Managing an it infrastructure

Assignment Help Computer Engineering
Reference no: EM13779946

Managing an IT Infrastructure

This assignment consists of four (4) sections: an internal IT audit policy, a management plan, a project plan, and a disaster recovery plan. You must submit all four (4) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.

Imagine you are an Information Security Manager for a large national retailer. You have been hired to be directly responsible for the planning and oversight of IT audits.

At the request of the Board of Directors, the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure. The planning and management aspects of IT audit are critical to the overall success of the audit, and as a result, the overall success of the systems implemented within the organization. You must develop a policy for conducting IT audits and develop a project plan for conducting two week IT audits.

In addition to the typical networking and Internetworking infrastructure of a medium sized organization, the organization has the following characteristics:

  • They have a main office and 268 stores in the U.S.
  • They utilize a cloud computing environment for storage and applications.
  • Their IT infrastructure includes Cisco workgroup and core switches, Cisco routers, Cisco firewalls and intrusion prevention systems, and servers running Microsoft Windows Server 2012.
  • They have over 1000 desktops and approximately 500 organization owned laptops in the main headquarters.
  • They allow employees to bring their own devices into the organization; however, they are subject to being searched upon entry and exit from the building.
  • They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners.
  • They enable wireless access at the main office and the stores.

Section 1: Internal IT Audit Policy

1. Develop an Internal IT Audit Policy, which includes at a minimum:

1.     Overview

2.     Scope

3.     Goals and objectives

4.     Compliance with applicable laws and regulations

5.     Management oversight and responsibility

6.     Areas covered in the IT audits

7.     Frequency of the audits

8.     Use at least two (2) quality resources in this assignment

Section 2: Management Plan

2. Explain the management plan for conducting IT audits, including:

1.     Risk management

2.     System Software and Applications

3.     Wireless Networking

4.     Cloud Computing

5.     Virtualization

6.     Cybersecurity and Privacy

7.     BCP and DRP

8.     Network Security

9.     Use at least three (3) quality resources in this assignment.

Section 3: Project Plan

Use Microsoft Project or an Open Source alternative, such as Open Project to:

3. Develop a project plan which includes the applicable tasks for each of the major areas listed below for each element of the IT audit mentioned above; plan for the audit to be a two (2) week audit.

1.     Risk management

2.     System software and applications

3.     Wireless networking

4.     Cloud computing

5.     Virtualization

6.     Cybersecurity and privacy

7.     Network security

Section 4: Disaster Recovery Plan

4. Develop a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization.

1.     The organization must have no data loss.

2.     The organization must have immediate access to organizational data in the event of a disaster.

3.     The organization must have critical systems operational within 48 hours.

4.     Include within the DRP the audit activities needed to ensure that the organization has an effective DRP and will be able to meet the requirements stated above.

5.     Use at least three (3) quality resources in this assignment.

6.     Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one inch margins on all sides; citations and references must follow APA or school specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 

 

Reference no: EM13779946

Questions Cloud

Compare similarity between virtue theory and utilitarianism : Write a 350- to 700-word essay comparing the similarities and differences between virtue theory, utilitarianism, and deontological ethics.
Dimensions of sexuality of both clients : Consider the social, legal (including tax ramifications), health, moral, and other dimensions of sexuality of both clients and prostitutes in your answer.
Why team leaders assess their teams periodically : Why don't many managers or team leaders assess their teams periodically to identify problems and correct them before they affect team effectiveness
Question regarding the personal assessment : Answer the question of whether you are ready to be an entrepreneur. Identify those factors in your personality, business skills and lifestyle preferences that would support your entrepreneurial efforts.
Managing an it infrastructure : Imagine you are an Information Security Manager for a large national retailer. You have been hired to be directly responsible for the planning and oversight of IT audits.
Paper based upon a life-changing decision : Draft a six- to eight-page paper based upon a life-changing decision you or someone in your community has had to make. Address the following
Develop a framework for workload : The following order can act as a guideline, and you may want to alter it as you develop your PPT project. Pay attention to the schedule outlined on the calendar for the class requirements. It includes many of the graded requirement dates.
Lending institutions-health care and human capital : Use the Internet to research one (1) developing nation of your choice. Your research should include an examination of lending institutions, health care, and human capital, as well as the material covered by the Webtext and lectures in Weeks 6 thro..
How long is the coin expected to last in general use : Model does not have to be made of the specified material but should resemble it. The design on the model should match the proposed design.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Which would create a better product

Which would create a better product

  Show that the order in which catch clauses

Write a program that can be used to show that the order in which catch clauses are listed is important

  Create a white paper based on knowledge

Create a white paper based on knowledge

  Describe a modification to the random port scan as describe

1. show how to defend against the dos attack of you are the system administrator for an provider that owns a large

  Question 1a briefly describe the following type of

question 1a briefly describe the following type of environments deterministic and staticb illustrate by means of a

  Questionin this difficulty you are asked to hand-turn the

questionin this difficulty you are asked to hand-turn the rsa protocol to encrypt and decrypt messages using rather

  Compares and contrasts linux server and linux workstation

Your company is currently investigating the use of Linux. Your manager has asked you to research the feasibility of using Linux in both the server and workstation environments. Your manager would like to see an 8- to 10-page paper that:

  What do you mean by pseudocode and case subroutine call

What do you mean by pseudocode and case Subroutine call

  Write the bubble sort

The village of Marengo conducted a census and collected records that include household data, including the number of occupants in each household.

  What error will takes place when executing the following

what error will occur when executing the following code? explain fully how you get to your answer. what changes should

  Congress is considering a new law that will grant amnesty

1.the boeing company faces a critical strategic choice in its competition with airbus industries for the long-haul

  Describes a function named insidecircle

Describes a function named insideCircle

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd