Prepare an is audit plan and report to the management

Assignment Help Computer Engineering
Reference no: EM131037295 , Length: word count:2000

Requirement:

You need to choose a case study and write down all the IT risk as report. you can check what IT risk factor in the lecture notes.IS Audit Report

Important note:

- This is an individual assignment. You must complete the task independently. If you submit a report that is similar to any of your classmate's reports it will be considered academic dishonesty. Refer to the Macquarie University Academic Honesty Procedure and associated documents.

- Please also refer to the submission instruction as per unit guide.

Estimated student workload: 30 hours

Task

Perform a web search on recent (in the past 3 years) articles to find an interesting case study, such as news articles in relation to IS risks.

You will need to attach the original version of the case study or provide the URL link to the original case in the appendix when you submit the assignment.

Assuming that you are an IS auditor, prepare an IS audit plan and report to the management of your client. The document must include the followings:

1) Executive Summary
You will need to prepare an executive summary document (0.5 page maximum) to the board of directors.

2) Background to the Case
Background to the client's business and computerised environment. - This is to demonstrate your understanding of the client's business and IS environment.

3) IS Risks
Identify IS risks from the case study, including analysing the likelihood, level of risks and implications to the business.

4) Audit Plan, Objectives and Procedures
Prepare an audit plan outlining the areas that you propose to audit. In addition, you will need to include audit objectives and audit procedures for each of the area(s) that you plan to audit.

5) Audit Questions and Documents
For each of the audit objectives, provide at least three examples of interview questions that you will use to gather evidence from clients, including naming relevant documents that you may want to obtain for the audit.

6) Control Recommendations
Provide a set of recommendations of control mechanism(s) to mitigate for each of the IS risks. Identify the benefits of your recommendation to your client.

Required
Write a report that addresses all of the above sections.

- Format requirements: "Times New Roman" size 12 with 1.5 line spacing, approximately 1500
- 2000 words in total (not including references). You must include the total of words used in your report. The report should have appropriate headings and subheadings (including an introduction and conclusion).

- You must acknowledge the use of the work of others (e.g. the academic journal articles on which your report is based) using the Harvard referencing style (see https://www.lib.mq.edu.au/research/referencing.html). Any ideas or quotations must be correctly cited in the body of your report and a reference list must be provided at the end of your report.

- Once you have submitted your report, check the originality report in turn-it-in and ensure similarity with other sources is referenced. You can resubmit your report until the due date.

- Please note that the originality report for a resubmission takes 24 hours to be produced. Please ensure that you allow adequate time, if you are considering resubmission.

- Review the marking rubric so that you understand the expected standards and how you will receive feedback.

I have provide you a couple of case study in the pass three year, you can choose any of them to write.

I Have researched a few companies which i believe could be used for this assignment and attached links to get you opinion as to which company is the best options.

2014 JP Morgan Data Breach: https://www.businessinsider.com.au/jp-morgan-data-breach-2014-10?r=US&IR=T

2015 Anthem Data Breach: https://en.wikipedia.org/wiki/Anthem_medical_data_breach

2014 Credit Card Breach Target: https://techcrunch.com/2014/01/10/targets-data-breach-gets-worse-70-million-customers-had-info-stolen-including-names-emails-and-phones/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&utm_content=Netvibes

2016 Hollywood Presbyterian Medical Center: https://www.techtimes.com/articles/135310/20160222/la-hospital-hit-by-ransomware-pays-hackers-17-000-is-it-the-right-choice.htm (2) 8005-8227

Harvard Style

Number of Ref: Above 10

Reference no: EM131037295

Questions Cloud

How much are the annual payments : What rate of return must he earn in order to have the amount needed - What approximate return must his money earn so he may receive annual benefits of $30,000 for the next 10 years?
Determine the tension tb in the cord as the sphere passes : determine the tension TB in the cord as the sphere passes point B. Friction is negligible.
Identify the legal issues arising in agency : BULAW1503 - Identify the legal issues arising in agency from this scenario. Where relevant you should justify and support your answers with reference to statute and/or case law.
In what ways are mitosis and meiosis different : Describe in detail the process of respiration under anaerobic vs. aerobic condition. How is mRNA modified before it leaves the nucleus of a eukaryotic cell? In what ways are mitosis and meiosis different?
Prepare an is audit plan and report to the management : Perform a web search on recent (in the past 3 years) articles to find an interesting case study, such as news articles in relation to IS risks
Create an online business moduel : I required to create an online business moduel that allows people to connect wirh personal trainers via live, interactive video, and participate in one on oone group training seassons. as you could benifit from social media marketing its recommend..
Calculate the angular velocity ? : Calculate the angular velocity ω which the pendulum has immediately after impact and find the maximum angular deflection θ of the pendulum
Five essential elements of enforceable contract : Define the five essential elements of an enforceable contract, and demonstrate how each element relates to your example. Explain the circumstances of a breach of contract in your example, and discuss possible remedies.
For the bicmos differential amplifier : 9.102 For the BiCMOS differential amplifier in Fig. P9.102 let VDD = VSS =3 V, I = 0.2 mA, k1pW/L = 6.4 mA/V2; / VA/ for p-channel MOSFETs is 10 V, /VA/ for npn transistors is 30 V. Find Gm, Ro, and Ad .

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd