It auditing and security risk management unit

Assignment Help Basic Computer Science
Reference no: EM131186955

IT Auditing and Security Risk Management Unit 1 DB

Please provide information that has been certified as not similar to anything else on the internet or schools. I will not accept anything above 20% similarity according to my school verification. Please respond to my additional questions within 24 hours.

Scenario

Peak View Sound Sources is a public company based in Denver, Colorado and is focused on providing digital media and Web sites to music companies and musicians through the Mountain and West Coast regions. The company has a solid reputation and is starting to get some national and worldwide attention, with new prospective companies wanting to take advantage of the quality services they have seen on other existing Web sites.

Your company has been hired to assist Peak View Sound Sources (PVSS) to ascertain the security posture of the company's Information Systems resources and services. You are heading the team of auditors tasked to perform the audit and assessment.

You enter the company offices of PVSS and begin your analysis of the environment and situation.

Initial analysis has allowed you to determine that the company is made up of the following divisions:

  • Corporate Management and Support Staff: This organization contains the executive management, human resources, and accounting teams. All company decisions are directed from the management team.
  • Information Technology: This team manages the networks, servers, Web sites, and desktop environments for the company. The team has a perception of being difficult to work with, as they are slow to adopt new technology and slow to implement new offerings. The reality is that the team has resources and wants to uptake the newest and greatest technology, but they spend most of their time putting out fires and reacting to issues.
  • Media Content and Design: This team is in charge of working with the record companies and musicians to create the Web Sites and implement the product offerings that are sold.
  • Sales and Marketing: This team works with the musicians and record companies to offer and sell the services of PVSS.

There is a concern about the security of the infrastructure with respect to the ability to protect the copyrighted material that PVSS is given to host, because a single incident several years ago took place in which an entire new CD was released prematurely via the Internet. Although PVSS was not directly linked to the leak, there are suspicions surrounding PVSS.

Assignment Deliverables

As you continue your analysis, you see that the Information Technology (IT) department has developed several guidelines and procedures about how various systems should be considered and set up, but this is internal only to the IT department. Every time a new machine is set up and deployed, within a month, the configuration is changed.

  • Explain why you think the use of these guidelines and procedures is not sufficient and may not solve the problem. Consider how a company-wide policy program could help the situation.
  • As you begin to prepare your game plan to conduct an Information Security Audit, talk about why you think this current situation makes it difficult to identify the controls that need to be examined.
  • If you were performing this security audit, with which regulations would you want to ensure that PVSS complies? Why?

Reference no: EM131186955

Questions Cloud

What ways stakeholders assess organizational effectiveness : Stakeholders, by the nature of their role, conduct ongoing assessments of the effectiveness of organizations. What are some of the ways stakeholders assess organizational effectiveness? Which of these is most valid? Why? Is there ever a time when ..
How does the fly defeat the nests formidable defenses : How does the fly defeat the nest's formidable defenses and avoid detection? It manufactures chemicals to smell like an ant. You might have the impression that network-based intrusion detection tools.
How would you assess the business risk : How would you assess the business risk of HIH Insurance Limited?- What conditions need to exist for a negligence action to be upheld?.
Legal issues in information security and incident response : Using the online library, the Internet, and all course materials, research cyber criminals, their motives, and the forensic tools used to track an offender.
It auditing and security risk management unit : Peak View Sound Sources is a public company based in Denver, Colorado and is focused on providing digital media and Web sites to music companies and musicians through the Mountain and West Coast regions. The company has a solid reputation and is s..
Scanning for open wireless networks : Law and ethics are often both considerations when determining the reaction to a computer security incident. For instance, scanning for open wireless networks is not illegal unless the scanner connects to the network without permission. Discuss thi..
Determine the demand and revenue equations : If overhead is $2500 per month and the production cost per coat is $2000, find the cost equation and profit equation.
Article on creating competitive advantage : Write a two page article on creating competitive advantage via unstructured data?
Data communication information : Present an of the origin and of the concept. Describe the use of and toward the concept. Explain the strengths disadvantages) of the concept. Describe the prevailing view of about the likely future of the concept. Research and cite at least six (6..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The united states from lower slovenia

Ernest Rasche and his wife, Estelle, immigrated to the United States from Lower Slovenia in 1921, settling in Muncie Indiana. Rasche had been a talented plumber in the old country; he quickly found work at the XYZ Plumbing Supply Company.

  Why are timestamps used in the kerberos protocol

1. Why are timestamps used in the Kerberos protocol?

  Information system to use for stocks and trading futures

Write down some of the many considerations in selecting right information system to use for trading futures and stocks?

  Functions of file management in an operating system

For this assignment, discuss file management, which is the concept of how one would physically manage folders and files. First, select an operating system, such as Windows, Linux, or MacOS. Then, explore how this operating system could handle file..

  Write a select statement that columns from the products tab

Write a SELECT statement that returns these columns from the Products table

  Data governance improvements

Data Governance Improvements

  Facilitate assembly of information for business decisions

This module is about "business intelligence" and tools which facilitate assembly of information/knowledge in ways which enable "better" business decisions to be made.

  Write an instruction sequence to subtract the contents

Write an instruction sequence to subtract the contents of accumulator B from the 16-bit word at $1000~$1001 and store the difference at $1100~$1101.

  Decimal ascii number with an implied decimal point

Write a procedure named WriteScaled that outputs a decimal ASCII number with an implied decimal point.

  Follow ieee or acm paper templates

5 Pages or more, IEEE format for the paper, Try to have a suitable Title for the IEEE paper according to requirements. Make sure you include the OS listed plus the "others" Also, that all the 40 citations should be in the paper referenced. (5 onli..

  Prepare a new test table with at least 2 distinct test cases

What happens if you change the NUMMONTHS and NUMYEARS definitions to other values? Be sure to use both lower and higher values. Describe and implement fixes for any issues if errors results. Support your experimentation with screen captures of exe..

  Explaining origins or genesis of wireless networking

Explain origins/genesis of wireless networking.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd