Auditing and accounting for user actions

Assignment Help Management Information Sys
Reference no: EM132190630

Final deliverable should be a comprehensive report that addresses several security domains.

Authentication (both administrative and end user)

Auditing and accounting for user actions

Encryption for data at rest and in flight

Mechanisms to detect attacks (outsider vs insider) This includes provisions for social engineering/phishing.

An incident response plan (identify stakeholders, responses to different levels of events, testing)

Physical security at HQ and physical security requirements for vendors.

The format is to open with a purpose statement. Then include a scope statement outlining the boundaries followed by a statement to define who is responsible for the document and the systems and a definition of stakeholders.

And a response for each subject area. Any frameworks or methodologies used should be clearly stated as well.

Any dependencies or controls that are inherited from the vendors should also be clearly stated.

Reference no: EM132190630

Questions Cloud

Create a pitch that is new and improved : For this week - please select your favorite holiday product and create a 'pitch' that is new and improved and designed to attract more consumers.
Explain the role of influence in policy advocacy : Explain the role of influence in policy advocacy. Toward whom are influence efforts directed? When does the influence begin, and when does it end
Perform the normalization process : Perform the normalization process to convert the above un-normalized table - Devise a checklist or form that helps Mr. Schnieder's employees evaluate
Is it a marketing cooperative or service cooperative : Is it a marketing cooperative, purchasing, or service cooperative? What type of integration? Who created it? Was there a specific need in that part.
Auditing and accounting for user actions : Mechanisms to detect attacks (outsider vs insider) This includes provisions for social engineering/phishing.
Discuss a draft policy or plan for review : Discuss a draft policy or plan for review. What problem does it address, and what solutions does it propose? Identify the possible stakeholders' interests
Are there applications that will change society : Research the topic of wearable technology. What types are currently in use? What types are in development? Are there applications that will change society?
What kind of product is the given company selling : Choose any brand or company you are interested in and answer the following questions based on the brand/company you have chosen.
Where can an organization place the information security : What is the typical size of the security staff in a small organization? A medium-sized organization? A large organization? A very large organization?

Reviews

Write a Review

Management Information Sys Questions & Answers

  What role does artistic lines and patterns play in web page

What are the effect of using serif fonts vs san-serif fonts in your typography? What role does artistic lines and patterns play in web page design?

  Establish enterprise objectives for selected system

Establish enterprise objectives for selected system. Obtain a copy of the organisational chart of the enterprise for which you work. If one does not exist, draw one up.

  Create a business process modeling notation diagram

Create a business process modeling notation diagram (BPMN) to explain your company's business activities. Insert the image IN YOUR DOCUMENT.

  Develop a product service idea

Develop a product service idea and Describe the product/service including the benefits of using the product/service.

  Describe all the necessary equipment

Describe all the necessary equipment. Explain the costs involved in the creation of the system.

  Explain centalization versus decentralization-i.s. function

Centalization versus decentralization: I.S. functions - This IS function typically either forms into a single corporate department with separate areas for individual IS functions or operates

  Identify the shortcomings of both it and the business

Overall, how effective is the partnership between IT and the business at Hefty Hardware? Identify the shortcomings of both IT and the business. Create a plan for how IT and the business can work collaboratively to deliver the Savvy Store program su..

  What are the major elements of a total compensation package

You are talking with another student who is complaining about having to learn the systems development life cycle because he or she is not going to work in an IT department. Would you agree with this student? What would you say to this student to t..

  Explain the techniques used to determine the true location

Many companies perform IP to geo-location analysis on their clients for various reasons such as marketing, interest or security. In 5 pages (no less, no more!) explain the techniques used to determine the true location of a host device on the Inte..

  Design and development for accountants

Update customer form created and update project form created - Information Systems Design and Development for Accountants

  Pros and cons to implementing a switched network

Imagine that you work as a network administrator for a medium-size company. You have suggested to your boss to upgrade the existing hubs with Cisco Catalysts switches. Provide justification for this action. Include at least three (3) pros and thre..

  How the main it-based developments in the networked domain

Discuss how the main IT-based developments in the networked e-business domain (the Big Five) are related to the various technology classes.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd