Critically analyze the part of an information security audit

Assignment Help Auditing
Reference no: EM131299172 , Length:

Information security audit

OBJECTIVES

This assignment is designed to assess students' ability to:

- Produce a concise detailed report about the importance of information security audit policy and its components
- To have excellent understanding relating to information security audit policy and its components
- To develop skills in manipulating and performing an information security audit
- To be able to define components of information security audit policy according to corporate requirements
- To be able to manage metrics, statistics, and facts about security audit policy effectively.
- Use of CU Harvard referencing system to cite and reference academic resources

OUTCOME

Student must have understanding of the following points

- Develop Information Security audit baseline(s).
- Perform an audit to identify events and corrective actions.
- Produce an audit-letter (report) to the organization's senior management.

Tasks:

These days, most of organizations are considering information security audit as a high priority due to the above said reasons. Hence, An information security audit is an audit on the level of information security in an organization. The organization's IT environment has to be controlled to meet the business requirements. For that purpose, an effective risk-based Information Security audit program with generally accepted audit standards and guidelines should be developed. Critically analyze and provide your findings on the following four aspects of information security audit

Task 1:

Assignment work proposal submission

Task 2:

The auditor should have a sufficient knowledge about the company and its critical business activities before starting an audit review. Critically analyze the part of an Information Security auditor towards audit planning and preparation.

Task 3:

The auditor should consider various criteria the auditing approach. Analyze one of information security auditing frameworks or approaches that an auditor should establish over starting the auditing process.

Task 4:

The technical auditing is consider main phase of IS auditing. Therefore, as IS auditor evaluate the different types of controls and their use in Information Security audit.

Task 5:

As an Information Security Auditor, conduct an audit on network security tools of any organization (of your choice) and provide a comprehensive report to its senior management. The auditing report should include the auditor's (in this case your) inquiries and procedures followed during audit in detail.

TASK1: Work Proposal

Submit a work proposal for this assignment on or before, which must include: Understanding of deliverables - a detail description of deliverables, General overview of proposed plan - initial understanding of solution to all the tasks, Resources identified, Work proposal should be submitted in the form of word document in Moodle

TASK 2: Audit planning and preparation

Expected topics - meeting with management, review current/existing reports, review job descriptions, review organization's IT policies and procedures, Evaluate the company's IT budget and systems planning documentation, etc.

TASK 3: Auditor's established frameworks for an audit process

Expected topics - Analyze one of information security auditing frameworks or approaches that an auditor should establish over starting the auditing process. Include definitions, process, phases, advantages, versions and diagrams

TASK 4: Analyze the type of controls

Expected topics - detailed description on various possible control types

TASK 5: Perform audit and generate report

Expected topics - report on proper format as close to an audit charter, evidence on findings, description of inquiries and procedures followed, use of risk assessment, corporate governance applied, audit planning, etc.

Verified Expert

The said paper is in relation to the IT audit. Here we have discussed in detail the audit of IT system of an organization. All the audit procedure starting from audit planning to process of conducting the business to concluding the same has been discussed in detail. The paper is supported with relevant examples and diagram as well.

Reference no: EM131299172

Questions Cloud

What is a bond and what characteristics does it possess : What is a bond and what characteristics does it possess? What is a stock? Why is it that the value of stocks fluctuate after they have been initially issued?
Prove that the voltage drop across the loop filter resistor : Assume Vcont can vary from 0 to VDD. Prove that the voltage drop across the loop filter resistor reaches roughly 1.6πVDD if no second capacitor is used.
Is the variable state categorical or quantitative : Is the variable "state" categorical or quantitative? To show the distribution of these data, would you use a pie chart or a bar graph?
Find the equations for marginal revenue curve : a. Find the equations for marginal revenue curve and the marginal cost curve. b. Find the profit maximizing level of output and the profit maximizing price. At this combination, what is the level of firm profit? What is the level of deadweight loss..
Critically analyze the part of an information security audit : Information Security Audit (COMP 0392) - The auditor should have a sufficient knowledge about the company and its critical business activities before starting an audit review. Critically analyze the part of an Information Security auditor towards ..
Develop flight scheduling application for fly-bynight airlie : You have been asked to develop a Flight Scheduling application for the Fly-By-Night Airline. The Airline has one or more flights per day but they are not by time.
Market clearing device in rural credit markets : How does your answer to A) change if the probability of repayment falls to 60%? In the context of this application, explain why interest rates are often not used as a market clearing device in rural credit markets.
Explain from given equation what happens to output sidebands : A PLL is designed with an input frequency of 1 MHz and an output frequency of 1 GHz.- Explain from given Equation what happens to the output sidebands.
What is the real interest rate : In 1999, the Canadian economy was at full employment. Real GDP was $886 Billion, the nominal interest rate was around 6 percent per year, the inflation rate was 2 percent a year, the price level was 110, and the velocity of circulation was constan..

Reviews

inf1299172

12/7/2016 5:53:49 AM

Hello Expertsmind, Thank you particularly for the paper, I should concede that I was suspicious about this anticipate, however I am happy to have utilized your service. I have another venture coming up, double the length, and I am sure that I will enlist ExpertsMind.com to help me with it.

inf1299172

12/7/2016 5:49:11 AM

I want this information security audit assignment. 2500 words. So please I request you to hire the best tutor who has good knowledge about it. Please make sure the tutor is fit until the modification time and please hire a tutor who is capable enough to take this responsibility and complete the assignment properly as per the requirements.

len1299172

12/3/2016 1:21:25 AM

1 Task 1: Proposal submission 2 Task 2: Audit planning and preparation 3 Task 3: frameworks 4 Task 4: Types of controls 5 Task 5: Perform audit and generate report

len1299172

12/3/2016 1:21:08 AM

Follow the guidelines mentioned below for your assignment. ? Assignment should be submitted through Moodle (Turnitin). ? Handwritten assignments will not be accepted ? Assignment should have a Title Page. Title Page should contain the following information. • College logo • Module Name & code • Semester details • Student name • Student ID ? It should have Table of Contents ? Use page numbers ? Assignment should be typed in your own words using Times New Roman font size 12. ? Heading should be with Font Size 14, Bold, Underline ? Use Diagrams and Examples to explain your topic. ? Copy paste from the Internet is strictly not acceptable. ? In-text citation and referencing using Harvard Coventry style

Write a Review

Auditing Questions & Answers

  1middot use what you have learned through chapter 7 of

1middot use what you have learned through chapter 7 of executive roadmap to fraud prevention and internal control text

  Compare and contrast an it audit project with other projects

Compare and contrast an IT Audit project with other projects which might be found in an IT department. Describe two (2) challenges that are unique to IT Audit projects. Suggest an approach to mitigate each challenge you selected.

  1select two of the following scenarios explain why you

1.select two of the following scenarios. explain why you selected each and give an example of how statistics might be

  Which em code was overused the most

Prior to the audit, what is the total amount the clinic charged for code 99215? Which EM Code was overused the most? Which EM Code was underused the most?

  Defining population when sampling

What is the importance of defining the population when performing audit procedures? How would defining the population affect the sample size? How would incorrectly defining the population affect the sampling unit?

  Describe audit procedures to ensure the depreciation rates

Identify the weaknesses in the stocktake procedures above and identify how they could be improved. Weakness Improvement - Describe audit procedures to ensure the accuracy of the summary of property plant and equipment

  Holmes institute faculty of higher education

You are required to read the following statement issued by ICAA (Institute of Chartered Accountants in Australia and provide an essay of between 1,000-1,500 words (being the minimum and maximum). It should be properly referenced and must be primar..

  Activity-based costing information

Jog Road Company's cost system assigns MSDA expenses to customers using a rate of 33% of sales revenue. The new CFO has discovered that Jog Roads's customers differ greatly in their ordering patterns and interaction with the company's sales force.

  Must cite sources according to proper apa formatting

Must be typewritten in Times New Roman or Arial 12-point font, double spaced, and with 1-inch margins;

  What are the categories of audit standards you will use

What are the categories of audit standards you will use? What will you do when you gather evidence of an incident? Why do you need to know the positions of duties of IS employees as well as managers in terms of evidence collection?

  Differences and similarities in audit of financial statement

What are the differences and similarities in audits of financial statements, compliance audits and operational audits?

  1 the components of teamcentral include which of the

1. the components of teamcentral include which of the following?a. implementation trackingb. management dashboardsc.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd