Develop a plan for assessing it security for your chosen

Assignment Help Management Information Sys
Reference no: EM132182660

Term Paper: Planning an IT Infrastructure Audit for Compliance

Note: Chapter 5 of the required textbook may be helpful in the completion of the assignment.

The audit planning process directly affects the quality of the outcome. A proper plan ensures that resources are focused on the right areas and that potential problems are identified early. A successful audit first outlines the objectives of the audit, the procedures that will be followed, and the required resources.

Choose an organization you are familiar with and develop an eight to ten page IT infrastructure audit for compliance in which you:

Define the following items for an organization you are familiar with:

Scope

Goals and objectives

Frequency of the audit

Duration of the audit

Identify the critical requirements of the audit for your chosen organization and explain why you consider them to be critical requirements.

Choose privacy laws that apply to the organization, and suggest who is responsible for privacy within the organization.

Develop a plan for assessing IT security for your chosen organization by conducting the following:

Risk management

Threat analysis

Vulnerability analysis

Risk assessment analysis

Explain how to obtain information, documentation, and resources for the audit.

Analyze how each of the seven (7) domains aligns within your chosen organization.

Align the appropriate goals and objectives from the audit plan to each domain and provide a rationale for your alignment.

Develop a plan that:

Examines the existence of relevant and appropriate security policies and procedures.

Verifies the existence of controls supporting the policies.

Verifies the effective implementation and ongoing monitoring of the controls.

Identify the critical security control points that must be verified throughout the IT infrastructure, and develop a plan that includes adequate controls to meet high-level defined control objectives within this organization.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe the parameters required to conduct and report on IT infrastructure audit for organizational compliance.

Describe the components and basic requirements for creating an audit plan to support business and system considerations

Develop IT compliance audit plans

Use technology and information resources to research issues in security strategy and policy formation.

Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM132182660

Questions Cloud

What are some of the network security testing tools used : What are some of the Network Security Testing Tools used on networks. Describe them, provide a link to the tool.
Explain american political culture : What did French writer Alexis De Tocqueville observe about the United State and how does his observations help explain American Political Culture?
What have you learned from the class : Create a sleep log for 5 days. After you complete your sleep log, analyze how you feel about your sleep, and write a response.
Do drug and medical device price controls : Do drug and medical device price controls need to be addressed by the government?
Develop a plan for assessing it security for your chosen : Identify the critical requirements of the audit for your chosen organization and explain why you consider them to be critical requirements.
Determining dependent and independent variables : Need help with determining dependent and independent variables.
What you found to be particularly compelling : Your individual response to the material and readings. This may involve an assessment of what you found to be particularly compelling and/or problematic.
What is causing them to go extinct : What is causing them to go extinct? Where do they live? What do they eat? Do they migrate? Why do we need this species? What happens if it goes extinct?
How the recommendations will assure that finmans property : Justify how your recommendations will assure that Finman's property, patents, copyrights, and other proprietary rights are protected.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Analyze the asp model and other outsourcing models

Analyze the ASP model and other outsourcing models as they apply to Riordan to understand outsourcing as an option. Provide the potential success or downfall of each, including partial outsourcing, single-application ASP support, or network system..

  Explore the bank data available on the lms

CISC520 : Explore the bank data available on the LMS, and an accompanying description of the attributes and their values.

  How information technology assists in risk management

How information technology assists in risk management, continuous monitoring, business continuity planning and disaster recovery of a business?

  Which of the access controls and storage controls would be

Which of the access controls and storage/transmission controls would be most helpful for the ACARS problem? The entertainment system problem?

  Supply chain and sourcing strategy1 what approach would you

supply chain and sourcing strategy1 what approach would you take if asked to re-evaluate your organizations current

  Dimensions of system dependability

Dimensions of System Dependability-Consider the four principal dimensions of dependability. Choose two dimensions, describe them, and explain the relationship between your chosen dimensions

  Explain your perspective on the workstation issue

You are an information security consultant and have recently been hired by a new client to update their information security program.

  Compare the three top browsers chrome ms ie and

compare the three top browsers chrome ms ie and firefoxthere are multiple internet browsers available today and many

  How remote users will securely connect to the government

The remote workers use a wireless network infrastructure to connect their electronic pads to servers located within the local government's facility.

  What it can do to improve the given issue

how this issue affects IT systems. Then consider what IT can do to improve that issue. Finally, think about what IT is incapable of doing to improve that issue.

  Explore current european and united states industry standard

Critically analyze current European and United States industry standards or recommendations for any Information Technology (IT) area or subarea.

  Project- protecting embedded oss on alexander rocco network

Case Project: Protecting Embedded OSs on the Alexander Rocco Network- After performing enumeration tests, you discover that the network consists of 5 systems running Windows Embedded Standard, 2 systems running Windows Server 2008 R2 for Embedded ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd