What are your recommendations for conducting such an audit

Assignment Help Computer Engineering
Reference no: EM132622198

Assignment: The Dayton Soft Products executive staff has requested materials and your recommendations on the following security issues:

• Is a security audit really needed? What are your recommendations for conducting such an audit?

• What are the roles and responsibilities for the organization's staff regarding security?

• Is there any concern about Dayton Soft Products' overall communications?

Compile a 3- to 4-page proposal that addresses solutions for the issues presented and which includes:

• Reasons for why a security audit is necessary with your recommendations for conducting such an audit:

1. Potential costs (personnel, finances, etc.)

2. Proposed audit timeline

3. Two recommended methodologies

• A RACI chart that identifies:

1. the roles and responsibilities for the organization's staff regarding security

2. expectations for a) business units, b) IT staff, c) executive staff, d) sales, and e) support staff

3. Note: This chart may be embedded in your proposal as a table or spreadsheet file, or attached as a separate document.

• Answers to concerns about Dayton Soft Products' overall communications

1. Three recommendations for securing the web communications-especially addressing internal needs and the growing global needs.

Reference no: EM132622198

Questions Cloud

Risk mitigation process for developing back-up plans : Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual'.
How much will the coin be worth at the end : How much will the coin be worth at the end of the fifth year if his expectations are correct?
Ethical hacking : Search for Information that relates to ethical hacking.
Big data in radical platforms : You are to search the Internet for other uses of Big Data in RADICAL platforms.
What are your recommendations for conducting such an audit : Is a security audit really needed? What are your recommendations for conducting such an audit? What are the roles and responsibilities for the organization's.
Difficulties in measuring intelligence of machines : Discuss the difficulties in measuring the intelligence of machines.
Discuss difficulties in measuring intelligence of machines : In 2017, McKinsey & Company created a five-part video titled "Ask the AI Experts: What Advice Would You Give to Executives About AI?" View the video.
The political debate over net neutrality : The political debate over Net Neutrality has been going on for many, many years now in this country against backdrop of freedom of information vs. censorship
Describe how digital forensics were used in investigation : Using WORD, write an ORIGINAL brief essay of 400 words or more describing the case and the how digital forensics were used in the investigation.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is the running time of adding n elements

What is the running time of adding n elements to an initially empty collection C in this case?

  Post one federal and one state statute utilizing standard

Using a Microsoft Word document, please post one federal and one state statute utilizing standard legal notation and a hyperlink to each statute.

  Write a swing program that declares an empty array of grades

Write a Swing program that declares an empty array of grades with a maximum length of 50. Implement a JOptionPane input box within a while loop.

  Describe how you would develop an addressing and naming

discuss how you would develop an addressing and naming model in an environment that has 10 departments in a 1000

  What are the ingredients of a typical cybersecurity policy

What considerations should there be in order to implement the policy successfully

  Define microsoft exchange as a server application

Define Microsoft Exchange as a server application that handles email, contacts, and calendars, and show how an Exchange account is added to an iOS device.

  Write a program that calls a method that accepts an integer

Write a program that calls a method called selectionSort that accepts an integer array as a parameter and sorts the elements in the array.

  Write a java gui application functioning as a simple text

Write a Java GUI application functioning as a simple text search engine. It allows a user to input a search string, and highlights all occurrences of the string

  Prepare an systematic literature review paper on the topic

Prepare an SLR (systematic literature review) paper on the topic Analyze & Visualize Data. Topic/Idea should be new (shouldn't copy someone else)

  Define congruence and compare with equality

Define congruence and compare with equality. Which algorithm is used to find the multiplicative inverse of an integer in Zn?

  Write a program that will do addition and subtraction

Write a program that will do addition, subtraction, multiplication, and division for arbitrarily large integers.

  List technicians data along with current_user

A piano manufacturer employs piano technicians who are responsible for inspecting the instruments before they are shipped to the customers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd