Managing an it infrastructure audit-3

Assignment Help Basic Computer Science
Reference no: EM133042346

You are an information security manager for a large national retailer and are directly responsible for the planning and oversight of IT audits. At the request of the board of directors, the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure. The planning and management aspects of IT audit are critical to the overall success of the audit and, consequently the overall success of the systems implemented in the organization.

You must develop a policy for conducting IT audits and develop a project plan for conducting two-week IT audits.In addition to the typical networking and Internetworking infrastructure of a medium-sized organization, the organization has the following characteristics:

They have a main office and 268 stores in the United States.

They use a cloud computing environment for storage and applications.

Their IT infrastructure includes Cisco workgroup and core switches, Cisco routers, Cisco firewalls and intrusion prevention systems, and servers running Microsoft Windows Server 2012.

They have over 1,000 desktops and approximately 500 organization-owned laptops at the main headquarters.

They allow employees to bring their own devices into the organization; however, they are subject to search upon entry and exit from the building.

They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners.

They enable wireless access at the main office and the stores.

They process an average of 67.2 credit card transactions per hour, every day, at each location, and via their corporate website.

1. Develop a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization.

2. The organization must have no data loss.

3. The organization must have immediate access to organizational data in the event of a disaster.

4. The organization must have critical systems operational within 48 hours.

Include within the DRP the audit activities needed to ensure that the organization has an effective DRP and will be able to meet the requirements stated above.

Reference no: EM133042346

Questions Cloud

Reduce the chance of becoming victim of identity theft : What are some practical steps you would suggest to general populace to safeguard their information and reduce the chance of becoming a victim of identity theft?
Understanding of concepts of search engines : Exploring the various layers of the web provides an understanding of the concepts of search engines and hidden aspects of information buried within them.
Explain impact of private equity firm acquisition : Explain the impact of private equity firm acquisition of manufacturing and retail firms.
Demonstrate connection to your current work environment : Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
Managing an it infrastructure audit-3 : You are an information security manager for a large national retailer and are directly responsible for the planning and oversight of IT audits.
Businesses operating in the information age : Do you agree that MIS is essential for businesses operating in the information age? Why or why not?
Define operational risk assessment : Define operational risk assessment, threat and vulnerability management (TVM), and risk management.
Why legal cyber inquiry into organization : Explain why a legal cyber inquiry into an organization would need to be made and the process that would then be followed
Research apple home pod : Research Apple Home Pod. How does it interact with smart home devices? Alexa is now connected to smart home devices such as thermostats and microwaves.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the simplified circular flow model

What is the Simplified Circular Flow Model? Explain how the Simplified Circular Flow Model applies to a real-life example

  Information retrieval system

An information retrieval system has a certain pair of average precision and recall values when the system returns 10 documents in response queries.

  Access options from the home to an isp

Your manager has tasked you with creating a Remote Employee Connection guide for IT. This guide will assist IT in setting up remote (work-from-home) employees to access the company's Intranet. These employees will use a VPN connection from their P..

  Role of hedge-speculative and ponzi finance

Kindleberger adopts a "Minsky model: of financial booms and crises, named after the economist Hyman Minsky. Describe the dynamics posited by this model, including not only the basic sequence of events (initial displacement, speculation, euphoria a..

  Design an application that instantiates a book

Design an application that instantiates a Book and a Text Book and demonstrates all the methods of each class.

  Objective-frequency distribution

Use the frequency distribution below, which shows the number of voters (in millions) according to age, to find the probability that a voter chosen at random.

  Federal data processing service

Assess the levels of security deficiencies inherent in the Brazilian Federal Data Processing Service original enterprise architecture.

  Find the order of all elements of the multiplicative groups

If you want to refresh your mental arithmetic skills, try not to use a calculator whenever possible, in particular for the first two groups

  Python program that contains while loop

Post a Python program that contains a while loop. The number of times the loop iterates should depend upon input supplied by the user.

  Elements of a potential wbs

Q1: Level 1 WBS Elements With reference to the referenced example job drawings list at least 5 Level 1 Elements of a potential WBS. Q2: Level 2 WBS Headings Select 5 of the Level 1 Elements from Q1 and list potential Level 2 Headings under each. ..

  Summarize by outlining the sequence of operations

Explain how an operating system can temporarily pass control of the CPU over to user code without risking an indefinite loss of control. Discuss the roles of timer interrupts, privileged mode operation, and memory protection and explain why all of..

  Identify a few academic or articles or academic

On the basis of your readings, refine your topics, thinking about what we know, what we do not know, and other possible ways the topic could be studied.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd