Develop intake briefing for middle managers

Assignment Help Basic Computer Science
Reference no: EM132863135

Your task: Develop an "intake" briefing for middle managers who will be assisting in the planning and execution of an internal audit of employee use of company owned laptops as part of the company's "Work From Home" arrangements. The purpose of an "intake" briefing is to get everyone "on the same page" with respect to what will be done, who will do it, and what the roles & responsibilities of the managers will be during the audit (e.g. assist with employee contacts and "smooth ruffled feathers" amongst their workers).

Background: The purpose of the audit is to determine how the laptops are being used by the employees working from home (what corporate and non corporate systems, services, networks, and websites are being accessed) and to uncover, if possible, any misuse (e.g. usage that is outside of the company's acceptable use policy). The audit should also look for evidence of laptops that are improperly configured or have vulnerable software installed.

Background: The company will follow the Information System Security Audit Process as defined by Harris & Maymi in the CISSP All-in-One Exam Guide, 8th edition. The steps are:

Determine Goals

Involve the right business unit leaders

Determine the scope

Choose the audit team

Plan the audit

Conduct the audit

Document the results

Communicate the results

Reference no: EM132863135

Questions Cloud

Explain the changes to federal departments : Explain the changes to federal departments as a result of 9/11. Discuss the responsibilities of the agencies located within the Department of Homeland Security.
Describe the basic features of each work of art : How those two works of art represent the changing political and cultural identity of the Renaissance in comparison with the Middle Ages.
CIS8504 Blockchain Fundamentals Assignment : CIS8504 Blockchain Fundamentals Assignment Help and Solution, University of Southern Queensland - Assessment Writing Service
What is the supervisor role in the management process : What is the supervisor role in the management process. Moreover, are there conflict situations beyond the control of the immediate supervisor?
Develop intake briefing for middle managers : Develop an "intake" briefing for middle managers who will be assisting in the planning and execution of an internal audit of employee use of company
What are the challenges in american prisons : What are the challenges in american prisons? You will choose the best theory in criminology to align your introductory research question
Identify potential meth labs in a residential neighborhood : Should the government spend funds on public service announcements that discourage drug use? Identify potential meth labs in a residential neighborhood
Examine a current law that has to do with technology : Examine a current law, or a bill proposing a law, that has to do with technology and criminal activity. The law can be at the state or federal level.
Discuss the sara model : Discuss the SARA model. Then describe how this model would be used to develop a law enforcement response to a specific crime problem.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Commercial letter of credit to enable firm to import

Assume, as the loan officer of a commercial bank, that one of your customers has asked for a commercial letter of credit to enable his firm to import

  Describe the role of cybersecurity

Describe the role of cybersecurity within the credit card payment security. Describe security associated with the PCI DSS (Payment Card Industry Data Security Standard) and how cybersecurity will address them.

  Do you think this is a good idea

1) A junior storage systems administrator is given a new project to decide what RAID level to place the new security system camera feed on. He decides on RAID6. Do you think this is a good idea? Why or Why Not?

  Compare and contrast common features

Research and provide a brief summary of two or three of the alternatives to Apache and IIS. Compare and contrast common features, interfaces

  Management was not effectively managing risk

FedEx's projections were way off with regard to both interest rates (which fell very significantly going into 2009) and fuel costs (which more than doubled before falling again in 2009). Does this suggest that management was not effectively manag..

  Find the optimal location for oliveira two distribution

Find the optimal location for Oliveira's two distribution centers in this expanded version of the problem.

  Odbc and jdbc database interfaces

Why is it important to have effective and powerful interfaces like these for databases?

  What is the tcp triple-handshake

1. What makes MAC address spoofing easy or hard? 2. What is the TCP triple-handshake, and how can it be used in an attack? Which leg of the CIA triad would this attack fall under?

  What value of us imports in 2018

For answering this question you are supposed to study "The Impact of the 2018 Trade War on U.S. Prices and Welfare" by Amiti, Redding, Weinstein.

  Update the value of the instance variable

Modify this code, without renaming any variable names, to resolve the problem.

  List some third-party anti-virus software you are familiar

List some third-party anti-virus software you are familiar with. What positive and negative experiences have you had with them, if any?

  How many clock cycles are needed

Indicate data dependency in the code below. Assuming there is no forwarding in the pipeline, howmany clock cycles are needed to finish the program? If full forwarding is used, how many clock cycles are needed?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd