Conduct an audit on network security tools

Assignment Help Computer Network Security
Reference no: EM131316083

OBJECTIVES

This assignment is designed to assess students' ability to:

- Produce a concise detailed report about the importance of information security audit policy and its components
- To have excellent understanding relating to information security audit policy and its components
- To develop skills in manipulating and performing an information security audit
- To be able to define components of information security audit policy according to corporate requirements
- To be able to manage metrics, statistics, and facts about security audit policy effectively.
- Use of CU Harvard referencing system to cite and reference academic resources

Tasks:

These days, most of organizations are considering information security audit as a high priority due to the above said reasons. Hence, An information security audit is an audit on the level of information security in an organization. The organization's IT environment has to be controlled to meet the business requirements. For that purpose, an effective risk-based Information Security audit program with generally accepted audit standards and guidelines should be developed. Critically analyze and provide your findings on the following four aspects of information security audit

Task 1:

Assignment work proposal submission

Task 2:

The auditor should have a sufficient knowledge about the company and its critical business activities before starting an audit review. Critically analyze the part of an Information Security auditor towards audit planning and preparation.

Task 3:

The auditor should consider various criteria the auditing approach. Analyze one of information security auditing frameworks or approaches that an auditor should establish over starting the auditing process.

Task 4:

The technical auditing is consider main phase of IS auditing. Therefore, as IS auditor evaluate the different types of controls and their use in Information Security audit.

Task 5:

As an Information Security Auditor, conduct an audit on network security tools of any organization (of your choice) and provide a comprehensive report to its senior management. The auditing report should include the auditor's (in this case your) inquiries and procedures followed during audit in detail.

Reference no: EM131316083

Questions Cloud

What are the generally accepted accounting principles : What is the ethical issue? What should you, the controller, do? What are the generally accepted accounting principles (GAAP) for reporting a lease as a capital lease?
What would be the primary benefits and the primary detriment : Ban the Box" is a movement to prohibit employers from requiring disclosure of past criminal convictions on employment applications. As we have discussed in this course, recidivism risk is much higher for offenders who are unable to obtain employme..
Create a new product that would appeal to your market : Create a new product that would appeal to your market. Develop at least one question for each characteristic of the target market that will be important for you as you determine the marketing strategy for this new product.
What is a poynting vector : Discuss how the fields far from a physical antenna vary inversely proportional to the distance from the antenna.
Conduct an audit on network security tools : Information Security Audit (COMP 0392) - The auditor should have a sufficient knowledge about the company and its critical business activities before starting an audit review. Critically analyze the part of an Information Security auditor towards ..
What was most recent dividend per share paid on stock : Secolo Corporation stock currently sells for $53 per share. The market requires a return of 8.6 percent on the firm’s stock. If the company maintains a constant 2.3 percent growth rate in dividends, what was the most recent dividend per share paid on..
Construct a syntax directed translation scheme : Construct a syntax-directed translation scheme that trans-lates arithmetic expressions from infix notation into prefix notation in which an operator appears before its operands; e.g., -xy is the prefix notation for x -y
Discuss polarization of sinusoidally time-varying fields : Discuss the propagation of uniform plane waves arising from an infinite plane current sheet of nonsinusoidally time-varying surface current density.
What is the role of committees and task forces : What is the role of committees, task forces, and councils in the organization, and who is invited to join? Consider how this relates to formal and informal leadership

Reviews

len1316083

12/17/2016 1:10:17 AM

Task Poor Not Attempt ed/ Plagiariz ed Report Average Report with partially correct details Good Complete report with few references Excellent Excellent work with complete and accurate details and appropriate references Task 1: Proposal submission 0 1-2 3-4 5 Task 2: Audit planning and preparation 1-2 3-5 5-8 10 Task 3: frameworks 1-2 3-5 5-8 10 Task 4: Types of controls 0 1-2 3-4 5 Task 5: Perform audit and generate report 1-3 4-8 9-16 20

len1316083

12/17/2016 1:09:48 AM

Follow the guidelines mentioned below for your assignment. - Assignment should be submitted through Moodle (Turnitin). - Handwritten assignments will not be accepted - Assignment should have a Title Page. Title Page should contain the following information. • College logo • Module Name & code • Semester details • Student name • Student ID - It should have Table of Contents - Use page numbers - Assignment should be typed in your own words using Times New Roman font size 12. - Heading should be with Font Size 14, Bold, Underline - Use Diagrams and Examples to explain your topic. - Copy paste from the Internet is strictly not acceptable. - In-text citation and referencing using Harvard Coventry style

len1316083

12/17/2016 1:09:19 AM

TASK 4: Analyze the type of controls Expected topics – detailed description on various possible control types TASK 5: Perform audit and generate report Expected topics – report on proper format as close to an audit charter, evidence on findings, description of inquiries and procedures followed, use of risk assessment, corporate governance applied, audit planning, etc.

len1316083

12/17/2016 1:08:34 AM

TASK1: Work Proposal Submit a work proposal for this assignment on or before, which must include: Understanding of deliverables – a detail description of deliverables, General overview of proposed plan - initial understanding of solution to all the tasks, Resources identified, Work proposal should be submitted in the form of word document in Moodle TASK 2: Audit planning and preparation Expected topics – meeting with management, review current/existing reports, review job descriptions, review organization’s IT policies and procedures, Evaluate the company’s IT budget and systems planning documentation, etc. TASK 3: Auditor’s established frameworks for an audit process Expected topics - Analyze one of information security auditing frameworks or approaches that an auditor should establish over starting the auditing process. Include definitions, process, phases, advantages, versions and diagrams

len1316083

12/17/2016 1:07:23 AM

• Prepare a report in MS-Word format not exceeding 25 pages describing the tasks 1 to 4 and upload it to Moodle. • Prepare a PowerPoint presentation to explain your findings and actions on the tasks 1 to 4 and upload it to Moodle. This will be used during viva exam.

len1316083

12/17/2016 1:07:14 AM

This assignment is designed to assess students’ ability to: • Produce a concise detailed report about the importance of information security audit policy and its components • To have excellent understanding relating to information security audit policy and its components • To develop skills in manipulating and performing an information security audit • To be able to define components of information security audit policy according to corporate requirements • To be able to manage metrics, statistics, and facts about security audit policy effectively. • Use of CU Harvard referencing system to cite and reference academic resources

Write a Review

 

Computer Network Security Questions & Answers

  Explain the purpose of using cvss scores

Select a recent vulnerability from that Database and analyse it from the what problems they can cause (malicious activities an attacker may use them for, including attack types)

  How can we determine sle if there no percentage given

How can we determine SLE if there no percentage given? Which method is easier for determining the SLE: - a percentage of value lost or cost per incident

  Why do these economic measures help

How to make economic mechanisms that help improve information security and management?

  Cisco firewall

Using the Web, research the costs associated with the following items when implemented by a firm with 1,000 employees and 100 servers, Managed antivirus software (not open source) license for 500 workstations, Cisco firewall

  Write the different techniques use in detecting intrusion

Explain in detail about system security and write down the different techniques use in detecting intrusion. Explain the answer must be accompanied by algorithm.

  Development of a new information system

Willowbrook School is a small private school that has retained your services as a systems analyst to assist in the development of a new information system for the school's administrative needs.

  Provide an overview of intellectual property law

Intellectual property law is a major issue facing organizations, and many organizations have been fined significant amounts for violations of intellectual property law. Provide an overview of intellectual property law

  Malware introductions to the network

Determine the best practices that should be implemented by the security department to help reduce the risks of malware introductions to the network. Propose what users and systems administrators should do when a potential infection has been suspec..

  Write vulnerabilities and methods of securing rpc

TCO C states "Given a computer network for data transmission, identify and analyze possibilities for loss or modification of data. Write down the vulnerabilities of RPC? What are the present methods of securing RPC?

  Effective biometric systems

Discuss why are many of the reliable, effective biometric systems perceived as intrusive by users and what are stateful inspection firewalls and how do the tables track the state and context of each exchanged packet?

  Providing security over data

The CIA triad (confidentiality, integrity, and availability) offers three (3) security tenets that allow data owners the framework to secure data. Considering your place of employment or your home computing environment, discuss in detail the prima..

  Perspective of current hot topics in information security

Build an understanding and perspective of current hot topics in Information Security and build generic skills including

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd