Evaluate a suitable auditing approach for this case

Assignment Help Computer Network Security
Reference no: EM133337638

Assignment:

ABC Air is a small aircraft service company that carry out the aircraft maintenance for the civil operators. The company records the total number of flying hours for each aircraft, servicing time, man-hours of the engineers and related maintenance. An external contractor has provided a report that outlined the possible solution for the ABC Air. Based on the documentation provided you are required to assess an information security risk and complete the information security audit. You should clearly identify any assumptions that you may have.

In providing your information security risk and audit, you should:

1. Conduct systematic risk assessment, identification and analysis

2. Evaluate a suitable auditing approach for this case (general risk based approach, or specific control based approach) and provide justification

3. Consider some possible cyber-attack that could happen and use this for an integrated fault event analysis.

4. Determine the standard, best practise, or guideline that is suitable for ABC Air to mitigate the risk of information security breaches. Please explain advantages and disadvantages of these.

Reference no: EM133337638

Questions Cloud

Disaster Recovery and Business Continuity : Conduct research using the library regarding Disaster Recovery and Business Continuity (DR/BC) Plan test procedures,
Why are hash functions relevant in database encryption : Why are hash functions relevant in database encryption? d) What would you do to remedy the problem of index congestion on your database?
Main difference between fraud and error is intention : The main difference between fraud and error is the intention of the one committing the fraud or the error.
Explain how it could be relevant to forensics investigation : Discuss the benefits this tool has and explain how it could be relevant to a forensics investigation. Example of the tool, hashcat.
Evaluate a suitable auditing approach for this case : Evaluate a suitable auditing approach for this case (general risk based approach, or specific control based approach) and provide justification.
Discuss how data analyst : Discuss how data analyst can use following criteria to organize data requirements: adaptability, business and organizational policies, change control demands
Difference between the interpreter and the compiler : What is the difference between the interpreter and the compiler? What two commands can automate the execution of scripts at specified times?
Do you think animals need a bill of rights : Do you think animals need a Bill of Rights? Would such a law go against centuries of human culture? Would it increase the cost of food?
What is definition of each criterion : What is the definition of each criterion and how a data analyst can use them to organize data requirements: adaptability, business, and organizational policies

Reviews

Write a Review

Computer Network Security Questions & Answers

  What are some basic differences in the privacy rules

What are some basic differences in the privacy rules among the US, Asia and Europe? Do you believe they may be changed over time?

  Explain the reasons for the disparities noted

Describe two health outcomes for which India and China have had different experiences in the last half century. Explain the reasons for the disparities noted.

  Determine legal and ethical considerations for investigating

Determine the legal and ethical considerations for investigating and prosecuting digital crimes and analyse data on storage media and various file systems

  What is a public key infrastructure

What is a public key infrastructure? How do most current X.509 implementations check the validity of signatures on a certificate?

  Do you have any security concerns for using virtual networks

Virtualization has become a key player in our networking world these days. Another important term is the virtual private network (VPN). Are the two terms (virtualization and VPN) related? Discuss and give examples. Do you have any security concern..

  Discuss the core security mechanisms

ICT379 Security Architectures and System Administration - Kaplan Singapore - Discuss briefly how the above outlined security mechanisms would fail

  Prepare a report on computer security breaches

Search the web for news on computer security breaches that occurred during April-August 2017. Topic: Deep dive into the Edmodo data breach

  Describe the three principles of ip security

Describe 'The Three Principles of IP Security'. Cite references as well as a detailed explanation for the same. Explain how you would as an employee of a company practice those principles

  What are the reasons for such a recommendation

Have you observed this process in your work environment? If not, what could be the reason?

  Article review - hackers take aim at key u.s. infrastructure

You need to write paragraph on article - Hackers take aim at key U.S. infrastructure by Steve Hargreaves

  Malware infection incident

A general incident response plan focusing on the Handling an Incident portion for only a malware infection incident.

  Briefly explain current state of web application security

Briefly explain the current state of Web application security to the Board of Directors. Assess any techniques and technologies that you may need to use to mitigate those potential security risks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd