Analyze one of information security auditing frameworks

Assignment Help Auditing
Reference no: EM131305173 , Length:

OBJECTIVES

This assignment is designed to assess students' ability to:

- Produce a concise detailed report about the importance of information security audit policy and its components
- To have excellent understanding relating to information security audit policy and its components
- To develop skills in manipulating and performing an information security audit
- To be able to define components of information security audit policy according to corporate requirements
- To be able to manage metrics, statistics, and facts about security audit policy effectively.
- Use of CU Harvard referencing system to cite and reference academic resources

OUTCOME

Student must have understanding of the following points

- Develop Information Security audit baseline(s).
- Perform an audit to identify events and corrective actions.
- Produce an audit-letter (report) to the organization's senior management.

Tasks:

These days, most of organizations are considering information security audit as a high priority due to the above said reasons. Hence, An information security audit is an audit on the level of information security in an organization. The organization's IT environment has to be controlled to meet the business requirements. For that purpose, an effective risk-based Information Security audit program with generally accepted audit standards and guidelines should be developed. Critically analyze and provide your findings on the following four aspects of information security audit

Task 1:

Assignment work proposal submission

Task 2:

The auditor should have a sufficient knowledge about the company and its critical business activities before starting an audit review. Critically analyze the part of an Information Security auditor towards audit planning and preparation.

Task 3:

The auditor should consider various criteria the auditing approach. Analyze one of information security auditing frameworks or approaches that an auditor should establish over starting the auditing process.

Task 4:

The technical auditing is consider main phase of IS auditing. Therefore, as IS auditor evaluate the different types of controls and their use in Information Security audit.

Task 5:

As an Information Security Auditor, conduct an audit on network security tools of any organization (of your choice) and provide a comprehensive report to its senior management. The auditing report should include the auditor's (in this case your) inquiries and procedures followed during audit in detail.

- Prepare a report in MS-Word format not exceeding 25 pages describing the tasks 1 to 4 and upload it to Moodle.

- Prepare a PowerPoint presentation to explain your findings and actions on the tasks 1 to 4 and upload it to Moodle. This will be used during viva exam.

TASKS DESCRIPTION AND MARKS DISTRIBUTION

Marks will be awarded on each task based on the fulfilled following expectation

TASK1: Work Proposal

Submit a work proposal for this assignment on or before, which must include: Understanding of deliverables - a detail description of deliverables, General overview of proposed plan - initial understanding of solution to all the tasks, Resources identified, Work proposal should be submitted in the form of word document in Moodle

TASK 2: Audit planning and preparation

Expected topics - meeting with management, review current/existing reports, review job descriptions, review organization's IT policies and procedures, Evaluate the company's IT budget and systems planning documentation, etc.

TASK 3: Auditor's established frameworks for an audit process

Expected topics - Analyze one of information security auditing frameworks or approaches that an auditor should establish over starting the auditing process. Include definitions, process, phases, advantages, versions and diagrams

TASK 4: Analyze the type of controls

Expected topics - detailed description on various possible control types

TASK 5: Perform audit and generate report

Expected topics - report on proper format as close to an audit charter, evidence on findings, description of inquiries and procedures followed, use of risk assessment, corporate governance applied, audit planning, etc.

Verified Expert

This paper is completed in 7500 words in which we have explained 5 task such as 1.Work proposal, 2.Audit planning and preparation, 3.Criteria of Auditing Approach and one information security-auditing framework, 4.Different types of control and their usage in Information security auditing and 5.Perform audit and generate report, Network security tools at Tesco Bank, Inquries and procedures of IS/IT audit at Tesco Bank

Reference no: EM131305173

Questions Cloud

Draw a graph of the demand and supply of u s dollars : Draw a graph of the demand and supply of U.S. dollars in exchange for Japanese yen to illustrate each of the given situations.
Brief description of the technology : A brief overview of the technology: This must include a brief description of the technology and is a great place for a video or picture/diagram. An end page: You must provide an end page with brief conclusion. The use of sociological terms is requi..
What is the trade weighted exchange rate of the us dollar : What is the trade-weighted exchange rate of the U.S. dollar? What explains the increase in the trade-weighted exchange rate of the U.S. dollar in the late 1990s and late 2000s?
Write a program that draws such a target : Each ring has the same "width," which is the same as the radius of the yellow circle. Write a program that draws such a target. Hint: Objects drawn later will appear on top of objects drawn earlier.
Analyze one of information security auditing frameworks : Information Security Audit (COMP 0392) - The auditor should consider various criteria the auditing approach. Analyze one of information security auditing frameworks or approaches that an auditor should establish over starting the auditing process.
How would the flight to safety described : How would the flight to safety described in this article affect the exchange rate between the U.S. dollar and the euro?
Write a program that draws some sort of face : Write a program that draws 5 dice on the screen depicting a straight (1, 2, 3, 4, 5 or 2, 3, 4, 5, 6). 6. Modify the graphical future value program so that the input (principal and apr) also are done in a graphical fashion using Entry objects.
Discuss possible strategies counselors : What are some of the continued issues that this population faces in society? In your post, include strategies for counselors to take if biases and assumptions exist that could negatively impact the counseling process.
An article in the new york times claims : An article in the New York Times claims, "In a global market, the main reason one currency offers a higher interest rate than another is that it is compensating the holder for exchange rate risk."

Reviews

inf1305173

1/2/2017 5:16:05 AM

Cheerful to prescribe you to my companions. I like the way that the rights to the work return to me once the undertaking is finished. Likewise, the entire procedure appeared to be composed such a great amount of superior to my past experience.

len1305173

12/8/2016 2:40:02 AM

GUIDELINES Follow the guidelines mentioned below for your assignment. Assignment should be submitted through Moodle (Turnitin). Handwritten assignments will not be accepted Assignment should have a Title Page. Title Page should contain the following information. College logo Module Name & code Semester details Student name Student ID It should have Table of Contents Use page numbers Assignment should be typed in your own words using Times New Roman font size 12. Heading should be with Font Size 14, Bold, Underline Use Diagrams and Examples to explain your topic. Copy paste from the Internet is strictly not acceptable. In-text citation and referencing using Harvard Coventry style

len1305173

12/8/2016 2:38:56 AM

Sl. no. Task Poor Not Attempt ed/ Plagiariz ed Report Average Report with partially correct details Good Complete report with few references Excellent Excellent work with complete and accurate details and appropriate references 1 Task 1: Proposal submission 0 1-2 3-4 5 2 Task 2: Audit planning and preparation 1-2 3-5 5-8 10 3 Task 3: frameworks 1-2 3-5 5-8 10 4 Task 4: Types of controls 0 1-2 3-4 5 5 Task 5: Perform audit and generate report 1-3 4-8 9-16 20

Write a Review

 

Auditing Questions & Answers

  What you about the auditor management relationship

BUACC5935: Auditing & Assurance Services Assignment. Trust takes years to build, seconds to break, and forever to fix. What does this say about the auditor/management relationship

  Principles of internal control

Identify 6 principles of internal control. Give examples for each principle that might be observed when picking up pizza.

  Relationships of cash in bank and transaction cycles

Describe the relationships between cash in the bank and transaction cycles. Where are you likely to gain the most accurate information?

  What is the system of internal controls of cvs designed

Who is responsible for the integrity and objectivity of the financial statements of CVS? What is the system of internal controls of CVS designed to accomplish?

  The absco corporation has requested that herb germany

The Absco Corporation has requested that Herb Germany, CPA, provide a report to the Northern State Bank as to the existence or nonexistence of certain loan conditions. The conditions to be reported on are the working capital ratio, dividends paid on ..

  What procedures auditor use to gather additional evidence

Using either Excel or ACL, identify the stores for which sales appear to be out of line with the other stores and require additional evidence. What procedures would the auditor use to gather the additional evidence?

  Audit evidence-validity of sources of evidence

The third GAAS of field work requires that the auditor obtain sufficient competent audit evidence to afford a reasonable basis for an opinion regarding the financial statements under audit.

  What defenses do auditors use in response to litigation

What defenses do auditors use in response to litigation? What actions can auditors take to minimize litigation exposure?

  Different types of audits that can be performed

What are the different types of audits that can be performed? Identify and briefly describe one...there are several so several students can respond to this question with a unique answer.

  Describes specific criminal penalties for manipulation

Describes specific criminal penalties for manipulation, destruction or alteration of financial records or other interference with investigations, while providing certain protections for whistle-blowers and increases the criminal penalties associat..

  Provide internal audit service

Sole proprietor in pulic practice, plans to establish a separate department that will provide internal audit service to his audit clients.

  Separation of the programming and operating functions

How is the separation of the programming and operating functions accomplished in a properly functioning IT environment and explain the 3 subdivisions of information systems management, and discuss how they apply to this situation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd