Analyze the audit planning and preparation

Assignment Help Auditing
Reference no: EM131388936 , Length:

Information Security Audit Assignment

OBJECTIVES - This assignment is designed to assess students' ability to:

  • Produce a concise detailed report about the importance of information security audit policy and its components
  • To have excellent understanding relating to information security audit policy and its components
  • To develop skills in manipulating and performing an information security audit
  • To be able to define components of information security audit policy according to corporate requirements
  • To be able to manage metrics, statistics, and facts about security audit policy effectively.
  • Use of CU Harvard referencing system to cite and reference academic resources

OUTCOME - Student must have understanding of the following points

  • Develop Information Security audit baseline(s).
  • Perform an audit to identify events and corrective actions.
  • Produce an audit-letter (report) to the organization's senior management.

Tasks:

These days, most of organizations are considering information security audit as a high priority due to the above said reasons. Hence, An information security audit is an audit on the level of information security in an organization. The organization's IT environment has to be controlled to meet the business requirements. For that purpose, an effective risk-based Information Security audit program with generally accepted audit standards and guidelines should be developed. Critically analyze and provide your findings on the following four aspects of information security audit.

Task 1: Assignment work proposal submission.

Task 2: The auditor should have a sufficient knowledge about the company and its critical business activities before starting an audit review. Critically analyze the part of an Information Security auditor towards audit planning and preparation.

Task 3: The auditor should consider various criteria the auditing approach. Analyze one of information security auditing frameworks or approaches that an auditor should establish over starting the auditing process.

Task 4: The technical auditing is consider main phase of IS auditing. Therefore, as IS auditor evaluate the different types of controls and their use in Information Security audit.

Task 5: As an Information Security Auditor, conduct an audit on network security tools of any organization (of your choice) and provide a comprehensive report to its senior management. The auditing report should include the auditor's (in this case your) inquiries and procedures followed during audit in detail.

TASKS DESCRIPTION -

TASK1: Work Proposal

Submit a work proposal for this assignment on or before, which must include: Understanding of deliverables - a detail description of deliverables, General overview of proposed plan - initial understanding of solution to all the tasks, Resources identified, Work proposal should be submitted in the form of word document in Moodle.

TASK 2: Audit planning and preparation

Expected topics - meeting with management, review current/existing reports, review job descriptions, review organization's IT policies and procedures, Evaluate the company's IT budget and systems planning documentation, etc.

TASK 3: Auditor's established frameworks for an audit process

Expected topics - Analyze one of information security auditing frameworks or approaches that an auditor should establish over starting the auditing process. Include definitions, process, phases, advantages, versions and diagrams.

TASK 4: Analyze the type of controls

Expected topics - detailed description on various possible control types

TASK 5: Perform audit and generate report

Expected topics - report on proper format as close to an audit charter, evidence on findings, description of inquiries and procedures followed, use of risk assessment, corporate governance applied, audit planning, etc.

Verified Expert

Reference no: EM131388936

Questions Cloud

Elements of the diagram clearly : Write a 2-3 page paper. (Note:  The Venn diagram should be located on a second or third page and can be any size as long as the instructor can see all the elements of the diagram clearly.)
Marketing strategies and marketing plans : Outline the difference between marketing strategies and marketing plans. Identify the characteristics of effective marketing strategies and marketing plans. (200-250 words)
Is the note negotiable : For the balance due on the purchase of a tractor, Henry Brown executed and delivered to Jane Jones his promissory note containing the following language:- Is the note negotiable? Explain.
Identify marketing strategies and the right marketing mix : Your organisation has been developing a new product. Market research, conducted prior to the development of the new product, indicated that it should be viable, will meet the needs of the target market and is going to be profitable. Many months ha..
Analyze the audit planning and preparation : COMP 0392 Information Security Audit Assignment. The auditor should have a sufficient knowledge about the company and its critical business activities before starting an audit review. Critically analyze the part of an Information Security auditor t..
Marketing objectives and progress toward achievement : Explain why it is a good idea to discuss marketing objectives and progress toward achievement of objectives with customers and personnel responsible for each element of the marketing mix. In your answer, list and expand on at least five of the obj..
Great deal of time and money marketing : Your organisation has spent a great deal of time and money marketing a new online store. What monitoring strategies that might be useful in this situation? Provide at least three examples and do not limit your answers to ideas provided in the text..
List the differences in product offerings in two countries : Choose a doughnut/cinnamon bun/bread company with presence in two global markets. List the differences in product offerings in these 2 host countries and then compare same to home based product.
Examine sustainability in the context of the organization : Examine sustainability in the context of the organization you selected. Why is sustainability a significant factor or entrepreneurial success? Explain the triple bottom line and how sustainability is a factor within the selected organization.

Reviews

len1388936

2/9/2017 11:43:21 PM

I want this information security audit assignment. 2500 words. So please I request you to hire the best tutor who has good knowledge about it. Please make sure the tutor is fit until the modification time and please hire a tutor who is capable enough to take this responsibility and complete the assignment properly as per the requirements. Prepare a report in MS-Word format not exceeding 25 pages describing the tasks 1 to 4 and upload it to Moodle. Prepare a PowerPoint presentation to explain your findings and actions on the tasks 1 to 4 and upload it to Moodle. Follow the guidelines mentioned below for your assignment. Assignment should be submitted through Moodle (Turnitin). Handwritten assignments will not be accepted. Assignment should have a Title Page. Assignment should be typed in your own words using Times New Roman font size 12. Heading should be with Font Size 14, Bold, Underline. Use Diagrams and Examples to explain your topic. In-text citation and referencing using Harvard Coventry style.

Write a Review

Auditing Questions & Answers

  Applicable financial reporting framework

An unmodified opinion is expressed by the auditors when they conclude that the financial statements are prepared, _____, in accordance with the applicable financial reporting framework.

  Interanl audit and internal control system

While not commonly discussed in the realm of risk management, the internal control system of an internal audit is a valuable tool for the risk manager.

  Describe importance of a working knowledge of contract low

Describe the importance of a working knowledge of contract law for performance, third party assignments, discharge, and breach and remedies for public accountants.

  Eastman publishing company is considering publishing

1.Eastman Publishing Company is considering publishing a paperback textbook on spreadsheet applications for business.

  Create a continuous internal control process

Choose a control that you find interesting, and do additional research to thoroughly explain it to your peers. Be sure to share your references - This organization is made up of representatives from the AICPA, the IIA, IMA, and other leading authorit..

  The bank statement showed a service charge of 56bull acorn

the bank statement showed a service charge of 56.bull acorn made a deposit on 31st may but this deposit did not appear

  Recognize the types of input validation techniques for the

recognize the types of input validation techniques for the subsequent inputs to the payroll system. describe the

  Define advantages and disadvantages of types of auditors

What are the advantages and disadvantages of the primary types of auditor? There are several types of auditors, the most common types of auditors are:

  Reconstructing revenue-net worth

While the net worth method focuses on the balance sheet and the increase in net worth for the year the bank deposit method looks at the money deposited and withdrawn throughout the year.

  Considering the internal control component

Which of the following describes the internal control component "monitoring of controls"?

  How does auditing promote common good

Provide a brief overview of the nature of the auditing/ethical issue/s involved with Fraud Auditing. How does auditing promote common good

  Audit reports and misstatements

What are the different types of audit reports and when should each be used? In what types of situations would an auditor be allowed to issue an unqualified audit report?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd