Analyze one of information security auditing frameworks

Assignment Help Auditing
Reference no: EM131328030 , Length: word count:2500

Information Security Audit Assignment -

OBJECTIVES - This assignment is designed to assess students' ability to:

  • Produce a concise detailed report about the importance of information security audit policy and its components
  • To have excellent understanding relating to information security audit policy and its components
  • To develop skills in manipulating and performing an information security audit
  • To be able to define components of information security audit policy according to corporate requirements
  • To be able to manage metrics, statistics, and facts about security audit policy effectively.
  • Use of CU Harvard referencing system to cite and reference academic resources.

OUTCOME - Student must have understanding of the following points

  • Develop Information Security audit baseline(s).
  • Perform an audit to identify events and corrective actions.
  • Produce an audit-letter (report) to the organization's senior management.

Tasks:

These days, most of organizations are considering information security audit as a high priority due to the above said reasons. Hence, An information security audit is an audit on the level of information security in an organization. The organization's IT environment has to be controlled to meet the business requirements. For that purpose, an effective risk-based Information Security audit program with generally accepted audit standards and guidelines should be developed. Critically analyze and provide your findings on the following four aspects of information security audit.

Task 1: Assignment work proposal submission

Task 2: The auditor should have a sufficient knowledge about the company and its critical business activities before starting an audit review. Critically analyze the part of an Information Security auditor towards audit planning and preparation.

Task 3: The auditor should consider various criteria the auditing approach. Analyze one of information security auditing frameworks or approaches that an auditor should establish over starting the auditing process.

Task 4: The technical auditing is consider main phase of IS auditing. Therefore, as IS auditor evaluate the different types of controls and their use in Information Security audit.

Task 5: As an Information Security Auditor, conduct an audit on network security tools of any organization (of your choice) and provide a comprehensive report to its senior management. The auditing report should include the auditor's (in this case your) inquiries and procedures followed during audit in detail.

GUIDELINES - Follow the guidelines mentioned below for your assignment.

-Assignment should be submitted through Moodle (Turnitin).

-Handwritten assignments will not be accepted

-Assignment should have a Title Page. Title Page should contain the following information.

  • College logo
  • Module Name & code
  • Semester details
  • Student name
  • Student ID

-It should have Table of Contents

-Use page numbers

-Assignment should be typed in your own words using Times New Roman font size 12.

-Heading should be with Font Size 14, Bold, Underline.

-Use Diagrams and Examples to explain your topic.

-Copy paste from the Internet is strictly not acceptable.

-In-text citation and referencing using Harvard Coventry style.

Reference no: EM131328030

Questions Cloud

Provide an ethical analysis of the articles. : Provide an ethical analysis of the articles. You may assume the role of a warden considering gender relations in their prison or a citizen review board member. Either way, explain the implications of gender relations in the corrections system-ethi..
Re write each point using correct english : Re-write each point using correct English.- As an organization, our hospital seeks to find individuals who can creatively solve problems and also devote themselves into serving to meet hospital quality organizational goals.
Form an outline and an annotated bibliography for the paper : Form an Outline and an Annotated Bibliography for the paper, which is attached.- The paper topic is : "Syria Refugee Vetting Process".
Give the answer of muliple choice question : Mike agrees to paint Marys house for 51.500. Mike completes the job as agreed. and Mary pay% Mike. The contract between Mary and Mike is now.Methods in which an offer can be terminated include all of the following EXCEPT. Which of the following is a..
Analyze one of information security auditing frameworks : COMP 0392 Information Security Audit Assignment. The auditor should consider various criteria the auditing approach. Analyze one of information security auditing frameworks or approaches that an auditor should establish over starting the auditing p..
What is mid-atlantics weighted-average cost of capital : What is Mid-Atlantic's weighted-average cost of capital (WACC)? What are the key assumptions that especially influence WACC? What are the free cash flows of the packaging machine investment?
What are the similarities between the myths : Create an analysis that could accompany the texts of these two myths in a textbook or reader on world mythology
How the organization can minimize the given sanctions : Determine whether the organization is at risk for receiving intermediate sanctions from the Internal Revenue Service for conferring excess economic benefits on disqualified persons. If so, indicate how the organization can minimize those sanctions..
What were biggest challenges and how your group overcome : How was this group different from and similar to your face-to-face group?- What were the biggest challenges and how did your group overcome them?

Reviews

len1328030

12/26/2016 7:14:16 AM

I want this information security audit assignment. 2500 words. So please I request you to hire the best tutor who has good knowledge about it. Please make sure the tutor is fit until the modification time and please hire a tutor who is capable enough to take this responsibility and complete the assignment properly as per the requirements. Please tell the tutor to choose any company from Oman and start the assignment. Prepare a report in MS-Word format not exceeding 25 pages describing the tasks 1 to 4 and upload it to Moodle. Prepare a PowerPoint presentation to explain your findings and actions on the tasks 1 to 4 and upload it to Moodle.

Write a Review

Auditing Questions & Answers

  Explain the process of developing a mission statement

Explain the process of developing a mission statement - Discuss the process of performing an external audit.

  Component of audit risk-match type of risk

Select the component of audit risk(a,b,c and d - below) that is most directly illustrated. The components may be used once, more than once, or not at all.

  Allocate fixed costs are assigned based on relative sales

Computer Boutique sells computer equipment and home office furniture. Currently, the furniture product line takes up approximately 50% of the company's retail floor space.

  Journal entries and work in process inventory account

Stanley Printing Company began operation in March with three custom orders. The following costs were incurred during the month.

  Procedure for submission of proposals

When a company is deciding whether to undertake an investment (from a number of possible options), what is the general procedure for the submission of proposals and the subsequent audit of investment?

  Under what circumstances is first bank an identified user

Under what circumstances is First Bank an identified user? What exceptions to the identified user test might First Bank argue?

  Prepare first on alert''s bank reconciliation at december 31

The bank statement also shows a $30 service charge and $20 of interest revenue that First on Alert earned on its bank balance.

  Audit-subsequent events procedures

What are the two types of subsequent events in terms of their effects on the financial statements? Give an example of each type of subsequent events? List the type of procedures performed during a subsequent events review.

  Five types of audit tests

There are five types of audit tests. List one audit test and describe at least two types of evidence that may be obtained from this test.?

  Discovery of fraud in audit

As an auditor for Franken's Markets you have discovered fraudulent activities. In your previous discussions with management, no one with the Franken organization identified fraudulent behavior or activity and any questions related to such matters ..

  You are required to read the following statement issued by

you are required to read the following statement issued by icaa institute of chartered accountants in australia and

  A bitter disagreement with their external auditor

The CEO of Kleptos (W.E. Chatham) has asked Dewy Cheatem, and Howe to bid on doing the Kleptos Audit. However, as a precondition of taking the contract, you must agree to not complain about the funding receipts from the Victorian government being jou..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd