Managing an it infrastructure

Assignment Help Computer Engineering
Reference no: EM13779946

Managing an IT Infrastructure

This assignment consists of four (4) sections: an internal IT audit policy, a management plan, a project plan, and a disaster recovery plan. You must submit all four (4) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.

Imagine you are an Information Security Manager for a large national retailer. You have been hired to be directly responsible for the planning and oversight of IT audits.

At the request of the Board of Directors, the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure. The planning and management aspects of IT audit are critical to the overall success of the audit, and as a result, the overall success of the systems implemented within the organization. You must develop a policy for conducting IT audits and develop a project plan for conducting two week IT audits.

In addition to the typical networking and Internetworking infrastructure of a medium sized organization, the organization has the following characteristics:

  • They have a main office and 268 stores in the U.S.
  • They utilize a cloud computing environment for storage and applications.
  • Their IT infrastructure includes Cisco workgroup and core switches, Cisco routers, Cisco firewalls and intrusion prevention systems, and servers running Microsoft Windows Server 2012.
  • They have over 1000 desktops and approximately 500 organization owned laptops in the main headquarters.
  • They allow employees to bring their own devices into the organization; however, they are subject to being searched upon entry and exit from the building.
  • They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners.
  • They enable wireless access at the main office and the stores.

Section 1: Internal IT Audit Policy

1. Develop an Internal IT Audit Policy, which includes at a minimum:

1.     Overview

2.     Scope

3.     Goals and objectives

4.     Compliance with applicable laws and regulations

5.     Management oversight and responsibility

6.     Areas covered in the IT audits

7.     Frequency of the audits

8.     Use at least two (2) quality resources in this assignment

Section 2: Management Plan

2. Explain the management plan for conducting IT audits, including:

1.     Risk management

2.     System Software and Applications

3.     Wireless Networking

4.     Cloud Computing

5.     Virtualization

6.     Cybersecurity and Privacy

7.     BCP and DRP

8.     Network Security

9.     Use at least three (3) quality resources in this assignment.

Section 3: Project Plan

Use Microsoft Project or an Open Source alternative, such as Open Project to:

3. Develop a project plan which includes the applicable tasks for each of the major areas listed below for each element of the IT audit mentioned above; plan for the audit to be a two (2) week audit.

1.     Risk management

2.     System software and applications

3.     Wireless networking

4.     Cloud computing

5.     Virtualization

6.     Cybersecurity and privacy

7.     Network security

Section 4: Disaster Recovery Plan

4. Develop a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization.

1.     The organization must have no data loss.

2.     The organization must have immediate access to organizational data in the event of a disaster.

3.     The organization must have critical systems operational within 48 hours.

4.     Include within the DRP the audit activities needed to ensure that the organization has an effective DRP and will be able to meet the requirements stated above.

5.     Use at least three (3) quality resources in this assignment.

6.     Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one inch margins on all sides; citations and references must follow APA or school specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 

 

Reference no: EM13779946

Questions Cloud

Compare similarity between virtue theory and utilitarianism : Write a 350- to 700-word essay comparing the similarities and differences between virtue theory, utilitarianism, and deontological ethics.
Dimensions of sexuality of both clients : Consider the social, legal (including tax ramifications), health, moral, and other dimensions of sexuality of both clients and prostitutes in your answer.
Why team leaders assess their teams periodically : Why don't many managers or team leaders assess their teams periodically to identify problems and correct them before they affect team effectiveness
Question regarding the personal assessment : Answer the question of whether you are ready to be an entrepreneur. Identify those factors in your personality, business skills and lifestyle preferences that would support your entrepreneurial efforts.
Managing an it infrastructure : Imagine you are an Information Security Manager for a large national retailer. You have been hired to be directly responsible for the planning and oversight of IT audits.
Paper based upon a life-changing decision : Draft a six- to eight-page paper based upon a life-changing decision you or someone in your community has had to make. Address the following
Develop a framework for workload : The following order can act as a guideline, and you may want to alter it as you develop your PPT project. Pay attention to the schedule outlined on the calendar for the class requirements. It includes many of the graded requirement dates.
Lending institutions-health care and human capital : Use the Internet to research one (1) developing nation of your choice. Your research should include an examination of lending institutions, health care, and human capital, as well as the material covered by the Webtext and lectures in Weeks 6 thro..
How long is the coin expected to last in general use : Model does not have to be made of the specified material but should resemble it. The design on the model should match the proposed design.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What difficulties are associated with implementing it

What is the principle of adequate protection.What difficulties are associated with implementing it.

  Explain data link layer characteristics

Why is the Data Link layer considered to be the most unique layer amongst all the layers of the OSI Model.

  Express how to use the six steps of the psdlc

Each time you need to play a particular song, you have to manually search through the boxes to find the CD that has the song you need. It has become a habit that as individuals finish playing a CD, they would simply put it in the nearest box.

  The administration has asked you as it manager to prepare

pleasant creek community college registration system situation pleasant creek community college has a typical school

  Display the sorted sequence

Write a program name sorting.java that will use an array to store 10,000 randomly generated numbers (ranging from 1 to 10,000 no repeat number)

  Write a program that accepts data continuously

Write a program that accepts data continuously

  Design a logical right-shift register

Design a logical right-shift register using JK flip-flop. Parallel load the input 101011 into your circuit. Show all different clock cycles of the outputs from 101011 to 000000

  Testing the program

You are a member of SQA group at Ye Olde Fashioned Software. You propose to your manager that inspections be introduced.

  Create a shippedorder class that derives from order

Create a ShippedOrder class that derives from Order.

  How an error occurs in the transmission of a block

The cipher block chaining (CBC) mode has the property that it recovers from errors in cipher text blocks. Show that if an error occurs in the transmission of a block , but all the other blocks are transmitted correctly, after that this affects onl..

  What levels of osi model tcp/ip functions

in brief answer to explain at what levels of the OSI model TCP/IP functions.

  1 express the following numbers in cartesian rectangular

1. express the following numbers in cartesian rectangular form.2. express the following numbers in polar form. describe

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd