Research examples of best practices for user domain security

Assignment Help Management Information Sys
Reference no: EM133652563

Assignment:

Assume the role of an IT auditor trainee at an auditing firm. Cooper & Kumar, a large, publicly traded financial investment firm, is a client. Cooper & Kumar has 25 sites across the region, 2,000 staff members, and thousands of clients. All sites occasionally host business associates, contractors, and temporary workers who work on the premises.

Cooper & Kumar requires a set of documents outlining best practices for achieving security compliance throughout the IT infrastructure. Although the company's security team is ultimately responsible for creating best practices, the auditing firm manager has asked the auditor trainee to provide best practices for the User Domain that will serve as an example for the client.

For this assignment, the students will:

  1. Research examples of best practices for User Domain security compliance for companies similar to Cooper & Kumar.
  2. Compose a list of at least 12 best practices for the User Domain that apply to Cooper & Kumar. Students must describe each best practice.
  3. Cite research sources properly so that the security team may refine this information, if needed, when compiling an all-encompassing best practices document.

Reference no: EM133652563

Questions Cloud

Discuss an ethical issue it organizations face today : Discuss an ethical issue IT organizations face today. Have you been personally affected by an IT ethical issue? Provide examples.
Find some forms of hardware malware : Do a internet search and find some forms of hardware malware. Discuss how the piece of malware is successful, and how it was detected.
How do the four modes-dedicated-system high : How do the four modes-Dedicated, System High, Compartmental, and Multilevel-affect the control of threads, input/outputs, memory, and processes?
What value are our customers really willing to pay : For what value are our customers really willing to pay? For what do they currently pay? How are they currently paying? How would they prefer to pay?
Research examples of best practices for user domain security : Research examples of best practices for User Domain security compliance for companies similar to Cooper & Kumar.
Discuss about computer and network security : Based on what you have learned about computer and network security in this week's readings and using your own experience or research.
What qualities should an individual who is on an irt have : Why do you think an IRT is important/or not, and what qualities should an individual who is on an IRT have?
Explain the key aspects of digital forensics : Explain the key aspects of digital forensics. Compare and contrast various types of controls.
Which cyber intelligence can contribute to threat mitigation : How cyber intelligence can inform risk assessments as well as the challenges and limitations of leveraging cyber intelligence to counter cyber threat actors.

Reviews

Write a Review

Management Information Sys Questions & Answers

  How the system changes will be communicated to the users

Building a new software application is just the start, as organizations invest in software to help solve business problems.

  How should the sharing economy be defined

How should the sharing economy be defined? Is Uber an example of the sharing economy - Do new technology-based companies fit under the existing regulatory

  What should be done about the various incidents

At first, he thought this was just a computer vendor who was trying to sell your company some new product, but no vendor has approached the company.

  Calculate the expected trip time

Develop a Monte Carlo simulation model to determine the expected trip time from node 1 to node 7. - Simulate 10 trips and calculate the expected trip time.

  Creating a topic summary- technology and cars

You will be creating a topic summary and APA citation page. But here, in this discussion, you will only choose a topic and do a bit of research on the Internet

  What are the best practices and standards in your area

What are the best practices and standards in your area that you think are important, and why? What are the expectations of you when you are working on a project, in your area of expertise?

  Which of four crops to grow during upcoming growing season

Dwight Moody is the manager of a large farm with 1,000 acres of arable land. For greater efficiency, Dwight always devotes the farm to growing one crop at a time.

  What are the 20 cryptography and encryption control numbers

What are the 20 Cryptography and Encryption Control NUMBERS in the NIST Special Publication 800-53 Revision 5

  Write a paper for mateo and joni at falcon security

Write a paper for Mateo and Joni at Falcon Security on the benefits and challenges of adopting cloud computing (CC).

  Briefly explain the steps of a pure prototyping methodology

Prototyping Methodology - Briefly explain the steps of a pure prototyping methodology as an alternative to an SDLC approach.

  Describe the access control security of a place you frequent

Describe the access control security of a place you frequent other than your home, such as your workplace.

  What did you feel was the most interesting chapter

What did you feel was the most interesting chapter in the book, and why? Do you feel you can apply the information learned in this course to the real world.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd