Audit program for application systems for auditing

Assignment Help Computer Network Security
Reference no: EM131076337 , Length:

Question:

Information Assurance Compliance with Government Regulations

Review the "Audit Program for Application Systems for Auditing" presented in Appendix B of the Cascarino text. Also, read the following articles, located in the course shell:

. "A Framework for Health Care Information Assurance and Policy Compliance" by Sherrie Drye Cannoy and A.F. Salam

. "Information Assurance and Corporate Strategy" by Elspeth McFadzean, Jean-Noël Ezingeard, and David Birchall

. "Five Most Common Cybersecurity Mistakes" from the Toledo Business Journal

Submission Requirements

Case Study Plan

Write a six to ten (6-10) page paper in which you:

1. Discuss which employees and organizations have a deeper-level of information assurance (IA) policy compliance.

2. Examine the factors that increased the individual's level of propensity for compliance.

3. Determine the internal and external factors affecting IA policy compliance.

4. Ascertain which of the organizational requirements poses difficulty in adopting technical features to enhance security policy.

5. Discuss factors related to IA and policy compliance that are affected by government regulations.

6. Suggest a framework that could be used to address the issues described in the "Five Most Common Cybersecurity Mistakes" article, based on the "Audit Program for Application Systems for Auditing".

7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Verified Expert

Information assurance and compliance is broad topic of discussion with several issues to address to comprehend it in totality. The current discussion is about the factors responsible for the individual propensity towards IA, external and internal factors responsible, organizations and employees more concerned of IA, A frame work for IA compliance etc.

Reference no: EM131076337

Questions Cloud

State independence with insurance refers to : State independence with insurance refers to
Supreme court in hobby lobby and citizens united : Do you agree with the outcome of theH obby Lobbycase? Discuss what rights if any were given to businesses by the Supreme Court in Hobby Lobby and Citizens United. Explain how these two decisions may affect the rights of both business owners and of em..
What would be the equivalent net savings per machine hour : You have purchased a machine costing $30000. The machine will be used for 2 years, and at the end of this time, its salvage value is expected to be $18000. The machine will be used for 6,000 hours during the first year and 8000 during the second year..
Discuss the process of the medicalization : After you view the film, One Flew Over the Cuckoo’s Nest, respond to the following two questions: 1. Labeling theory refers to the idea that deviance and conformity result not so much from what people do as from how others respond to those actions. D..
Audit program for application systems for auditing : Discuss which employees and organizations have a deeper-level of information assurance (IA) policy compliance and examine the factors that increased the individual's level of propensity for compliance.
Define a class to represent a node in a doubly linked chain : In a doubly linked chain, each node can point to the previous node as well as to the next node. Figure 4-9 shows a doubly linked chain and its head pointer. Define a class to represent a node in a doubly linked chain.
All income in economy is either profit income or wage income : Firm C produces 1,000 pounds of cotton at a cost of 50 cents per pound. They sell all of the cotton to Firm S for 75 cents per pound. Firm S makes 1,000 t-shirts with the cotton for a total cost of $1.50 per t-shirt. There are no other firms in this ..
How long would it take giant tortoise to travel five meters : A giant tortoise can walk about 1/10 meter per second on land. A cooter turtle can walk about 1/2 per second on land. how long would it take a giant tortoise to travel five meters?
Case of managerial hubris : For this assignment, read the case study, "The 1920 Farrow's Bank Failure: A Case of Managerial Hubris." This case is located in the ABI/Inform Complete database found in the CSU Online Library (see reference below). Hollow, M. (2014). The 1920 Fa..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain the organizational authentication technology

Identify and describe the organizational authentication technology and network security issues and make a list of access points internal and external (remote) and design a secure authentication technology and network security for GFI.

  How does csma-ca in dcf handle media contention

How does the WiMAX privacy sublayer provide security for a WiMAX network? How does CSMA/CA in DCF handle media contention?

  Which of the cia goals did tjx fail to achieve in attack

Research the TJX data breach case on the web and answer the following questions.

  Briefly describe the purpose of firewalls?

While sitting in the break room at work one day, Stan is talking with his friend Joe, who is excitedly describing an idea for a new intrusion detection system (IDS).

  Arbitrary number system with the independent

Consider an arbitrary number system with the independent digits as 0, 1 and X. What is the radix of this number system? List the first 10 numbers in this number system.

  What would the subnet mask be in dotted decimal notation

Assume the address of a network host is 198.4.81.120/27. If the first address in the subnet range is the address of the network that address would be

  Des operating on a general plaintext input

DES operating on a general plaintext input 1st with key K1 and then with key K2 manufactures the same output as if K2 were first used and then K1.

  Conduct a complete penetration testing

Conduct a complete penetration testing on one or two targets and create a professional and well formatted Penetration

  You have been hired as the system administrator for msp llc

desktop migration proposalyou have been hired as system administrator for msp llc. your first task involves in

  Evaluate the threat environment of the organization

Evaluate the threat environment of the organization. Analyze the environment in which the organization operates, including the current protocols and policies in place related to information assurance.

  Include strategies for developing secure software

You want to convince your software development manager that the team needs to include strategies for developing secure software. Your first step is to help your manager understand the common sources of risks in software. 1. Write a ½ to 1 page memo t..

  Strategy for dealing with the risk

For each malicious attack and threat identified, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd