Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the results of your security audit based on the following audit process: Potential Risk to be Reviewed: Describe the risk. Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data. Regulation and Compliance Issues: Analyze how regulations and compliance issues could impact the organization. Provide a detailed analysis of regulations and compliance issues, beyond the simple explanation in score point two. Regulation and Compliance Resources and Tools: Analyze what resources and/or tools are available to address regulations and compliance issues. Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be more than one control that should be reviewed for a potential risk. Example: Determine whether anti-virus software is in use. Example: Determine whether virus signatures are periodically updated. Example: Determine whether periodic virus scans are performed. Provide a detailed analysis of the resources and/or tools available, . beyond the simple explanation in score point two. IT Security - Processes and Methods: Differentiate between the various processes and methods involved in management of IT security resources. Review the various options available to address those processes and methods previously explained, and which ones might be feasible. IT Security - Measures: Analyze the various security measures that could be taken within the organization. . Demonstrate a detailed understanding of what the alternatives are to approach security, how much security is needed, different methods to employ, etc. Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level). Example: 100% of servers and PCs have virus software installed. Example: 100% of the virus software installed is set to automatically update, including virus signatures. Example: 100% of the virus software installed is set to automatically perform a scan at least weekly. Include a 1/2- to 1-page executive summary to support your presentation. Include appropriate references. Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the results of your security audit based on the following audit process: Potential Risk to be Reviewed: Describe the risk. Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data. Regulation and Compliance Issues: Analyze how regulations and compliance issues could impact the organization. Provide a detailed analysis of regulations and compliance issues, beyond the simple explanation in score point two. Regulation and Compliance Resources and Tools: Analyze what resources and/or tools are available to address regulations and compliance issues. Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be more than one control that should be reviewed for a potential risk. Example: Determine whether anti-virus software is in use. Example: Determine whether virus signatures are periodically updated. Example: Determine whether periodic virus scans are performed. Provide a detailed analysis of the resources and/or tools available, . beyond the simple explanation in score point two. IT Security - Processes and Methods: Differentiate between the various processes and methods involved in management of IT security resources. Review the various options available to address those processes and methods previously explained, and which ones might be feasible. IT Security - Measures: Analyze the various security measures that could be taken within the organization. . Demonstrate a detailed understanding of what the alternatives are to approach security, how much security is needed, different methods to employ, etc. Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level). Example: 100% of servers and PCs have virus software installed. Example: 100% of the virus software installed is set to automatically update, including virus signatures. Example: 100% of the virus software installed is set to automatically perform a scan at least weekly. Include a 1/2- to 1-page executive summary to support your presentation. Include appropriate references.
Expert Answer:
Answer rating: 100% (QA)
Title Security Audit Results Presentation Slide 1 Introduction Welcome and introduction Overview of the security audit process Slide 2 Potential Risk ... View the full answer
Related Book For
Income Tax Fundamentals 2013
ISBN: 9781285586618
31st Edition
Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven L Gill
Posted Date:
Students also viewed these programming questions
-
As a project manager, you have the singular gift of being able to handle a hundred responsibilities at once, including delegating tasks, removing any blockers from a project, and making sure everyone...
-
List three specific parts of the Case Guide, Objectives and Strategy Section (See below) that you had the most difficulty understanding. Describe your current understanding of these parts. Provide...
-
How the COVID-19 pandemic affected the demand curves for oil and online shopping. Using EXCEL focusing on the graphic presentation of data and forecasting using linear functions on the Pandemic...
-
What is performance measurement?
-
In warm regions where tropical plants grow but the temperature may drop below freezing a few times in the winter, the destruction of sensitive plants due to freezing can be reduced by watering them...
-
Using the Diversity Wheel as a lens, introduce and describe a construction owner to your classmates in Using the Diversity Wheel as a lens, introduce and describe yourself as a construction owner to...
-
The time to prepare a slide for high-throughput genomics is a Poisson process with a mean of two hours per slide. What is the probability that 10 slides require more than 25 hours to prepare?
-
Vista Company installed a standard cost system on January 1. Selected transactions for the month of January are as follows. 1. Purchased 18,000 units of raw materials on account at a cost of $4.50...
-
Cameron Cookiest produces gourmet cookies, which sell for $16 a basket. Variable costs per basket are $6 and fixed costs are $5,000 per month. If the company expects to sell 1,500 baskets of cookies,...
-
Alex Yeoman Painting Co. of Yellowknife uses a purchases journal (page 21) and a general journal (page 32) to record the following transactions. The GST rate is 5%. The paint store has decided to...
-
1. Why is it important to define a task before you try to delegate it to others? 2. Describe the kinds of questions you would ask to a person you are trying to have a "Can You? Will You?"...
-
A small wave pulse and a large wave pulse approach each other on a string; the large pulse is moving to the right. Some time after the pulses have met and passed each other, which of the following...
-
During a call with analysts and investors, Boeing CEO Dave Calhoun was asked, How do you change the culture as a big organization? He responded that it was a tough question. The Boeing workforce was...
-
Binta Niambi Brown is the CEO and cofounder of Fermata Entertainment Ltd., an innovative startup in the music industry. She faced an ethical dilemma. Brown was about to close a $3 billion asset...
-
Most people in this country obtain health insurance through employer-sponsored plans. Although the historical background you just read explains how this system came about, it does not discuss whether...
-
Facebooks campus in Menlo Park, California, includes a large sign reading The Hacker Company and a giant HACK configured into the surface of one of its many pedestrian plazas. Founder Mark Zuckerberg...
-
A causal system is given by the following linear difference equation 3y[n]-4y[n 1] + y[n-2] =x[n-1] (a) Determine the system transfer function H(z). (b) Find the impulse response h[n]. (c) Explain...
-
Explain the buyers position in a typical negotiation for a business. Explain the sellers position. What tips would you offer a buyer about to begin negotiating the purchase of a business?
-
The following additional information is available for the Dr. Ivan and Irene Incisor family from Chapters 1-4. Ivan and Irene paid the following in 2012 (all by check or can otherwise be...
-
Jerry made the following contributions during 2012: His synagogue (by check).....................................................$680 The Democratic Party (by check)...
-
During 2012, Tom sold Sears stock for $10,000. The stock was purchased 4 years ago for $13,000. Tom also sold Ford Motor Company bonds for $35,000. The bonds were purchased 2 months ago for $30,000....
-
What are the values of the feathering parameters for the airfoils given by Examples 8.5 and 8.6? Examples 8.5 Assume an airfoil pitching about its leading edge and plunging with \(k=0.35\) as follows...
-
Obtain the lift and propulsive force coefficients of an airfoil given in Example 8.6, and compare the results with Problem 8.30. Assume the profile pitches about midchord. Example 8.6 The NACA 0012...
-
Find the heat transfer rate \(\mathrm{q}_{\mathrm{w}}\) at \(\mathrm{x}=10 \mathrm{~cm}\) and \(100 \mathrm{~cm}\) for the flat plate given in Problem 7.31. Problem 7.31 A flat plate of \(4...
Study smarter with the SolutionInn App