Audit or review of the information security issues, Computer Network Security

Using the selected approach, you should then conduct an audit or review of the information security issues associated with the use of computing facility and report on the findings.  It is important that in conducting this review, issues around the risks associated with the particular circumstances of your facility are appropriately considered.  It is also important that the review extends beyond the simple technical aspects of the situation.

Your report should include the following details:

  • a discussion of the methodology or review approach that you have adopted. You should identify the approach, briefly outline it key features, and you should provide a justification as to why this is an appropriate tool for this assignment. Where you have taken a recognised approach (or combination of approaches) and have modified them to suit the particular circumstances of this review, you should outline any rationale for these modifications;
  • a summary of the tasks undertaken to conduct the review. What steps did you follow in conducting the review? What evidence did you consider in helping you form your views? What tests did you perform in order to verify the answers to key review questions?
  • the findings of your review and recommendations for improvement. What issues from the situation came up looking good in the review, and where was there room for improvement? What things would you change in order to improve the information security environment?
  • a brief reflection on the methodology or review approach, following your experience of applying it to your personal computing facilities. Do you think this approach targeted the right issues? Did it leave anything out that you could see might be a significant information security issue? Did it expect certain security measures that you would regard as being unreasonable (assuming that you have applied the methodology in an appropriate way)? Did the approach allow for an adequate consideration of your risk profile and make allowances for risk management with these issues?
Posted Date: 2/20/2013 2:26:13 AM | Location : United States







Related Discussions:- Audit or review of the information security issues, Assignment Help, Ask Question on Audit or review of the information security issues, Get Answer, Expert's Help, Audit or review of the information security issues Discussions

Write discussion on Audit or review of the information security issues
Your posts are moderated
Related Questions
#Under what circumstances would the use of a SecSDLC be more appropriate than an SDLC?

PARITY BIT: A parity bit is an extra bit transmitted with data item select to give the resulting bit odd or even parity. For example an even parity data packet 10100001 has p

Attacker's Motives behind the Cyber Attack Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation

CRC can detect the following errors better than check sums. a) Vertical errors b) Burst errors a) VERTICAL ERRORS:  This kind of error happens due to a hardware fai

Question: (a) Consider that you enter the given URL in the address bar of a popular web client and that both the client and server accepts HTTP version 1.1. i. What can be t

Question (a) Draw a typical hybrid star-ring topology paying attention to how the clients and switching hubs are connected. (b) State 3 main differences between a router

WFABilling project in Java:  Project Title: WFABilling   Role                      : Developer Domain                 : Tele-Com Environment          : Java, J2EE, S

Question 1 (a) Explain briefly the following terms as used in network security: (i) Denial of service (DoS) attack (ii) Birthday attack (iii) DeMilitarized Zone

Explain in DES Data Encryption Standard : DES stands for Data Encryption Standard and is explained as follows: DES is at present the most widely used key cryptographic systems

MegaCorp INC. is a large manufacturing firm that operates 5 factories in Dallas, 4  factories in Los Angeles, and 5 factories in Albany, New York.  It operates a tightly  connected