assignment Help Management Information Sys
Reference no: EM131762921

Note: Chapter 5 of the required textbook may be helpful in the completion of the assignment.

The audit planning process directly affects the quality of the outcome. A proper plan ensures that resources are focused on the right areas and that potential problems are identified early.

A successful audit first outlines the objectives of the audit, the procedures that will be followed, and the required resources.

Choose an organization you are familiar with and develop an eight to ten page IT infrastructure audit for compliance in which you:

Define the following items for an organization you are familiar with:

Scope

Goals and objectives

Frequency of the audit

Duration of the audit

Identify the critical requirements of the audit for your chosen organization and explain why you consider them to be critical requirements.

Choose privacy laws that apply to the organization, and suggest who is responsible for privacy within the organization.

Develop a plan for assessing IT security for your chosen organization by conducting the following:

Risk management

Threat analysis

Vulnerability analysis

Risk assessment analysis

Explain how to obtain information, documentation, and resources for the audit.

Analyze how each of the seven (7) domains aligns within your chosen organization.

Align the appropriate goals and objectives from the audit plan to each domain and provide a rationale for your alignment.

Develop a plan that:

Examines the existence of relevant and appropriate security policies and procedures.

Verifies the existence of controls supporting the policies.

Verifies the effective implementation and ongoing monitoring of the controls.

Identify the critical security control points that must be verified throughout the IT infrastructure, and develop a plan that includes adequate controls to meet high-level defined control objectives within this organization.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe the parameters required to conduct and report on IT infrastructure audit for organizational compliance.

Describe the components and basic requirements for creating an audit plan to support business and system considerations

Develop IT compliance audit plans

Use technology and information resources to research issues in security strategy and policy formation.

Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM131762921

Questions Cloud

What is cost of one unit of product under variable costing : Doozer Industries makes extruded aluminum that it sells to contractors. What is the cost of one unit of product under variable costing
Define and describe multi-factor authentication : What advantage does an asymmetric cryptographic system provide over a symmetric cryptosystem? (at least 3 sentences)
What is the cash discount amount : Federated Department Stores received an invoice dated April 18 that shows a billing for $3,848.96 with terms 2/10, 1/15, n/30. Find the cash discount
Discuss the eventual disposition of this stock : He is trying to plan for the eventual disposition of this stock. Arthur's only remaining family member is his grandson. For income tax purposes
Develop a plan for assessing it security : Identify the critical requirements of the audit for your chosen organization and explain why you consider them to be critical requirements.
Provide the information in a concise manner : PowerPoint presentations require the ability to select the most relevant material and provide the information in a concise manner.
What test can propose for the success of randomization : Why is it important to assign papers to blind (as opposed to nonblind) referees randomly? What test can you propose for the success of randomization?
Earning an accounting profit : Continue on with production because you are earning an accounting profit.
Produce an interval estimate of the population mean : Suppose we wanted to conduct a survey. It is desired that we produce an interval estimate of the population mean that is ±5 from the true population mean.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain cloud computing and web 2.0

Write a paper explaining the business uses of cloud computing and Web 2.0. Your paper should be 3-5 pages in length and explain the business uses of each. Explain cloud computing and Web 2.0

  Why is an erp system important to your organisation

Discuss how information technology plays a role in the competitive environment of your organisation. How do you describe the competition to attract and retain clients/customers for your organisation? How do you describe the threat of substitute in..

  Information systems department wants to install a program

when the information systems department wants to install a program on the diet office computers, we must come to an agreement on how we want and need the program to operate.

  Use resources to research issues in information systems

Use technology and information resources to research issues in information systems. Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions

  Comparative analysis of the two social networks

Extend the comparative analysis of the two social networks, Jewish Revolt and Kosovo, to the revolution in Egypt. Identify, and comment on, differences, if any

  Write paper on virtual networking and vmware

Write a 20 page paper about Virtual Networking and VMware. what virtual networks are, what are its components, networking components, how is a Virtual Network different from a physical network

  How does web 2 change security for the internet

Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups.

  Discuss human resource project management

Examine the human variable of Clinical and technological interaction as it pertains to HCIT project implementation and Discuss Human Resource Project Management.

  The creation of emr standards

Describe the role government should play in the creation of EMR standards.

  Case study on social graphs the term coined by mark

case study on social graphs the term coined by mark zuckerberg of facebookdiscuss social graphs.the discussion has to

  Use to keep ventilation holes clear of dust

What can you use to keep ventilation holes clear of dust? [Choose all that apply.]

  How that method evolved into modern critical path analysis

What's the critical path of a project? The critical path of a project is a long sequence of the activities that must be complete in order for a project to be completed on time. How is slack time determined? Slack time is determined by subtractin..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd