Prepare an is audit plan and report to the management

Assignment Help Computer Engineering
Reference no: EM131037295 , Length: word count:2000

Requirement:

You need to choose a case study and write down all the IT risk as report. you can check what IT risk factor in the lecture notes.IS Audit Report

Important note:

- This is an individual assignment. You must complete the task independently. If you submit a report that is similar to any of your classmate's reports it will be considered academic dishonesty. Refer to the Macquarie University Academic Honesty Procedure and associated documents.

- Please also refer to the submission instruction as per unit guide.

Estimated student workload: 30 hours

Task

Perform a web search on recent (in the past 3 years) articles to find an interesting case study, such as news articles in relation to IS risks.

You will need to attach the original version of the case study or provide the URL link to the original case in the appendix when you submit the assignment.

Assuming that you are an IS auditor, prepare an IS audit plan and report to the management of your client. The document must include the followings:

1) Executive Summary
You will need to prepare an executive summary document (0.5 page maximum) to the board of directors.

2) Background to the Case
Background to the client's business and computerised environment. - This is to demonstrate your understanding of the client's business and IS environment.

3) IS Risks
Identify IS risks from the case study, including analysing the likelihood, level of risks and implications to the business.

4) Audit Plan, Objectives and Procedures
Prepare an audit plan outlining the areas that you propose to audit. In addition, you will need to include audit objectives and audit procedures for each of the area(s) that you plan to audit.

5) Audit Questions and Documents
For each of the audit objectives, provide at least three examples of interview questions that you will use to gather evidence from clients, including naming relevant documents that you may want to obtain for the audit.

6) Control Recommendations
Provide a set of recommendations of control mechanism(s) to mitigate for each of the IS risks. Identify the benefits of your recommendation to your client.

Required
Write a report that addresses all of the above sections.

- Format requirements: "Times New Roman" size 12 with 1.5 line spacing, approximately 1500
- 2000 words in total (not including references). You must include the total of words used in your report. The report should have appropriate headings and subheadings (including an introduction and conclusion).

- You must acknowledge the use of the work of others (e.g. the academic journal articles on which your report is based) using the Harvard referencing style (see https://www.lib.mq.edu.au/research/referencing.html). Any ideas or quotations must be correctly cited in the body of your report and a reference list must be provided at the end of your report.

- Once you have submitted your report, check the originality report in turn-it-in and ensure similarity with other sources is referenced. You can resubmit your report until the due date.

- Please note that the originality report for a resubmission takes 24 hours to be produced. Please ensure that you allow adequate time, if you are considering resubmission.

- Review the marking rubric so that you understand the expected standards and how you will receive feedback.

I have provide you a couple of case study in the pass three year, you can choose any of them to write.

I Have researched a few companies which i believe could be used for this assignment and attached links to get you opinion as to which company is the best options.

2014 JP Morgan Data Breach: https://www.businessinsider.com.au/jp-morgan-data-breach-2014-10?r=US&IR=T

2015 Anthem Data Breach: https://en.wikipedia.org/wiki/Anthem_medical_data_breach

2014 Credit Card Breach Target: https://techcrunch.com/2014/01/10/targets-data-breach-gets-worse-70-million-customers-had-info-stolen-including-names-emails-and-phones/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&utm_content=Netvibes

2016 Hollywood Presbyterian Medical Center: https://www.techtimes.com/articles/135310/20160222/la-hospital-hit-by-ransomware-pays-hackers-17-000-is-it-the-right-choice.htm (2) 8005-8227

Harvard Style

Number of Ref: Above 10

Reference no: EM131037295

Questions Cloud

How much are the annual payments : What rate of return must he earn in order to have the amount needed - What approximate return must his money earn so he may receive annual benefits of $30,000 for the next 10 years?
Determine the tension tb in the cord as the sphere passes : determine the tension TB in the cord as the sphere passes point B. Friction is negligible.
Identify the legal issues arising in agency : BULAW1503 - Identify the legal issues arising in agency from this scenario. Where relevant you should justify and support your answers with reference to statute and/or case law.
In what ways are mitosis and meiosis different : Describe in detail the process of respiration under anaerobic vs. aerobic condition. How is mRNA modified before it leaves the nucleus of a eukaryotic cell? In what ways are mitosis and meiosis different?
Prepare an is audit plan and report to the management : Perform a web search on recent (in the past 3 years) articles to find an interesting case study, such as news articles in relation to IS risks
Create an online business moduel : I required to create an online business moduel that allows people to connect wirh personal trainers via live, interactive video, and participate in one on oone group training seassons. as you could benifit from social media marketing its recommend..
Calculate the angular velocity ? : Calculate the angular velocity ω which the pendulum has immediately after impact and find the maximum angular deflection θ of the pendulum
Five essential elements of enforceable contract : Define the five essential elements of an enforceable contract, and demonstrate how each element relates to your example. Explain the circumstances of a breach of contract in your example, and discuss possible remedies.
For the bicmos differential amplifier : 9.102 For the BiCMOS differential amplifier in Fig. P9.102 let VDD = VSS =3 V, I = 0.2 mA, k1pW/L = 6.4 mA/V2; / VA/ for p-channel MOSFETs is 10 V, /VA/ for npn transistors is 30 V. Find Gm, Ro, and Ad .

Reviews

Write a Review

Computer Engineering Questions & Answers

  Questioncomputers are everywhere watching television

questioncomputers are everywhere. watching television driving a car using a credit card ordering fast food and the more

  You are required to compare and contrast the windows server

you are required to compare and contrast windows server 2003 r2 against windows server 2008 r2 in terms of the capacity

  Use the master theorem to solve bound

Prove bound is right using the substitution (induction) method

  Analyze running time of algorithm

Analyze running time of algorithm

  Make ajax programming based solutions to write a code

In the AJAX scripts you create, refer to the DSN datasource as flamingo. although its not in your own folder or directory, it has been set up as a SYSTEM DSN, so your AJAX script will have access to it.

  How methods with multiple parameters are declared

explain two examples of Java-based applications that might use methods that have two or more parameters. Provide detail about where those applications would be used.

  Make a gui based program with a writebutton

make a GUI Based program with a WriteButton used to write data to a sequential data file. Then make another ReadData button to read data from the file created and display it in a JTable on the GUI.

  Writenbspa javatm application using netbeanstm integrated

writenbspa javatm application using netbeanstm integrated development environment ide that calculates the total

  Write a program which simulates a forest fire

Write a program which simulates a forest fire on a 12 x 12 matrix. You will model the effects of the fire from it's inception until it burns out.

  Html and javascript

Write down the HTML and JavaScript: A 3x3 2D array: Arrays can have anything, even other arrays. In the JavaScript, 2D arrays are assigned with the single array, where each element consists of an array.

  Stages of a machine cycle in von neumann architecture

What is double buffering and which CUDA compute level introduced this mechanism - Discuss the following items in your own terms and give an example of an application which targets to optimize each (in computing).

  Object data within a relational database management system

I am finding it difficult to understand the following: Contrasting performance within a relational database management system with/without indexes, use numeric/non-numeric key fields, maintaining/generating calculated fields.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd