Develop a disaster recovery plan for recovering

Assignment Help Management Information Sys
Reference no: EM131884527

Managing an IT Infrastructure Audit

This assignment consists of four (4) sections: an internal IT audit policy, a management plan, a project plan, and a disaster recovery plan.

You must submit all four (4) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.

Imagine you are an Information Security Manager for a large national retailer. You have been hired to be directly responsible for the planning and oversight of IT audits. At the request of the Board of Directors, the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure.

The planning and management aspects of IT audit are critical to the overall success of the audit, and as a result, the overall success of the systems implemented within the organization. You must develop a policy for conducting IT audits and develop a project plan for conducting two week IT audits.

In addition to the typical networking and Internetworking infrastructure of a medium-sized organization, the organization has the following characteristics:

They have a main office and 268 stores in the U.S.

They utilize a cloud computing environment for storage and applications.

Their IT infrastructure includes Cisco workgroup and core switches, Cisco routers, Cisco firewalls and intrusion prevention systems, and servers running Microsoft Windows Server 2012.

They have over 1000 desktops and approximately 500 organization-owned laptops in the main headquarters.

They allow employees to bring their own devices into the organization; however, they are subject to being searched upon entry and exit from the building.

They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners.

They enable wireless access at the main office and the stores.

They process an average of 67.2 credit card transactions per hour every day at each location and via their corporate Website.

Section 1: Internal IT Audit Policy

Write a three to four (3-4) page paper in which you:

1. Develop an Internal IT Audit Policy, which includes at a minimum:

a. Overview

b. Scope

c. Goals and objectives

d. Compliance with applicable laws and regulations

e. Management oversight and responsibility

f. Areas covered in the IT audits

g. Frequency of the audits

h. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 2: Management Plan

Write a four to six (4-6) page paper in which you:

2. Explain the management plan for conducting IT audits, including:

a. Risk management

b. System Software and Applications

c. Wireless Networking

d. Cloud Computing

e. Virtualization

f. Cybersecurity and Privacy

g. BCP and DRP

h. Network Security

i. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 3: Project Plan

Use Microsoft Project or an Open Source alternative, such as Open Project to:

3. Develop a project plan which includes the applicable tasks for each of the major areas listed below for each element of the IT audit mentioned above; plan for the audit to be a two (2) week audit.

a. Risk management

b. System software and applications

c. Wireless networking

d. Cloud computing

e. Virtualization

f. Cybersecurity and privacy

g. Network security

Section 4: Disaster Recovery Plan

Write a five to seven (5-7) page paper in which you:

4. Develop a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization.

a. The organization must have no data loss.

b. The organization must have immediate access to organizational data in the event of a disaster.

c. The organization must have critical systems operational within 48 hours.

d. Include within the DRP the audit activities needed to ensure that the organization has an effective DRP and will be able to meet the requirements stated above.

e. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Reference no: EM131884527

Questions Cloud

What are the binding policies adopted by the language : Write a short paper on C macros, comparing them with routines. What are the binding policies adopted by the language?
Define the information security governance and management : Define the information security governance and management tasks that senior management needs to address.
Provide a full description of a simplesem implementation : Provide a full description of a SIMPLESEM implementation of call by value. Provide a full description of a SIMPLESEM implementation of call by result.
The change in the market risk premium : If the stock's beta is equal to 1.0, then the change in required rate of return will be less than the change in the market risk premium.
Develop a disaster recovery plan for recovering : Develop a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization.
What inventory system do you use and why : You own Widgets ‘R Us and are preparing your year-end financial statements. What inventory system do you use and why? What are its advantages and disadvantages
What is the variance of portfolio : What is the variance of a portfolio that invests $30 in Stock A and $90 in Stock B?
Why the static and dynamic links have same value for blocks : Discuss a SIMPLESEM abstract implementation using dynamic allocation for C4' nested blocks. Explain why the static and dynamic links have same value for blocks.
Define purpose of the management discussion and analysis : How are each of the following financial statements interrelated? (a) Retained earnings statement and income statement.

Reviews

Write a Review

Management Information Sys Questions & Answers

  What are the pros and cons of methods such as single sign-on

What are the pros and cons of methods such as Single Sign-On (SSO). Weigh the user benefits to security risks when considering the remote access methods.

  Procurement and contract management

What do you believe is the "big picture" and what solution do you propose for the above scenario and Can this be a win/win situation or does it have to be a win/lose situation?

  Decide the troubleshooting methodology that you would use

Write a two to four (2-4) page paper in which you: Decide the troubleshooting methodology that you would use for each issue. Provide a rationale to support your response

  Project planning execution and closurescenarioyour company

project planning execution and closurescenarioyour company rick auto enterprises rae is upgrading its legacy billing

  How bandwidth and compression methodologies may affect

Discuss three reasons for carefully considering long-term decisions, and describe three examples of how a poor decision in these areas might affect the organization's ability to be successful. Include specifics where possible. Your initial respons..

  Neural networks recognize and categorize patterns

If someone were to have a neural network that could scan information on all aspects of your life, where would that neural network potentially be able to find information about you?

  What is scalability and why is it an important factor

ICT115 Introduction to System Design Assignment. Provide a 750 word summary answering the question; what is scalability and why is it an important factor to consider when making recommendations to the franchise

  Differences between symmetric and asymmetric encryption

the differences between symmetric and asymmetric encryption

  Describe the values of the two business intelligence tools

Business intelligence tools are considered the key drivers for many organizations. Identify and evaluate at least two business intelligence tools .

  How is the trend toward open systems

How is the trend toward open systems, interoperability and connectivity related to business use of the Internet, intranets, and extranets?

  Determine what cyber security metrics are important

Using academic research materials determine what Cyber Security Metrics are and which ones are most important to an Information Security team at an institution of higher education such as the University of Cincinnati

  Examine the invention and growth of crowdsourcing of design

Examine the invention and growth of crowdsourcing in the field of interface design.Describe the impact that crowdsourcing has had on the field of interface design.Analyze and discuss at least three (3) benefits of incorporating crowdsourcing in a des..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd