Planning an it infrastructure audit for compliance

Assignment Help Management Information Sys
Reference no: EM131644711

Term Paper:

Planning an IT Infrastructure Audit for Compliance

The audit planning process directly affects the quality of the outcome. A proper plan ensures that resources are focused on the right areas and that potential problems are identified early.

A successful audit first outlines the objectives of the audit, the procedures that will be followed, and the required resources.

Choose an organization you are familiar with and develop an eight to ten page IT infrastructure audit for compliance in which you:

1.Define the following items for an organization you are familiar with:

1.Scope

2.Goals and objectives

3.Frequency of the audit

4.Duration of the audit

2. Identify the critical requirements of the audit for your chosen organization and explain why you consider them to be critical requirements.

3. Choose privacy laws that apply to the organization, and suggest who is responsible for privacy within the organization.

4. Develop a plan for assessing IT security for your chosen organization by conducting the following:

1. Risk management

2. Threat analysis

3. Vulnerability analysis

4. Risk assessment analysis

5. Explain how to obtain information, documentation, and resources for the audit.

6. Analyze how each of the seven (7) domains aligns within your chosen organization.

7. Align the appropriate goals and objectives from the audit plan to each domain and provide a rationale for your alignment.

8. Develop a plan that:

1. Examines the existence of relevant and appropriate security policies and procedures.

2. Verifies the existence of controls supporting the policies.

3.Verifies the effective implementation and ongoing monitoring of the controls.

Identify the critical security control points that must be verified throughout the IT infrastructure, and develop a plan that includes adequate controls to meet high-level defined control objectives within this organization.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM131644711

Questions Cloud

Focus on knowledge of management : Your assessment should focus on your knowledge of management (work, experience, style, strengths, challenges, etc....).
What political and economic differences have europe develope : Deterrence rests on the assumption that any nuclear power has a credible second-strike capability.
Why might independence be desirable : Why might independence be desirable? What characteristics of an agency may promote independence or "insulation"?
Was the contract a bilateral or a unilateral contract : Was the contract a bilateral or a unilateral contract? Does Bickham win? Bickham v. Washington Bank & Trust Company, 515 So.2d 457, Web 1987 La.App.
Planning an it infrastructure audit for compliance : Identify the critical requirements of audit for your chosen organization and explain why you consider them to be critical requirements
Compute the mix and quantity variance for these data : A-Zone Media sells two models of e-readers. Compute the mix and quantity variance for these data
Biostatistics and social sciences does epidemiology draw : What fields other than biostatistics and social sciences does epidemiology draw from? What disciplines does epidemiology borrow from and how does it differ.
The crime rates in comparison to the number of executions : Describe whether California policy has had any impact on crime. Include in your discussion the crime rates in comparison to the number of executions.
How do the centers for medicare and medicaid services : How do the Centers for Medicare and Medicaid Services (CMS) Hospital Acquired Conditions (HACs) compare with nurse-sensitive indicators

Reviews

Write a Review

Management Information Sys Questions & Answers

  Examine general security concerns for cloud-based solutions

Analyze the security features of Linux, Macintosh, and Windows operating systems, and decide which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Justify your response.

  Rei''s supply chain management and method of distribution

REI's Supply Chain Management/Channel/Method of Distribution - how they use supply chain management and if it works well or could it use any improvements.

  Display your name in the largest-size heading element

Write the code to display your name in the largest-size heading element.Write the markup language code for an unordered list to display the days of the week.

  What makes a good executive summary

Discuss potential capstone project ideas and your thoughts on why it would be a good project. What are some concerns you would have for this type of project?

  Discuss the concept of progressive discipline

Discuss the concept of progressive discipline and the importance of effective termination procedures.

  Write a memo to the ceo of the company

Write a memo to the CEO of the company describing what you believe are the three most serious threats to the company from cyberattacks. These could be attacks directly against the company, or attacks against others than have indirect effect on the..

  Discuss about preparing an adequate data model

Using specialization hierarchies can provide an efficient application development structure. Justify the use of surrogate primary keys for a database design. Provide an example to support your response.Historical data can be important to measurin..

  What can airlines do to improve customer experience using it

What can airlines do to improve the customer experience using IT? Explain how you would use IT to decrease wait times at TSA security lines.

  A description of the current system

A summary of the problems faced by the library, including those involved in transitioning from the current LMS system to the new one

  Determine the fundamental obstacles or challenges

Determine the fundamental obstacles or challenges that business management in general must overcome in order to implement data analytics.

  Which entity should have the most influence on the design

which entity should have the most influence on the design of a database system management or the workers?give an

  Discuss of benefits and disadvantages of using group policy

Pick on of the policy that is available in Windows 2012 Server and explain it. Why do you think this policy is an important one to implement in an organization? What are the negative consequences for not setting this up properly?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd