Question: YOUR TASK (worth 10% of the overall mark for this course offering): Conduct an IT audit of your own personal computer system to determine how

 YOUR TASK (worth 10% of the overall mark for this course

YOUR TASK (worth 10% of the overall mark for this course offering): Conduct an IT audit of your own personal computer system to determine how secure this system is against "hack attacks" from some third party. Your audit report should specify the computer system's current configuration in terms of: - [a] If the computer is up to date with the most recent operating system's service packs and software patches. [b] If the antivirus software installed on the computer has been updated with the latest virus signatures and if this anti-virus software has been scheduled to run regular scans to detect known viruses and any software applications which appear to be making unauthorized changes to the system. [c] If there is a password protocol in effect for every user account whereby all users of the computer are obliged to change their passwords at regular intervals and that these passwords should contain a variety of alpha-numeric characters. NOTE: Your audit report should describe the computer system as it is and - if appropriate - make recommendations for enforcing protocols to reduce the likelihood of the computer system being compromised. YOUR TASK (worth 10% of the overall mark for this course offering): Conduct an IT audit of your own personal computer system to determine how secure this system is against "hack attacks" from some third party. Your audit report should specify the computer system's current configuration in terms of: - [a] If the computer is up to date with the most recent operating system's service packs and software patches. [b] If the antivirus software installed on the computer has been updated with the latest virus signatures and if this anti-virus software has been scheduled to run regular scans to detect known viruses and any software applications which appear to be making unauthorized changes to the system. [c] If there is a password protocol in effect for every user account whereby all users of the computer are obliged to change their passwords at regular intervals and that these passwords should contain a variety of alpha-numeric characters. NOTE: Your audit report should describe the computer system as it is and - if appropriate - make recommendations for enforcing protocols to reduce the likelihood of the computer system being compromised

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!