Develop an it infrastructure audit for compliance

Assignment Help Management Information Sys
Reference no: EM132242984

Term Paper: Planning an IT Infrastructure Audit for Compliance

The audit planning process directly affects the quality of the outcome. A proper plan ensures that resources are focused on the right areas and that potential problems are identified early.

A successful audit first outlines the objectives of the audit, the procedures that will be followed, and the required resources.

Choose an organization you are familiar with and develop an eight to ten-page IT infrastructure audit for compliance in which you:

1. Define the following items for an organization you are familiar with:

1. Scope

2. Goals and objectives

3. Frequency of the audit

4. Duration of the audit

2. Identify the critical requirements of the audit for your chosen organization and explain why you consider them to be critical requirements.

3. Choose privacy laws that apply to the organization and suggest who is responsible for privacy within the organization.

4. Develop a plan for assessing IT security for your chosen organization by conducting the following:

1. Risk management

2. Threat analysis

3. Vulnerability analysis

4. Risk assessment analysis

5. Explain how to obtain information, documentation, and resources for the audit.

6. Analyze how each of the seven (7) domains aligns within your chosen organization.

7. Align the appropriate goals and objectives from the audit plan to each domain and provide a rationale for your alignment.

8. Develop a plan that:

1. Examines the existence of relevant and appropriate security policies and procedures.

2. Verifies the existence of controls supporting the policies.

3. Verifies the effective implementation and ongoing monitoring of the controls.

9. Identify the critical security control points that must be verified throughout the IT infrastructure and develop a plan that includes adequate controls to meet high-level defined control objectives within this organization.

10. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Describe the parameters required to conduct and report on IT infrastructure audit for organizational compliance.

• Describe the components and basic requirements for creating an audit plan to support business and system considerations

• Develop IT compliance audit plans

• Use technology and information resources to research issues in security strategy and policy formation.

• Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM132242984

Questions Cloud

Give an example of two different : Give an example of two different (i.e. non-isomorphic), minimal and equivalent Nondeterministic Finite Automata that both have two states only.
Define where you used a process improvement approach : Discuss one (1) project where you used a problem-solving approach to address what turned out to be common-cause variation, or where you used a process.
How to convert the two complement hex number : How to convert the two's complement hex number 0xfe35 to its signed decimal value?
Management-level positions : Selection for Promotion (Race) XYZ Corporation promoted 15 people last year into management-level positions.
Develop an it infrastructure audit for compliance : Develop an IT infrastructure audit for compliance. The audit planning process directly affects the quality of the outcome.
Management was asked to reduce employee headcount : Due to poor company performance, management was asked to reduce employee headcount and 45 employees must be identified;
Determine effective leadership behavior : Forces/traits within the manager that determine effective leadership behavior include his/her. Which of the following is an on-the-job training technique?
What are the newest uses for device id : What are the Newest uses for Device ID's ? That also are beneficial in Marketing
What are types of attacks that different mac functions : What are types of attacks that different MAC functions are vulnerable to. How do we protect against them?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describes the sourcing trends that are important for it

Identify the factors that were important in each sourcing strategy and whether the sourcing decision was strategic for the long term or tactical for short term.

  Evaluate appropriateness of information assurance decisions

Evaluate the appropriateness of information assurance decisions about security, access controls, and legal issues.

  What security concerns are associated with the thumb drive

What security concerns are associated with the thumb drive - How could information security policies or information security plans help the cafe in this type of situation?

  Social networking technologies

Social Networking Technologies: Accurately respond to and plan for the specific needs of an MIS project

  Determine the fraction defective in each sample

Determine the fraction defective in each sample.-  Estimate the mean and standard deviation of the sampling distribution of fractions defective.

  Write essay about flowcharting but rather to draw flowchart

You aren't being asked to write an essay about flowcharting, but rather to draw a flowchart. If your Case write-up doesn't contain a flowchart, then it's incomplete.

  Why you would and would not use business process management

Business process management is the technique used by organizations to comprehend and describe the activities that help them function.

  Write an article about the e-business

Write an article about the E-Business.Write a 2 page report (APA) summarizing the attached article and how it relates to basic ERP systems. At the end of your summary report, write a sectio

  Calculate the standard deviation of the critical path

There are four activities on the critical path of a network.-  Calculate the standard deviation of the critical path.

  Information systems proposal with five types of information

information systems proposal with five types of information systems that would work well for a new small nostalgic

  Provide the reasons for inclusion and the unique aspects

Assume that you have been tasked by your employer to develop an incident response plan. Create a list of stakeholders for the IR planning committee.

  The technology s-curvedescribe a technology s-curve explain

the technology s-curvedescribe a technology s-curve explain why it is important describe what leads to a shift in the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd