Question: Review the Audit Program for Application Systems for Auditing, presented in Appendix B of Auditor's Guide to IT Auditing. Also, read the following articles:
Review the “Audit Program for Application Systems for Auditing,” presented in Appendix B of Auditor's Guide to IT Auditing. Also, read the following articles:
• "A Framework for Health Care Information Assurance and Policy Compliance" by Sherrie Drye Cannoy and A. F. Salam.
• "Information Assurance and Corporate Strategy: A Delphi Study of Choices, Challenges, and Developments for the Future" by Elspeth McFadzean, Jean-Noël Ezingeard, and David Birchall.
• "Five Most Common Cybersecurity Mistakes" from the Toledo Business Journal.
Write a paper in which you:
• Discuss which employees and organizations have a deeper level of information assurance (IA) policy compliance. Examine the factors that increased the individual’s level of propensity for compliance.
• Determine the internal and external factors affecting IA policy compliance.
• Ascertain which of the organizational requirements poses difficulty in adopting technical features to enhance security policy. Discuss factors related to IA and policy compliance that are affected by government regulations.
• Suggest a framework that could be used to address the issues described in the “Five Most Common Cybersecurity Mistakes” article, based on the “Audit Program for Application Systems for Auditing.”
Step by Step Solution
3.46 Rating (146 Votes )
There are 3 Steps involved in it
Information Assurance Executive summary Information assurance involves the security and accessibility of critical data or information to both organizational and individual status Salam 2010 The protec... View full answer
Get step-by-step solutions from verified subject matter experts
Document Format (1 attachment)
6062f185633e7_71893.docx
120 KBs Word File
