Prepare an is audit plan and report to the management

Assignment Help Computer Engineering
Reference no: EM131037295 , Length: word count:2000

Requirement:

You need to choose a case study and write down all the IT risk as report. you can check what IT risk factor in the lecture notes.IS Audit Report

Important note:

- This is an individual assignment. You must complete the task independently. If you submit a report that is similar to any of your classmate's reports it will be considered academic dishonesty. Refer to the Macquarie University Academic Honesty Procedure and associated documents.

- Please also refer to the submission instruction as per unit guide.

Estimated student workload: 30 hours

Task

Perform a web search on recent (in the past 3 years) articles to find an interesting case study, such as news articles in relation to IS risks.

You will need to attach the original version of the case study or provide the URL link to the original case in the appendix when you submit the assignment.

Assuming that you are an IS auditor, prepare an IS audit plan and report to the management of your client. The document must include the followings:

1) Executive Summary
You will need to prepare an executive summary document (0.5 page maximum) to the board of directors.

2) Background to the Case
Background to the client's business and computerised environment. - This is to demonstrate your understanding of the client's business and IS environment.

3) IS Risks
Identify IS risks from the case study, including analysing the likelihood, level of risks and implications to the business.

4) Audit Plan, Objectives and Procedures
Prepare an audit plan outlining the areas that you propose to audit. In addition, you will need to include audit objectives and audit procedures for each of the area(s) that you plan to audit.

5) Audit Questions and Documents
For each of the audit objectives, provide at least three examples of interview questions that you will use to gather evidence from clients, including naming relevant documents that you may want to obtain for the audit.

6) Control Recommendations
Provide a set of recommendations of control mechanism(s) to mitigate for each of the IS risks. Identify the benefits of your recommendation to your client.

Required
Write a report that addresses all of the above sections.

- Format requirements: "Times New Roman" size 12 with 1.5 line spacing, approximately 1500
- 2000 words in total (not including references). You must include the total of words used in your report. The report should have appropriate headings and subheadings (including an introduction and conclusion).

- You must acknowledge the use of the work of others (e.g. the academic journal articles on which your report is based) using the Harvard referencing style (see https://www.lib.mq.edu.au/research/referencing.html). Any ideas or quotations must be correctly cited in the body of your report and a reference list must be provided at the end of your report.

- Once you have submitted your report, check the originality report in turn-it-in and ensure similarity with other sources is referenced. You can resubmit your report until the due date.

- Please note that the originality report for a resubmission takes 24 hours to be produced. Please ensure that you allow adequate time, if you are considering resubmission.

- Review the marking rubric so that you understand the expected standards and how you will receive feedback.

I have provide you a couple of case study in the pass three year, you can choose any of them to write.

I Have researched a few companies which i believe could be used for this assignment and attached links to get you opinion as to which company is the best options.

2014 JP Morgan Data Breach: https://www.businessinsider.com.au/jp-morgan-data-breach-2014-10?r=US&IR=T

2015 Anthem Data Breach: https://en.wikipedia.org/wiki/Anthem_medical_data_breach

2014 Credit Card Breach Target: https://techcrunch.com/2014/01/10/targets-data-breach-gets-worse-70-million-customers-had-info-stolen-including-names-emails-and-phones/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&utm_content=Netvibes

2016 Hollywood Presbyterian Medical Center: https://www.techtimes.com/articles/135310/20160222/la-hospital-hit-by-ransomware-pays-hackers-17-000-is-it-the-right-choice.htm (2) 8005-8227

Harvard Style

Number of Ref: Above 10

Reference no: EM131037295

Questions Cloud

How much are the annual payments : What rate of return must he earn in order to have the amount needed - What approximate return must his money earn so he may receive annual benefits of $30,000 for the next 10 years?
Determine the tension tb in the cord as the sphere passes : determine the tension TB in the cord as the sphere passes point B. Friction is negligible.
Identify the legal issues arising in agency : BULAW1503 - Identify the legal issues arising in agency from this scenario. Where relevant you should justify and support your answers with reference to statute and/or case law.
In what ways are mitosis and meiosis different : Describe in detail the process of respiration under anaerobic vs. aerobic condition. How is mRNA modified before it leaves the nucleus of a eukaryotic cell? In what ways are mitosis and meiosis different?
Prepare an is audit plan and report to the management : Perform a web search on recent (in the past 3 years) articles to find an interesting case study, such as news articles in relation to IS risks
Create an online business moduel : I required to create an online business moduel that allows people to connect wirh personal trainers via live, interactive video, and participate in one on oone group training seassons. as you could benifit from social media marketing its recommend..
Calculate the angular velocity ? : Calculate the angular velocity ω which the pendulum has immediately after impact and find the maximum angular deflection θ of the pendulum
Five essential elements of enforceable contract : Define the five essential elements of an enforceable contract, and demonstrate how each element relates to your example. Explain the circumstances of a breach of contract in your example, and discuss possible remedies.
For the bicmos differential amplifier : 9.102 For the BiCMOS differential amplifier in Fig. P9.102 let VDD = VSS =3 V, I = 0.2 mA, k1pW/L = 6.4 mA/V2; / VA/ for p-channel MOSFETs is 10 V, /VA/ for npn transistors is 30 V. Find Gm, Ro, and Ad .

Reviews

Write a Review

Computer Engineering Questions & Answers

  How to suggest a solution for the scenario of warehouse

How to Suggest a solution for the scenario of warehouse? Assume that the company has accumulated 20TB of data and that 20 percent per year growth is expected in size of Data Warehouse. Suggest a solution for this scenario with respect to software,..

  Identify the cost drivers that affect the development time

Estimate the cost in labor months of developing a complete software system that will be used by mechanical engineers to model thermal effects on engine parts. The program replaces an older version.

  List and describe three possible project risks and how they

q1. what personal characteristic do you think is most important for a cio and why?q2. list and explain three possible

  Questionjava program on a good doctor is defined as a

questionjava program on a good doctor is defined as a person who has all following properties-his first name should

  Suppose that you worked for a small company developing

assume you worked for a small company developing web-based software. further assume that your company presently makes

  Questionassume we have three classes alarmclock beeper and

questionassume we have three classes alarmclock beeper and alarmwindow. in following you see an interaction showing an

  Show output from the amazon web service

make Use of Visual Studio.NET 2005 to create an ASP.NET application that displays output from the Amazon web service. Add good documentation to the code. Furthermore, create a user-friendly interface.

  Database technology and mobile computing

Database technology and Mobile computing, Database Technology and Cloud Computing

  Questions on risc machine

Questions on RISC machine

  Demonstration of a gui program with radio buttons

demonstration of a gui program with radio buttons checkboxes and a numeric updown.create a gui program that a person

  Professional ethics play a vital role in the computing

professional ethics play a vital role in the computing profession. the conduct of it professionals influences many

  Compare the resulting postfix expression

For every postfix expression there exists a corresponding and uniquely express infix expression that evaluates to the same number. The converse is not true.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd