Audit program for application systems for auditing

Assignment Help Computer Network Security
Reference no: EM131076337 , Length:

Question:

Information Assurance Compliance with Government Regulations

Review the "Audit Program for Application Systems for Auditing" presented in Appendix B of the Cascarino text. Also, read the following articles, located in the course shell:

. "A Framework for Health Care Information Assurance and Policy Compliance" by Sherrie Drye Cannoy and A.F. Salam

. "Information Assurance and Corporate Strategy" by Elspeth McFadzean, Jean-Noël Ezingeard, and David Birchall

. "Five Most Common Cybersecurity Mistakes" from the Toledo Business Journal

Submission Requirements

Case Study Plan

Write a six to ten (6-10) page paper in which you:

1. Discuss which employees and organizations have a deeper-level of information assurance (IA) policy compliance.

2. Examine the factors that increased the individual's level of propensity for compliance.

3. Determine the internal and external factors affecting IA policy compliance.

4. Ascertain which of the organizational requirements poses difficulty in adopting technical features to enhance security policy.

5. Discuss factors related to IA and policy compliance that are affected by government regulations.

6. Suggest a framework that could be used to address the issues described in the "Five Most Common Cybersecurity Mistakes" article, based on the "Audit Program for Application Systems for Auditing".

7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Verified Expert

Information assurance and compliance is broad topic of discussion with several issues to address to comprehend it in totality. The current discussion is about the factors responsible for the individual propensity towards IA, external and internal factors responsible, organizations and employees more concerned of IA, A frame work for IA compliance etc.

Reference no: EM131076337

Questions Cloud

State independence with insurance refers to : State independence with insurance refers to
Supreme court in hobby lobby and citizens united : Do you agree with the outcome of theH obby Lobbycase? Discuss what rights if any were given to businesses by the Supreme Court in Hobby Lobby and Citizens United. Explain how these two decisions may affect the rights of both business owners and of em..
What would be the equivalent net savings per machine hour : You have purchased a machine costing $30000. The machine will be used for 2 years, and at the end of this time, its salvage value is expected to be $18000. The machine will be used for 6,000 hours during the first year and 8000 during the second year..
Discuss the process of the medicalization : After you view the film, One Flew Over the Cuckoo’s Nest, respond to the following two questions: 1. Labeling theory refers to the idea that deviance and conformity result not so much from what people do as from how others respond to those actions. D..
Audit program for application systems for auditing : Discuss which employees and organizations have a deeper-level of information assurance (IA) policy compliance and examine the factors that increased the individual's level of propensity for compliance.
Define a class to represent a node in a doubly linked chain : In a doubly linked chain, each node can point to the previous node as well as to the next node. Figure 4-9 shows a doubly linked chain and its head pointer. Define a class to represent a node in a doubly linked chain.
All income in economy is either profit income or wage income : Firm C produces 1,000 pounds of cotton at a cost of 50 cents per pound. They sell all of the cotton to Firm S for 75 cents per pound. Firm S makes 1,000 t-shirts with the cotton for a total cost of $1.50 per t-shirt. There are no other firms in this ..
How long would it take giant tortoise to travel five meters : A giant tortoise can walk about 1/10 meter per second on land. A cooter turtle can walk about 1/2 per second on land. how long would it take a giant tortoise to travel five meters?
Case of managerial hubris : For this assignment, read the case study, "The 1920 Farrow's Bank Failure: A Case of Managerial Hubris." This case is located in the ABI/Inform Complete database found in the CSU Online Library (see reference below). Hollow, M. (2014). The 1920 Fa..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Desktop publishing system

Consider a desktop publishing system used to produce documents for various organizations. a. Give an example of a type of publication for which confidentiality of the stored data is the most important requirement

  It infrastructure groups

Information Technology infrastructure groups are often responsible for direct customer interaction and associated customer service.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Best practices for securing the laptops and tablets

Describe one (1) approach that IT could use in order to ensure that they thoroughly test business critical applications. Describe three (3) best practices for securing the laptops and tablets for the sales staff after the upgrade is complete

  Symmetric encryption algorithms

block cipher and a stream cipher, Caesar cipher, cryptanalytic attacks, mono alphabetic cipher and a poly alphabetic cipher, Mix Columns, Add Round key, PGP services, traffic padding, contrast link and end-to-end encryption

  Define what does and does not constitute software security

Evaluate the extent to which programmers have the requisite experience to test the security of software within the development of a product

  What is the plaintext for the ciphertext 10000001

What is the ciphertext (in binary form) generated by the encryption of the character T (Please show your work.)

  Analyze the security of the system compriosing the size of

alice has a picture-based password system where she has each user pick a set of their 20 favorite pictures say of cats

  How many comparisons between hash values are needed

How many comparisons between hash values are needed in the worst case - compute in the worst case?

  Impair an organizations information security

Compare and contrast a minimum of five potential threats and evaluate how these threats may impair an organization's information security.

  What is utc and why is it used

How they are syncronised and why do they need to be syncronised and what is UTC and why is it used?

  Problem on network security planning

Securing a large internetwork remains a daunting challenge. Cloud computing and social networks add to this complexity. In two to three (2-3) pages, and using the CISCO SAFE reference architecture.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd