Develop a policy for conducting it audits

Assignment Help Management Information Sys
Reference no: EM131895680

This assignment consists of four (4) sections: an internal IT audit policy, a management plan, a project plan, and a disaster recovery plan.

You must submit all four (4) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.

Imagine you are an Information Security Manager for a large national retailer. You have been hired to be directly responsible for the planning and oversight of IT audits.

At the request of the Board of Directors, the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure.

The planning and management aspects of IT audit are critical to the overall success of the audit, and as a result, the overall success of the systems implemented within the organization.

You must develop a policy for conducting IT audits and develop a project plan for conducting two week IT audits.

In addition to the typical networking and Internetworking infrastructure of a medium-sized organization, the organization has the following characteristics:

They have a main office and 268 stores in the U.S.

They utilize a cloud computing environment for storage and applications.

Their IT infrastructure includes Cisco workgroup and core switches, Cisco routers, Cisco firewalls and intrusion prevention systems, and servers running Microsoft Windows Server 2012.

They have over 1000 desktops and approximately 500 organization-owned laptops in the main headquarters.

They allow employees to bring their own devices into the organization; however, they are subject to being searched upon entry and exit from the building.

They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners.

They enable wireless access at the main office and the stores.

They process an average of 67.2 credit card transactions per hour every day at each location and via their corporate Website.

Section 1: Internal IT Audit Policy

Write a three to four (3-4) page paper in which you:

1. Develop an Internal IT Audit Policy, which includes at a minimum:

a. Overview

b. Scope

c. Goals and objectives

d. Compliance with applicable laws and regulations

e. Management oversight and responsibility

f. Areas covered in the IT audits

g. Frequency of the audits

h. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 2: Management Plan

Write a four to six (4-6) page paper in which you:

2. Explain the management plan for conducting IT audits, including:

a. Risk management

b. System Software and Applications

c. Wireless Networking

d. Cloud Computing

e. Virtualization

f. Cybersecurity and Privacy

g. BCP and DRP

h. Network Security

i. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 3: Project Plan

Use Microsoft Project or an Open Source alternative, such as Open Project to:

3. Develop a project plan which includes the applicable tasks for each of the major areas listed below for each element of the IT audit mentioned above; plan for the audit to be a two (2) week audit.

a. Risk management

b. System software and applications

c. Wireless networking

d. Cloud computing

e. Virtualization

f. Cybersecurity and privacy

g. Network security

Section 4: Disaster Recovery Plan

Write a five to seven (5-7) page paper in which you:

4. Develop a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization.

a. The organization must have no data loss.

b. The organization must have immediate access to organizational data in the event of a disaster.

c. The organization must have critical systems operational within 48 hours.

d. Include within the DRP the audit activities needed to ensure that the organization has an effective DRP and will be able to meet the requirements stated above.

e. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe the Sarbanes-Oxley (SOX) act and Committee of Sponsoring Organizations (COSO) framework.

Describe the process of performing effective information technology audits and general controls.

Describe the various general controls and audit approaches for software and architecture to include operating systems, telecommunication networks, cloud computing, service-oriented architecture and virtualization.

Explain the role of cybersecurity privacy controls in the review of system processes.

Discuss and develop strategies that detect and prevent fraudulent business practices.

Describe and create an information technology disaster recovery plan.

Develop an audit plan and control framework that addresses and solves a proposed business problem.

Use technology and information resources to research issues in information technology audit and control.

Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM131895680

Questions Cloud

Develop a research paper on a health care technology : Health Care Information Systems are important in dispensing of information throughout the organization.
Determine how you would apply positive discipline : Assess the discipline steps to take. Determine how you would apply positive discipline.
Assess the benefits of a wellness program : Assess the benefits of a wellness program. Summarize the components you would include in the wellness program.
Describe the process employees need to take : Assess what an employer can legally do to prevent unionization. Describe the process employees need to take in order to unionize.
Develop a policy for conducting it audits : Develop a policy for conducting IT audits and develop a project plan for conducting two week IT audits.
Explain two motivational theories human resource managers : Explain two motivational theories human resource managers use to help employees and determine which theory would work best in this scenario to help motivate.
Describe a detailed background on the columbus crew : Describe a detailed background on the Columbus Crew and their proposed relocation. Prepare a detailed outline of the article.
What items are typically included in a job description : What items are typically included in a job description? What items are not shown?
Multilevel and strategic recruiting : What can you tell me about: Multilevel and Strategic Recruiting: Where Have We Been, Where Can We Go From Here?

Reviews

Write a Review

Management Information Sys Questions & Answers

  What hardware will kelly need to install at kellyssalon

For your Case Study Stage 1 assignment, you performed a Five Forces Analysis and justified Kelly's chosengeneric strategy for competitive advantage and the business process that she would like to improve through the application of technology. For ..

  An overlap between operational and physical security

In your view, is there an overlap between operational and physical security? Why, or why not?

  Cost benefit analysisafter performing the cost benefit

cost benefit analysisafter performing the cost benefit analysis on technology options the leadership of smitheford

  Identifying company strategy with online financial chart

Identifying Company Strategy with Online Financial Chart Tools, One way to get an idea of how well the company is doing is to compare the trend in its share prices to the Dow Jones Industrial Average

  Why it is important to implement such a strategy

Why it is important to implement such a strategy, and tells how you are going to do it. The paper should have 4 pages and also a PPT for presentation.

  Compare and contrast the mobile security devices

Assess the role of HTTPS in cryptography in terms of its success, failures, performance issues, and cost effectiveness. Provide a rationale for your response.

  Define service level and service level agreement

Define service level and service level agreement. What kinds of metrics will you measure?Which ones will keep your customer happy?

  Create a database schema that supports the companys business

This assignment consists of two (2) sections: a design document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the ..

  How you think e-business will affect the retailing areas

Discuss and describe how you think e-business will affect the following areas of endeavor, including both positive and negative effects.

  Define threat and vulnerability and safeguard and target

Define threat, vulnerability, safeguard and target. Support you answer with examples.

  Service-oriented architecture domain using academic database

Service-Oriented Architecture (SOA) knowledge domain using academic databases such as the ACM database, IEEE database, INFORMS database, Elsevier database, or Google Scholar. The articles should be academically credible and not include popular lit..

  What steps have you taken to harden system

What hardening guidelines or standards are you familiar with? What steps have you taken to harden systems?What function do each of the strategies discussed ?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd