Assignment Content
You are part of a team selected by the Chief Information Officer
(CIO) to perform a security audit for one of the companies
explored in this course. Vampire Legends (Week 1)
Cruisin’ Fusion (Weeks 2- 3)
Devil’s Canyon (Weeks 4 – 5)
Create
a 10- to 12-slide presentation (not including the title and
reference slides) that shows the results of your security audit
based on the following audit process:
Potential Risk to be Reviewed:Describe the risk.
Example: Viruses and malware can negatively impact the
confidentiality, integrity, and availability of organizational
data.
Regulation and Compliance Issues:Analyze how regulations and
compliance issues could impact the organization.
Provide a detailed analysis of regulations and compliance
issues, beyond the simple explanation in score point two.
Regulation and Compliance Resources and Tools: Analyze what
resources and/or tools are available to address regulations and
compliance issues.
Describe the control objective and the specific controls you will
evaluate to determine potential risk is mitigated. Please note
that typically, there will be more than one control that should be
reviewed for a potential risk.
Example: Determine whether anti-virus software is in use.
Example: Determine whether virus signatures are periodically
updated.
Example: Determine whether periodic virus scans are
performed.
Provide a detailed analysis of the resources and/or tools
available, beyond the simple explanation in score point two.
IT Security – Processes and Methods: Differentiate between the
various processes and methods involved in management of IT
security resources.
Review the various options available to address those processes
and methods previously explained, and which ones might be
feasible.
IT Security – Measures: Analyze the various security measures
that could be taken within the organization.
Demonstrate a detailed understanding of what the alternatives
are to approach security, how much security is needed, different
methods to employ, etc.
Describe the criteria/measures that you will use to evaluate the
adequacy of each area/review step that you review (i.e., what
criteria will you use to perform your evaluation/how will you
determine that the risk has been mitigated to an acceptable
level).
Example: 100% of servers and PCs have virus software
installed.
Example: 100% of the virus software installed is set to
automatically update, including virus signatures.
Example: 100% of the virus software installed is set to
automatically perform a scan at least weekly.
Include
a 1/2- to 1-page executive summary to support your
presentation. Include appropriate references.

More Related Content

DOCX
Wk 6 - Security AuditYou are part of a team selected by the Chie.docx
DOCX
Cmgt 582 Effective Communication / snaptutorial.com
DOCX
IT 549 Final Project Guidelines and Rubric Overview .docx
DOCX
Many companies and agencies conduct IT audits to test and assess the.docx
PPT
5.4 it security audit (mauritius)
DOC
Cyb 610 Inspiring Innovation--tutorialrank.com
DOCX
Project 1Create an application that displays payroll informatio.docx
DOCX
Planning an IT Infrastructure Audit for ComplianceThe audit planni.docx
Wk 6 - Security AuditYou are part of a team selected by the Chie.docx
Cmgt 582 Effective Communication / snaptutorial.com
IT 549 Final Project Guidelines and Rubric Overview .docx
Many companies and agencies conduct IT audits to test and assess the.docx
5.4 it security audit (mauritius)
Cyb 610 Inspiring Innovation--tutorialrank.com
Project 1Create an application that displays payroll informatio.docx
Planning an IT Infrastructure Audit for ComplianceThe audit planni.docx

Similar to Assignment ContentYou are part of a team selected by the C.docx (20)

DOCX
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
DOCX
Cmgt 582 Education Specialist -snaptutorial.com
DOCX
ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
PPTX
Effective Vulnerability Management
PPT
ch14.ppt
DOCX
Term Paper The Rookie Chief Information Security Officer.docx
PPTX
Security Baselines and Risk Assessments
DOCX
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
PPT
Information systems 365 lecture three - Performing an IT Security Risk Analysis
DOCX
So you want to be a CISO - 5 steps to Success
PPTX
Security assessment isaca sv presentation jan 2016
DOCX
Term Paper The Rookie Chief Information Security OfficerD
PPT
ch14.ppt00000000000000000000000000000000
DOCX
Cis 558 Enthusiastic Study / snaptutorial.com
DOCX
Cis 558 Technology levels--snaptutorial.com
DOCX
CIS 558 Success Begins / snaptutorial.com
DOCX
CST 630 RANK Achievement Education--cst630rank.com
DOCX
The Rookie Chief Information Security OfficerWorth 200 poi
DOC
Cst 630 Inspiring Innovation--tutorialrank.com
PDF
CST 630 RANK Remember Education--cst630rank.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
Cmgt 582 Education Specialist -snaptutorial.com
ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
Effective Vulnerability Management
ch14.ppt
Term Paper The Rookie Chief Information Security Officer.docx
Security Baselines and Risk Assessments
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
Information systems 365 lecture three - Performing an IT Security Risk Analysis
So you want to be a CISO - 5 steps to Success
Security assessment isaca sv presentation jan 2016
Term Paper The Rookie Chief Information Security OfficerD
ch14.ppt00000000000000000000000000000000
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Technology levels--snaptutorial.com
CIS 558 Success Begins / snaptutorial.com
CST 630 RANK Achievement Education--cst630rank.com
The Rookie Chief Information Security OfficerWorth 200 poi
Cst 630 Inspiring Innovation--tutorialrank.com
CST 630 RANK Remember Education--cst630rank.com
Ad

More from lesleyryder69361 (20)

DOCX
Assignment details written in the attachmentsYou need to choose an.docx
DOCX
Assignment Details A high school girl has been caught shoplifting at.docx
DOCX
Assignment Details A 12-year-old boy was caught in the act of sexual.docx
DOCX
Assignment Details (350 WORDS)The last quarter of the 20th c.docx
DOCX
Assignment Details (300 words and references)Collaborati.docx
DOCX
Assignment Details (2-3 pages) Research information about cu.docx
DOCX
Assignment Details (250 - 300 words)Now that the research .docx
DOCX
Assignment detailed instructions Write a three-page (minimum of 7.docx
DOCX
Assignment detailed instructions Write a three-page (minimum of 750.docx
DOCX
Assignment Description 400 wordsOne of the more important me.docx
DOCX
Assignment DescriptionYou work for a small community hospita.docx
DOCX
Assignment description The tourism industry represents about .docx
DOCX
Assignment DescriptionYou will prepare and deliver a speech .docx
DOCX
Assignment DescriptionYou are to write an essay in which you .docx
DOCX
Assignment DescriptionYou are the lead human–computer intera.docx
DOCX
Assignment DescriptionYou are now ready to start representin.docx
DOCX
Assignment DescriptionManagement is worried, after consultin.docx
DOCX
Assignment DescriptionEgo Integrity PresentationImagine .docx
DOCX
Assignment DescriptionCultural Group Exploration Assignment .docx
DOCX
Assignment description from the syllabusEach member of the matc.docx
Assignment details written in the attachmentsYou need to choose an.docx
Assignment Details A high school girl has been caught shoplifting at.docx
Assignment Details A 12-year-old boy was caught in the act of sexual.docx
Assignment Details (350 WORDS)The last quarter of the 20th c.docx
Assignment Details (300 words and references)Collaborati.docx
Assignment Details (2-3 pages) Research information about cu.docx
Assignment Details (250 - 300 words)Now that the research .docx
Assignment detailed instructions Write a three-page (minimum of 7.docx
Assignment detailed instructions Write a three-page (minimum of 750.docx
Assignment Description 400 wordsOne of the more important me.docx
Assignment DescriptionYou work for a small community hospita.docx
Assignment description The tourism industry represents about .docx
Assignment DescriptionYou will prepare and deliver a speech .docx
Assignment DescriptionYou are to write an essay in which you .docx
Assignment DescriptionYou are the lead human–computer intera.docx
Assignment DescriptionYou are now ready to start representin.docx
Assignment DescriptionManagement is worried, after consultin.docx
Assignment DescriptionEgo Integrity PresentationImagine .docx
Assignment DescriptionCultural Group Exploration Assignment .docx
Assignment description from the syllabusEach member of the matc.docx
Ad

Recently uploaded (20)

PDF
Health aspects of bilberry: A review on its general benefits
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PPTX
4. Diagnosis and treatment planning in RPD.pptx
PDF
Solved Past paper of Pediatric Health Nursing PHN BS Nursing 5th Semester
PDF
The TKT Course. Modules 1, 2, 3.for self study
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PPT
hsl powerpoint resource goyloveh feb 07.ppt
PPTX
Neurological complocations of systemic disease
PDF
FYJC - Chemistry textbook - standard 11.
PPTX
2025 High Blood Pressure Guideline Slide Set.pptx
PPTX
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
PPTX
Neurology of Systemic disease all systems
PPTX
PLASMA AND ITS CONSTITUENTS 123.pptx
PDF
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
PDF
Farming Based Livelihood Systems English Notes
PDF
Diabetes Mellitus , types , clinical picture, investigation and managment
PDF
Disorder of Endocrine system (1).pdfyyhyyyy
PDF
Chevening Scholarship Application and Interview Preparation Guide
PPTX
Reproductive system-Human anatomy and physiology
PDF
0520_Scheme_of_Work_(for_examination_from_2021).pdf
Health aspects of bilberry: A review on its general benefits
UNIT_2-__LIPIDS[1].pptx.................
4. Diagnosis and treatment planning in RPD.pptx
Solved Past paper of Pediatric Health Nursing PHN BS Nursing 5th Semester
The TKT Course. Modules 1, 2, 3.for self study
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
hsl powerpoint resource goyloveh feb 07.ppt
Neurological complocations of systemic disease
FYJC - Chemistry textbook - standard 11.
2025 High Blood Pressure Guideline Slide Set.pptx
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
Neurology of Systemic disease all systems
PLASMA AND ITS CONSTITUENTS 123.pptx
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
Farming Based Livelihood Systems English Notes
Diabetes Mellitus , types , clinical picture, investigation and managment
Disorder of Endocrine system (1).pdfyyhyyyy
Chevening Scholarship Application and Interview Preparation Guide
Reproductive system-Human anatomy and physiology
0520_Scheme_of_Work_(for_examination_from_2021).pdf

Assignment ContentYou are part of a team selected by the C.docx

  • 1. Assignment Content You are part of a team selected by the Chief Information Officer (CIO) to perform a security audit for one of the companies explored in this course. Vampire Legends (Week 1) Cruisin’ Fusion (Weeks 2- 3) Devil’s Canyon (Weeks 4 – 5) Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the results of your security audit based on the following audit process: Potential Risk to be Reviewed:Describe the risk. Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data. Regulation and Compliance Issues:Analyze how regulations and compliance issues could impact the organization. Provide a detailed analysis of regulations and compliance issues, beyond the simple explanation in score point two. Regulation and Compliance Resources and Tools: Analyze what resources and/or tools are available to address regulations and compliance issues.
  • 2. Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be more than one control that should be reviewed for a potential risk. Example: Determine whether anti-virus software is in use. Example: Determine whether virus signatures are periodically updated. Example: Determine whether periodic virus scans are performed. Provide a detailed analysis of the resources and/or tools available, beyond the simple explanation in score point two. IT Security – Processes and Methods: Differentiate between the various processes and methods involved in management of IT security resources. Review the various options available to address those processes and methods previously explained, and which ones might be feasible. IT Security – Measures: Analyze the various security measures that could be taken within the organization. Demonstrate a detailed understanding of what the alternatives are to approach security, how much security is needed, different methods to employ, etc. Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable
  • 3. level). Example: 100% of servers and PCs have virus software installed. Example: 100% of the virus software installed is set to automatically update, including virus signatures. Example: 100% of the virus software installed is set to automatically perform a scan at least weekly. Include a 1/2- to 1-page executive summary to support your presentation. Include appropriate references.