Identify the critical requirements of the audit

Assignment Help Management Information Sys
Reference no: EM131993184

The audit planning process directly affects the quality of the outcome. A proper plan ensures that resources are focused on the right areas and that potential problems are identified early.

A successful audit first outlines the objectives of the audit, the procedures that will be followed, and the required resources.

Choose an organization you are familiar with and develop an eight to ten page IT infrastructure audit for compliance in which you:

Define the following items for an organization you are familiar with:

Scope

Goals and objectives

Frequency of the audit

Duration of the audit

Identify the critical requirements of the audit for your chosen organization and explain why you consider them to be critical requirements.

Choose privacy laws that apply to the organization, and suggest who is responsible for privacy within the organization.

Develop a plan for assessing IT security for your chosen organization by conducting the following:

Risk management

Threat analysis

Vulnerability analysis

Risk assessment analysis

Explain how to obtain information, documentation, and resources for the audit.

Analyze how each of the seven (7) domains aligns within your chosen organization.

Align the appropriate goals and objectives from the audit plan to each domain and provide a rationale for your alignment.

Develop a plan that:

Examines the existence of relevant and appropriate security policies and procedures.

Verifies the existence of controls supporting the policies.

Verifies the effective implementation and ongoing monitoring of the controls.

Identify the critical security control points that must be verified throughout the IT infrastructure, and develop a plan that includes adequate controls to meet high-level defined control objectives within this organization.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe the parameters required to conduct and report on IT infrastructure audit for organizational compliance.

Describe the components and basic requirements for creating an audit plan to support business and system considerations

Develop IT compliance audit plans

Use technology and information resources to research issues in security strategy and policy formation.

Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM131993184

Questions Cloud

Identify the fundamentals of public key infrastructure : Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web.
Conduct a search of a person or the property : Generally, a warrant is required to conduct a search of a person or their property. However, over the development of US jurisprudence.
What is the coupon rate and current yield : what is the coupon rate, current yield, approximate yield to maturity and capital gains yield?
Teachers must use a variety of assessments : When assessing ELLs, teachers must use a variety of assessments in order to get the most accurate snapshot of academic and language progress.
Identify the critical requirements of the audit : Identify the critical requirements of the audit for your chosen organization and explain why you consider them to be critical requirements.
Are integrated devices safer than using handheld devices : "Are Integrated Devices Safer Than Using Handheld Devices While Driving?" 1. What are Bainwol's basic assumptions?
Define power-what are the three forms of power : How do they differ from each other? How would you group the five power resources with the three forms of power?
Perform steganalysis to find out the secret text message : You need to perform steganalysis to find out the secret text message from the stego ECG signal. In order to do this, convert each ECG samples into 64 bit
Illustrates the current information system : Illustrates the current information system, capturing data from in-store ordering and payment processes

Reviews

Write a Review

Management Information Sys Questions & Answers

  How byod either positively or negatively affected

Provide a real-world example of how BYOD either positively or negatively affected an organization's productivity and / or security.

  Explore the impact of cryptocurrencies on business

Explore economics of cryptocurrencies. Explore the impact of cryptocurrencies on business. Explore how people trust currencies. Explore the social impact of cryptocurrencies. Explore the future applications of the technology.

  Situational approaches to leadership

SITUATIONAL APPROACHES TO LEADERSHIP

  Create a cost analysis - develop a proposal for the company

DesignIT has requested the consideration of all interconnected devices and wiring, along with speeds, for best performance.

  Describe how information systems are used

Choose a company that you are familiar with, and like the best or use very often. Describe how Information Systems are used in this company

  Discuss about the business of fwdc

Summarize in one paragraph, in your own words, the business of FWDC. Include the location of the company/terminals, fleet information.

  Providee an explanation of basic elements for apa in text

After watching the video, APA In-text Citations (6th Edition), discuss at least three APA concepts presented in or that you learned from the video. (The discussion board must follow the formatting guidelines in The Publication Manual of the Amer..

  Social and security issues for individuals and organizations

What are the social and security issues for individuals and organizations relative to personal and business use of social media

  Steps found in business process engineeringreview the steps

steps found in business process engineeringreview the steps found in business process engineering. review the lesson

  How it increases the switching costhow could a business use

how it increases the switching costhow could a business use information technology to increase switching costs and lock

  Compare and contrast public private and hybrid clouds

Examine the grid computing concept and discuss ways it can be used to solve complex scientific problems. Determine how similar approaches may be used in community projects (i.e., distributed digital music archives and libraries).

  Describe the effects of halogen systems on equipment

Discuss the issues of availability versus confidentiality of the DR and BC plans.Describe the effects of halogen systems on equipment .

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd