Develop intake briefing for middle managers

Assignment Help Basic Computer Science
Reference no: EM132863135

Your task: Develop an "intake" briefing for middle managers who will be assisting in the planning and execution of an internal audit of employee use of company owned laptops as part of the company's "Work From Home" arrangements. The purpose of an "intake" briefing is to get everyone "on the same page" with respect to what will be done, who will do it, and what the roles & responsibilities of the managers will be during the audit (e.g. assist with employee contacts and "smooth ruffled feathers" amongst their workers).

Background: The purpose of the audit is to determine how the laptops are being used by the employees working from home (what corporate and non corporate systems, services, networks, and websites are being accessed) and to uncover, if possible, any misuse (e.g. usage that is outside of the company's acceptable use policy). The audit should also look for evidence of laptops that are improperly configured or have vulnerable software installed.

Background: The company will follow the Information System Security Audit Process as defined by Harris & Maymi in the CISSP All-in-One Exam Guide, 8th edition. The steps are:

Determine Goals

Involve the right business unit leaders

Determine the scope

Choose the audit team

Plan the audit

Conduct the audit

Document the results

Communicate the results

Reference no: EM132863135

Questions Cloud

Explain the changes to federal departments : Explain the changes to federal departments as a result of 9/11. Discuss the responsibilities of the agencies located within the Department of Homeland Security.
Describe the basic features of each work of art : How those two works of art represent the changing political and cultural identity of the Renaissance in comparison with the Middle Ages.
CIS8504 Blockchain Fundamentals Assignment : CIS8504 Blockchain Fundamentals Assignment Help and Solution, University of Southern Queensland - Assessment Writing Service
What is the supervisor role in the management process : What is the supervisor role in the management process. Moreover, are there conflict situations beyond the control of the immediate supervisor?
Develop intake briefing for middle managers : Develop an "intake" briefing for middle managers who will be assisting in the planning and execution of an internal audit of employee use of company
What are the challenges in american prisons : What are the challenges in american prisons? You will choose the best theory in criminology to align your introductory research question
Identify potential meth labs in a residential neighborhood : Should the government spend funds on public service announcements that discourage drug use? Identify potential meth labs in a residential neighborhood
Examine a current law that has to do with technology : Examine a current law, or a bill proposing a law, that has to do with technology and criminal activity. The law can be at the state or federal level.
Discuss the sara model : Discuss the SARA model. Then describe how this model would be used to develop a law enforcement response to a specific crime problem.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd