Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the results of your security audit based on the following audit process: Potential Risk to be Reviewed: Describe the risk. Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data. Regulation and Compliance Issues: Analyze how regulations and compliance issues could impact the organization. Provide a detailed analysis of regulations and compliance issues, beyond the simple explanation in score point two. Regulation and Compliance Resources and Tools: Analyze what resources and/or tools are available to address regulations and compliance issues. Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be more than one control that should be reviewed for a potential risk. Example: Determine whether anti-virus software is in use. Example: Determine whether virus signatures are periodically updated. Example: Determine whether periodic virus scans are performed. Provide a detailed analysis of the resources and/or tools available, . beyond the simple explanation in score point two. IT Security - Processes and Methods: Differentiate between the various processes and methods involved in management of IT security resources. Review the various options available to address those processes and methods previously explained, and which ones might be feasible. IT Security - Measures: Analyze the various security measures that could be taken within the organization. . Demonstrate a detailed understanding of what the alternatives are to approach security, how much security is needed, different methods to employ, etc. Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level). Example: 100% of servers and PCs have virus software installed. Example: 100% of the virus software installed is set to automatically update, including virus signatures. Example: 100% of the virus software installed is set to automatically perform a scan at least weekly. Include a 1/2- to 1-page executive summary to support your presentation. Include appropriate references. Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the results of your security audit based on the following audit process: Potential Risk to be Reviewed: Describe the risk. Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data. Regulation and Compliance Issues: Analyze how regulations and compliance issues could impact the organization. Provide a detailed analysis of regulations and compliance issues, beyond the simple explanation in score point two. Regulation and Compliance Resources and Tools: Analyze what resources and/or tools are available to address regulations and compliance issues. Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be more than one control that should be reviewed for a potential risk. Example: Determine whether anti-virus software is in use. Example: Determine whether virus signatures are periodically updated. Example: Determine whether periodic virus scans are performed. Provide a detailed analysis of the resources and/or tools available, . beyond the simple explanation in score point two. IT Security - Processes and Methods: Differentiate between the various processes and methods involved in management of IT security resources. Review the various options available to address those processes and methods previously explained, and which ones might be feasible. IT Security - Measures: Analyze the various security measures that could be taken within the organization. . Demonstrate a detailed understanding of what the alternatives are to approach security, how much security is needed, different methods to employ, etc. Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level). Example: 100% of servers and PCs have virus software installed. Example: 100% of the virus software installed is set to automatically update, including virus signatures. Example: 100% of the virus software installed is set to automatically perform a scan at least weekly. Include a 1/2- to 1-page executive summary to support your presentation. Include appropriate references.
Expert Answer:
Answer rating: 100% (QA)
Title Security Audit Results Presentation Slide 1 Introduction Welcome and introduction Overview of the security audit process Slide 2 Potential Risk ... View the full answer
Related Book For
Income Tax Fundamentals 2013
ISBN: 9781285586618
31st Edition
Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven L Gill
Posted Date:
Students also viewed these programming questions
-
As a project manager, you have the singular gift of being able to handle a hundred responsibilities at once, including delegating tasks, removing any blockers from a project, and making sure everyone...
-
List three specific parts of the Case Guide, Objectives and Strategy Section (See below) that you had the most difficulty understanding. Describe your current understanding of these parts. Provide...
-
How the COVID-19 pandemic affected the demand curves for oil and online shopping. Using EXCEL focusing on the graphic presentation of data and forecasting using linear functions on the Pandemic...
-
What is performance measurement?
-
In the four-sector LMDS example of Fig. 2-30, each sector has its own 36-Mbps channel. According to queuing theory, if the channel is 50% loaded, the queuing time will be equal to the download time....
-
Let A(X) = E(| X E(X) |), the expected value of the absolute value of the deviation of X, where X is a random variable. Prove or disprove that A(X + Y) = A(X) + A(Y) for all random variables X and Y.
-
The output of a single-mode, well-stabilized laser is passed through a spatially distributed phase modulator (or a phase-only spatial light modulator that is changing with time). The field observed...
-
The Sydney Transportation Company operates an urban bus system in New South Wales, Australia. Economic analysis performed by the firm indicates that two major factors influence the demand for its...
-
2. Write a program in python to get the number from the user using GUI. Use 2 command buttons one to check whether the number is an amstrong number If the given number is a amstrong, display it is a...
-
Solve this in python. **[70 pts]** You will be writing code for recording the menuitems and daily sales of a lemonade stand. It will have theseclasses: MenuItem, SalesForDay, and LemonadeStand. All...
-
Six months after the local newspaper ran a week-long series of articles on the Northlake, VA Community Pride Center, the director wants to see whether this positive media coverage improved turnout at...
-
Apply effective communication, interpersonal, team and problem solving skills to address workplace issues while working as an HR. Why are theses skills are important. discuss their worth as a HR.
-
How can employers effectively manage moonlighting while also protecting their interests?
-
What is a methodology? Why we need to use methodology in dissertation?
-
Your examination of Procter & Gamble's fiscal 2023 liquidity and current ratio is quite perceptive. It's true that the current ratio being less than 1 indicates P&G's current assets are less than its...
-
What are some developmental and lifespan areas of interest that I should keep in mind when caring for a person with Diabetes mellitus?
-
In the heating process of the type a simple method of temperature control is possible by means of a special alloy which loses its magnetic properties at a particular high temperature and regains them...
-
Aztec Furnishings makes hand-crafted furniture for sale in its retail stores. The furniture maker has recently installed a new assembly process, including a new sander and polisher. With this new...
-
The following additional information is available for the Dr. Ivan and Irene Incisor family from Chapters 1-4. Ivan and Irene paid the following in 2012 (all by check or can otherwise be...
-
Jerry made the following contributions during 2012: His synagogue (by check).....................................................$680 The Democratic Party (by check)...
-
During 2012, Tom sold Sears stock for $10,000. The stock was purchased 4 years ago for $13,000. Tom also sold Ford Motor Company bonds for $35,000. The bonds were purchased 2 months ago for $30,000....
-
What are a manager's resources?
-
What are the three levels of management?
-
Joe Maddon has been the manager of the Chicago Cubs since 2015. In his first year, he exceeded the expectations of most analysts and fans by leading the team to an appearance in the National League...
Study smarter with the SolutionInn App