Planning an it infrastructure audit for compliance

Assignment Help Management Information Sys
Reference no: EM131326217

Term Paper: Planning an IT Infrastructure Audit for Compliance

The audit planning process directly affects the quality of the outcome. A proper plan ensures that resources are focused on the right areas and that potential problems are identified early. A successful audit first outlines the objectives of the audit, the procedures that will be followed, and the required resources.

Choose an organization you are familiar with and develop an eight to ten (8-10) page IT infrastructure audit for compliance in which you:

1. Define the following items for an organization you are familiar with:

a. Scope

b. Goals and objectives

c. Frequency of the audit

d. Duration of the audit

2. Identify the critical requirements of the audit for your chosen organization and explain why you consider them to be critical requirements.

3. Choose privacy laws that apply to the organization, and suggest who is responsible for privacy within the organization.

4. Develop a plan for assessing IT security for your chosen organization by conducting the following:

a. Risk management

b. Threat analysis

c. Vulnerability analysis

d. Risk assessment analysis

5. Explain how to obtain information, documentation, and resources for the audit.

6. Analyze how each of the seven (7) domains aligns within your chosen organization.

7. Align the appropriate goals and objectives from the audit plan to each domain and provide a rationale for your alignment.

8. Develop a plan that:

a. Examines the existence of relevant and appropriate security policies and procedures.

b. Verifies the existence of controls supporting the policies.

c. Verifies the effective implementation and ongoing monitoring of the controls.

9. Identify the critical security control points that must be verified throughout the IT infrastructure, and develop a plan that includes adequate controls to meet high-level defined control objectives within this organization.

10. Use at least three (3) quality resources in this assignment.

The specific course learning outcomes associated with this assignment are:

  • Describe the parameters required to conduct and report on IT infrastructure audit for organizational compliance.
  • Describe the components and basic requirements for creating an audit plan to support business and system considerations
  • Develop IT compliance audit plans
  • Use technology and information resources to research issues in security strategy and policy formation.
  • Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM131326217

Questions Cloud

What is the standard error of the statistic between two mean : Exam: 250714RR- A random sample of males and females involved in rear-end accidents results in the following Minitab summary: What is the standard error of the statistic between the two means?
Show that f integrates to 1 and that it is a bimodal density : Compare those assessments with an on-line evaluation of the integral R f(x) d x based on the MCMC sample thus produced.
Discuss the difference between multicast and unicast routing : Discuss the difference between multicast and unicast routing. Choosing either one, describe where it can be used in your professional or personal life
Examine the x-ray of a patient diagnosed with pneumonia : Examine the laboratory blood test results and arterial blood gases provided in "Discussion Question Resource: Laboratory Blood Test Results." What laboratory values are considered abnormal? Explain each abnormality and discuss the probable causes ..
Planning an it infrastructure audit for compliance : Term Paper: Planning an IT Infrastructure Audit for Compliance. Identify the critical requirements of the audit for your chosen organization and explain why you consider them to be critical requirements
Find the parameters of the given ma process : Find the parameters of the following MA process using Innovations estimator. The MA process is of second order, with O1=0.5 and O2=0.2. Generate the data without noise, then find the parameters. Subsequently, add noise.
Find the thermal conductivity of charcoal : Two thin concentric spherical shells of radius 0.05 m and 0.15 m, respectively, have their annular cavity filled with charcoal. When energy is supplied at the steady rate of 10.8 W to a heater at the center, a temperature difference of 50°C is set..
What sample size would the entrepreneur have to take : Exam: 250713RR-If you assume that s = $0.50, what sample size would the entrepreneur have to take to be 95% confident that the estimate was within $0.25 of the true mean ticket prices?
Why the testing of software products is of great importance : Define and explain, in your own words, the primary challenge(s) of software development projects. Compare and contrast at least three (3) different software development methods. Explain why the testing of software products is of great importance

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain the trade-offs between contiguous

Explain the trade-offs between contiguous, noncontiguous linked, and noncontiguous indexed file allocation. In particular, note if each can be efficiently used for sequential and random access methods

  How can managers promote sound leadership

How can managers promote sound leadership practices and good ethical behavior?  Why are they important and how do you promote an environment where they thrive?

  Explain the key principles of data security

Prepare database design documents using the data definition, data manipulation, and data control language components of the SQL language.Describe the basic mechanisms for accessing relational databases from various types of application development ..

  What is the throughput time of the work cell

A work cell at Chris Ellis Commercial Laundry has a workstation with two machines, and each unit produced at the station needs to be processed by both of the machines. - What is the throughput time of the work cell?

  Explain some of the trade-offs you would consider

Explain some of the trade-offs you would consider when designing/acquiring the system. Be specific and support your reasoning with examples.

  Describe potential risks to the information and the related

write a 1000- to 1500-word paper on at least three major information security threats that a specific organization you

  Would you accept reject transfer or mitigate the risk

How would you handle this risk? Would you accept, reject, transfer, or mitigate it? How did you come to that decision?

  The unique service characteristic of perishability

How is the phenomenon of online booking for travel related to the unique service characteristic of perishability?

  Describing how information is used

Write a 700- to 1,050-word paper identifying and describing how information is used and how it flows in an organization. Explain this use in your current place of employment or an organization with which you are familiar

  What are the four types of consumer oriented applications

What are the four types of consumer oriented applications of E-commerce? Discuss them briefly.

  Design an algorithm to find the largest number

Javascript - How do I design an algorithm to find the largest number in a list of them?

  Create a 7-10 slide presentation identifying comparing and

create a 7-10 slide presentation identifying comparing and contrasting the it governance structure for two major

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd