Audit or review of the information security issues, Computer Network Security

Using the selected approach, you should then conduct an audit or review of the information security issues associated with the use of computing facility and report on the findings.  It is important that in conducting this review, issues around the risks associated with the particular circumstances of your facility are appropriately considered.  It is also important that the review extends beyond the simple technical aspects of the situation.

Your report should include the following details:

  • a discussion of the methodology or review approach that you have adopted. You should identify the approach, briefly outline it key features, and you should provide a justification as to why this is an appropriate tool for this assignment. Where you have taken a recognised approach (or combination of approaches) and have modified them to suit the particular circumstances of this review, you should outline any rationale for these modifications;
  • a summary of the tasks undertaken to conduct the review. What steps did you follow in conducting the review? What evidence did you consider in helping you form your views? What tests did you perform in order to verify the answers to key review questions?
  • the findings of your review and recommendations for improvement. What issues from the situation came up looking good in the review, and where was there room for improvement? What things would you change in order to improve the information security environment?
  • a brief reflection on the methodology or review approach, following your experience of applying it to your personal computing facilities. Do you think this approach targeted the right issues? Did it leave anything out that you could see might be a significant information security issue? Did it expect certain security measures that you would regard as being unreasonable (assuming that you have applied the methodology in an appropriate way)? Did the approach allow for an adequate consideration of your risk profile and make allowances for risk management with these issues?
Posted Date: 2/20/2013 2:26:13 AM | Location : United States

Related Discussions:- Audit or review of the information security issues, Assignment Help, Ask Question on Audit or review of the information security issues, Get Answer, Expert's Help, Audit or review of the information security issues Discussions

Write discussion on Audit or review of the information security issues
Your posts are moderated
Related Questions
Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any

algorithm on simple intrest

(a) Explain the two possible configuration for 3DES. (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d) Describe

(a) Describe the principal characteristics of associative memory networks? (b) Name the two basic types of associative memories and the differences between them. (c) Give an

Threat Identification After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats

Question a) From the capture below: Give the datagram source IP address, upper layer protocol, Total length in decimal and header checksum in hexadecimal; the segment source po

QUESTION (a) A convex flow problem is a non linear network flow problem. Explain how a convex flow problem could be transformed into a Minimum Cost Flow problem. (b) Exp

Discuss the risks of having a single root user

QUESTION (a) One of the biggest drawbacks that GNS3 has is that it supports only the IOS images of routers. This means that users cannot emulate Cisco switches. Suggest two sol

Techniques for combating Spam mails Many anti spam products are commercially available in market. But it should also be noted that no  one technique is a complete solution to