Disaster recovery plan

Assignment Help Basic Computer Science
Reference no: EM132921229

Assignment - Managing an IT Infrastructure Audit

Overview

This assignment consists of four distinct elements: an internal IT audit policy, a management plan, a project plan, and a disaster recovery plan. You must submit all four sections as separate files. Name each file as indicated in the instructions below.

Make any assumptions needed for the completion of this assignment, and base your work on the following scenario:

You are an information security manager for a large national retailer and are directly responsible for the planning and oversight of IT audits. At the request of the board of directors, the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure. The planning and management aspects of IT audit are critical to the overall success of the audit and, consequently the overall success of the systems implemented in the organization.

You must develop a policy for conducting IT audits and develop a project plan for conducting two-week IT audits.

In addition to the typical networking and Internetworking infrastructure of a medium-sized organization, the organization has the following characteristics:

• They have a main office and 268 stores in the United States.

• They use a cloud computing environment for storage and applications.

• Their IT infrastructure includes Cisco workgroup and core switches, Cisco routers, Cisco firewalls and intrusion prevention systems, and servers running Microsoft Windows Server 2012.

• They have over 1,000 desktops and approximately 500 organization-owned laptops at the main headquarters.

• They allow employees to bring their own devices into the organization; however, they are subject to search upon entry and exit from the building.

• They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners.

• They enable wireless access at the main office and the stores.

• They process an average of 67.2 credit card transactions per hour, every day, at each location, and via their corporate website.

Section 1: Internal IT Audit Policy.

1. Develop an internal IT audit policy, which includes at a minimum:

• Overview.

• Scope.

• Goals and objectives.

• Compliance with applicable laws and regulations.

• Management oversight and responsibility.

• Areas covered in the IT audits.

• Frequency of the audits.

2. Use at least two quality resources. Note: Wikipedia and similar websites do not qualify as quality resources.

Section 2: Management Plan.

1. Explain the management plan for conducting IT audits, including:

• Risk management.

• System software and applications.

• Wireless networking.

• Cloud computing.

• Virtualization.

• Cybersecurity and privacy.

• BCP and DRP.

• Network security.

2. Use at least three quality resources. Note: Wikipedia and similar websites do not qualify as quality resources.

Section 3: Project Plan.

Use Microsoft Project or an open source alternative such as Open Project to:

1. Develop a project plan that includes the applicable tasks for each of the major areas listed below for each element of the IT audit mentioned above; plan for a two-week audit.

• Risk management.

• System software and applications.

• Wireless networking.

• Cloud computing.

• Virtualization.

• Cybersecurity and privacy.

• Network security.

Section 4: Disaster Recovery Plan.

1. Develop a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization.

• The organization must have no data loss.

• The organization must have immediate access to organizational data in the event of a disaster.

• The organization must have critical systems operational within 48 hours.

2. Include within the DRP the audit activities needed to ensure that the organization has an effective DRP and will be able to meet the requirements stated above.

3. Use at least three quality resources.

The specific course learning outcome associated with this assignment is:

• Develop an internal IT audit policy, a management and project plan for conducting IT audits, and a disaster recovery plan (DRP).

Reference no: EM132921229

Questions Cloud

Risk assessment and business continuity plan : Identify data center assets and activities to be assessed. Identify relevant threats and vulnerabilities. Identify relevant types of controls to be assessed.
Compute total net operating cash flows : Compute total net operating cash flows based on the following information from JKL Co's income statement for the year ended 12/31/X1
What sense can gandhi life be considered a success : What sense can Gandhi's life be considered a success? Returning to the Socratic credo "a good man is not harmed in life or death" and better to suffer injustice
Determine the ending balances for Contributed Capital : Common Stock ($10 par value, 50,000 shares issued and outstanding) $500,000. Determine the ending balances for Contributed Capital
Disaster recovery plan : Develop a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization.
Discuss the major movement of the biblical metanarrative : Discuss the major movement of the biblical metanarrative, its main character, and its implications for understanding the unity of the biblical books.
What role does magic play in contemporary societies : What role does magic play in contemporary societies? Why has magic has continued to survive in spite of dramatic gains in scientific knowledge?
What is absolutely true beyond a doubt : What is absolutely true beyond a doubt. Think about your own beliefs - is there anything that you (think you) know with absolute certainty?
What is the net advantage or disadvantage of reworking : The Manassas Company has 55 obsolete keyboards that are carried in inventory at a cost of $9,600. What is the net advantage or disadvantage of reworking

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the market equilibrium price and quantity

a. What is the market equilibrium price and quantity? Sketch your answer as well as calculate it numerically.

  Voltage transfer between a transducer output

Use the voltage divider equation to explain the desired output impedance of the transducer and the desired input impedance of the amplifier.

  Concept of an association related to that of mobility

How is the concept of an association related to that of mobility? Is a distribution system a wireless network? Discuss and support your claim.

  The coso framework of internal controls

The COSO framework of internal controls is practiced within companies around the world.

  What is a statement that assigns the value of n

Assuming you have declared a variable n of type int and a variable b of type byte, what is a statement that assigns the value of n to the variable b.

  Human resource department of medium-sized organization

You are a member of the Human Resource Department of a medium-sized organization that is implementing a new interorganizational system that will impact employee

  How many runs will be required in this design

How many runs will be required in this design? How does this compare with the design in Table 12.2?

  Process as service can help commercial enterprises

Discuss, how business process as a service (BPaaS) can help commercial enterprises. Compare and evaluate more qualitative v quantitative risk assessment.

  Explain its relationship to computer forensics

1. Describe e-discovery, and explain its relationship to computer forensics. 2. Discuss the purpose of information technology audits as they relate to the confidentiality, integrity, and availability of information.

  Possibility of three business computers

With the possibility of three business computers in his home, and all of his business records possibly vulnerable, this would be a good time to advise Bill.

  Producing at the output where marginal cost

A monopoly firm is producing at the output where marginal cost equals $6, marginal revenue equals $9, and average variable cost equals $5.

  Different types of brute force attacks

Write a 1- to 2 page paper in which you present the two (2) different types of brute force attacks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd