It auditing and security risk management unit

Assignment Help Basic Computer Science
Reference no: EM131186955

IT Auditing and Security Risk Management Unit 1 DB

Please provide information that has been certified as not similar to anything else on the internet or schools. I will not accept anything above 20% similarity according to my school verification. Please respond to my additional questions within 24 hours.

Scenario

Peak View Sound Sources is a public company based in Denver, Colorado and is focused on providing digital media and Web sites to music companies and musicians through the Mountain and West Coast regions. The company has a solid reputation and is starting to get some national and worldwide attention, with new prospective companies wanting to take advantage of the quality services they have seen on other existing Web sites.

Your company has been hired to assist Peak View Sound Sources (PVSS) to ascertain the security posture of the company's Information Systems resources and services. You are heading the team of auditors tasked to perform the audit and assessment.

You enter the company offices of PVSS and begin your analysis of the environment and situation.

Initial analysis has allowed you to determine that the company is made up of the following divisions:

  • Corporate Management and Support Staff: This organization contains the executive management, human resources, and accounting teams. All company decisions are directed from the management team.
  • Information Technology: This team manages the networks, servers, Web sites, and desktop environments for the company. The team has a perception of being difficult to work with, as they are slow to adopt new technology and slow to implement new offerings. The reality is that the team has resources and wants to uptake the newest and greatest technology, but they spend most of their time putting out fires and reacting to issues.
  • Media Content and Design: This team is in charge of working with the record companies and musicians to create the Web Sites and implement the product offerings that are sold.
  • Sales and Marketing: This team works with the musicians and record companies to offer and sell the services of PVSS.

There is a concern about the security of the infrastructure with respect to the ability to protect the copyrighted material that PVSS is given to host, because a single incident several years ago took place in which an entire new CD was released prematurely via the Internet. Although PVSS was not directly linked to the leak, there are suspicions surrounding PVSS.

Assignment Deliverables

As you continue your analysis, you see that the Information Technology (IT) department has developed several guidelines and procedures about how various systems should be considered and set up, but this is internal only to the IT department. Every time a new machine is set up and deployed, within a month, the configuration is changed.

  • Explain why you think the use of these guidelines and procedures is not sufficient and may not solve the problem. Consider how a company-wide policy program could help the situation.
  • As you begin to prepare your game plan to conduct an Information Security Audit, talk about why you think this current situation makes it difficult to identify the controls that need to be examined.
  • If you were performing this security audit, with which regulations would you want to ensure that PVSS complies? Why?

Reference no: EM131186955

Questions Cloud

What ways stakeholders assess organizational effectiveness : Stakeholders, by the nature of their role, conduct ongoing assessments of the effectiveness of organizations. What are some of the ways stakeholders assess organizational effectiveness? Which of these is most valid? Why? Is there ever a time when ..
How does the fly defeat the nests formidable defenses : How does the fly defeat the nest's formidable defenses and avoid detection? It manufactures chemicals to smell like an ant. You might have the impression that network-based intrusion detection tools.
How would you assess the business risk : How would you assess the business risk of HIH Insurance Limited?- What conditions need to exist for a negligence action to be upheld?.
Legal issues in information security and incident response : Using the online library, the Internet, and all course materials, research cyber criminals, their motives, and the forensic tools used to track an offender.
It auditing and security risk management unit : Peak View Sound Sources is a public company based in Denver, Colorado and is focused on providing digital media and Web sites to music companies and musicians through the Mountain and West Coast regions. The company has a solid reputation and is s..
Scanning for open wireless networks : Law and ethics are often both considerations when determining the reaction to a computer security incident. For instance, scanning for open wireless networks is not illegal unless the scanner connects to the network without permission. Discuss thi..
Determine the demand and revenue equations : If overhead is $2500 per month and the production cost per coat is $2000, find the cost equation and profit equation.
Article on creating competitive advantage : Write a two page article on creating competitive advantage via unstructured data?
Data communication information : Present an of the origin and of the concept. Describe the use of and toward the concept. Explain the strengths disadvantages) of the concept. Describe the prevailing view of about the likely future of the concept. Research and cite at least six (6..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Primary interop assembly

What benefit do you get from using a Primary Interop Assembly (PIA)?

  A motor vehicle maintenance center wants to improve serv

A motor vehicle maintenance center wants to improve its services by using database management systems (DBMS) and data mining. What tables are needed in such a database and how can it help improve their 2.2, 3.2services?

  Type of fuel should you mix

Suppose a car can run on ethanol and gas and you have a 15 gallons tank to fill. You can buy fuel that is either 30 percent ethanol or 80 percent ethanol. How much of each type of fuel should you mix so that the mixture is 40 percent ethanol?

  It auditor certifications and requirements

Use the Web to conduct research on IT Auditor Certifications. Write a report which provides and explains the following: 3 IT Auditor Certifications and Requirements

  Determine the functional dependencies

Using your knowledge of TAL Distributors, determine the functional dependencies that exist in the following table. After determining the functional dependencies, convert this table to an equivalent collection of tables that are in third normal form.

  Determine many blocks of main memory in direct-mapped cache

Asumme that computer using direct-mapped cache has 2^24 words of main memory and cache of 64 blocks, where each cache block contains 16 words. How many blocks of main memory are there?

  Create a presentation to get potential travelers to sign

This assignment you get an opportunity to showcase your presentation skills that you have learned to get potential travelers to sign up for a once in a life time vacation. Where are they going

  Austraria or a major river in another country

students are to write a retter home to their parents expraining the water crises and arguing for or against the use of recycled water.GEOGRAPHY:

  Determining the piece of work

A, B and C can do a piece of work in 10, 20 and 60 days respectively. In how many days can A do the work if he is assisted by B and C on every third day?

  Emerging trends technologies and applications

Explain the fundamental strengths and weaknesses--or the advantages and disadvantages--of the concept that you have chosen. Justify your response.

  Explain the operation of the mips andi instruction

Illustrate your answer with an appropriate example. In your answer you must provide details of the andi instruction format and of what each field in that instruction format does and how an andi instruction is identified.

  Describes best internet resources

For the course project, you will create an annotated bibliography of five sources that cites and describes four of the best Internet resources on a specified topic and one of the best library database resources.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd