Note:
Chapter 5 of the required textbook may be helpful in the
completion of the assignment.
The audit planning process directly affects the quality of the
outcome. A proper plan ensures that resources are focused on
the right areas and that potential problems are identified early.
A successful audit first outlines the objectives of the audit, the
procedures that will be followed, and the required resources.
Choose an organization you are familiar with and develop an
eight to ten (8-10) page IT infrastructure audit for compliance
in which you:
Define the following items for an organization you are familiar
with:
Scope
Goals and objectives
Frequency of the audit
Duration of the audit
Identify the critical requirements of the audit for your chosen
organization and explain why you consider them to be critical
requirements.
Choose privacy laws that apply to the organization, and suggest
who is responsible for privacy within the organization.
Develop a plan for assessing IT security for your chosen
organization by conducting the following:
Risk management
Threat analysis
Vulnerability analysis
Risk assessment analysis
Explain how to obtain information, documentation, and
resources for the audit.
Analyze how each of the seven (7) domains aligns within your
chosen organization.
Align the appropriate goals and objectives from the audit plan
to each domain and provide a rationale for your alignment.
Develop a plan that:
Examines the existence of relevant and appropriate security
policies and procedures.
Verifies the existence of controls supporting the policies.
Verifies the effective implementation and ongoing monitoring
of the controls.
Identify the critical security control points that must be verified
throughout the IT infrastructure, and develop a plan that
includes adequate controls to meet high-level defined control
objectives within this organization.
Use at least three (3) quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this
assignment are:
Describe the parameters required to conduct and report on IT
infrastructure audit for organizational compliance.
Describe the components and basic requirements for creating an
audit plan to support business and system considerations
Develop IT compliance audit plans
Use technology and information resources to research issues in
security strategy and policy formation.
Write clearly and concisely about topics related to information
technology audit and control using proper writing mechanics
and technical style conventions.
Grading for this assignment will be based on answer quality,
logic / organization of the paper, and language and writing
skills, using the following rubric.
Points: 200
Term Paper: Planning an IT Infrastructure Audit for Compliance
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Define the following items for an organization you are
familiar with: a) Scope; b)
Goals and objectives; c)
Frequency of the audit; d) Duration of the audit.
Weight: 5%
Did not submit or incompletely
defined the following items for an organization you are familiar
with: a) Scope; b) Goals and objectives; c) Frequency of the
audit; d) Duration of the audit.
Insufficiently defined the following items for an organization
you are familiar with: a) Scope; b) Goals and objectives; c)
Frequency of the audit; d) Duration of the audit.
Partially defined the following items for an organization you are
familiar with: a) Scope; b) Goals and objectives; c) Frequency
of the audit; d) Duration of the audit.
Satisfactorily defined the following items for an organization
you are familiar with: a) Scope; b) Goals and objectives; c)
Frequency of the audit; d) Duration of the audit.
Thoroughly defined the following items for an organization you
are familiar with: a) Scope; b) Goals and objectives; c)
Frequency of the audit; d) Duration of the audit.
2. Identify the critical requirements of the audit for your chosen
organization and explain why you consider them to be critical
requirements.
Weight: 10%
Did not submit or incompletely
identified the critical requirements of the audit for your chosen
organization and did not submit or incompletely
explained why you consider them to be critical requirements.
Insufficiently
identified the critical requirements of the audit for your chosen
organization and insufficiently
explained why you consider them to be critical requirements.
Partially
identified the critical requirements of the audit for your chosen
organization and partially
explained why you consider them to be critical requirements.
Satisfactorily
identified the critical requirements of the audit for your chosen
organization and satisfactorily
explained why you consider them to be critical requirements.
Thoroughly
identified the critical requirements of the audit for your chosen
organization and thoroughly explained why you consider them
to be critical requirements.
3. Choose privacy laws that apply to the organization, and
suggest who is responsible for privacy within the organization.
Weight: 5%
Did not submit or incompletely
chose privacy laws that apply to the organization, and did not
submit or incompletely
suggested who is responsible for privacy within the
organization.
Insufficiently chose privacy laws that apply to the organization,
and insufficiently suggested who is responsible for privacy
within the organization.
Partially chose privacy laws that apply to the organization, and
partially suggested who is responsible for privacy within the
organization.
Satisfactorily chose privacy laws that apply to the organization,
and satisfactorily suggested who is responsible for privacy
within the organization.
Thoroughly chose privacy laws that apply to the organization,
and thoroughly suggested who is responsible for privacy within
the organization.
4. Develop a plan for assessing IT security for your chosen
organization by conducting the following:
a) Risk management; b) Threat analysis; c) Vulnerability
analysis; d) Risk assessment analysis.
Weight: 20%
Did not submit or incompletely
developed a plan for assessing IT security for your chosen
organization by conducting the following: a) Risk management;
b) Threat analysis; c) Vulnerability analysis; d) Risk assessment
analysis.
Insufficiently
developed a plan for assessing IT security for your chosen
organization by conducting the following: a) Risk management;
b) Threat analysis; c) Vulnerability analysis; d) Risk assessment
analysis.
Partially
developed a plan for assessing IT security for your chosen
organization by conducting the following: a) Risk management;
b) Threat analysis; c) Vulnerability analysis; d) Risk assessment
analysis.
Satisfactorily
developed a plan for assessing IT security for your chosen
organization by conducting the following: a) Risk management;
b) Threat analysis; c) Vulnerability analysis; d) Risk assessment
analysis.
Thoroughly
developed a plan for assessing IT security for your chosen
organization by conducting the following: a) Risk management;
b) Threat analysis; c) Vulnerability analysis; d) Risk assessment
analysis.
5. Explain how to obtain information, documentation, and
resources for the audit.
Weight: 5%
Did not submit or incompletely explained how to obtain
information, documentation, and resources for the audit.
Insufficiently explained how to obtain information,
documentation, and resources for the audit.
Partially explained how to obtain information, documentation,
and resources for the audit.
Satisfactorily explained how to obtain information,
documentation, and resources for the audit.
Thoroughly explained how to obtain information,
documentation, and resources for the audit.
6. Analyze how each of the seven (7) domains aligns within
your chosen organization.
Weight: 5%
Did not submit or incompletely
analyzed how each of the seven (7) domains aligns within your
chosen organization.
Insufficiently
analyzed how each of the seven (7) domains aligns within your
chosen organization.
Partially
analyzed how each of the seven (7) domains aligns within your
chosen organization.
Satisfactorily
analyzed how each of the seven (7) domains aligns within your
chosen organization.
Thoroughly
analyzed how each of the seven (7) domains aligns within your
chosen organization.
7.
Align the appropriate goals and objectives from the audit plan
to each domain and provide a rationale for your alignment.
Weight: 5%
Did not submit or incompletely
aligned the appropriate goals and objectives from the audit plan
to each domain and did not submit or incompletely
provided a rationale for your alignment.
Insufficiently aligned the appropriate goals and objectives from
the audit plan to each domain and insufficiently provided a
rationale for your alignment.
Partially aligned the appropriate goals and objectives from the
audit plan to each domain and partially provided a rationale for
your alignment.
Satisfactorily aligned the appropriate goals and objectives from
the audit plan to each domain and satisfactorily provided a
rationale for your alignment.
Thoroughly aligned the appropriate goals and objectives from
the audit plan to each domain and thoroughly provided a
rationale for your alignment.
8. Develop a plan that: a) Examines the existence of relevant
and appropriate security policies and procedures; b) Verifies the
existence of controls supporting the policies;
c)
Verifies the effective implementation and ongoing monitoring
of the controls.
Weight: 20%
Did not submit or incompletely
developed a plan that: a) Examined the existence of relevant
and appropriate security policies and procedures; b) Verified
the existence of controls supporting the policies; c) Verified the
effective implementation and ongoing monitoring of the
controls.
Insufficiently developed a plan that: a) Examined the existence
of relevant and appropriate security policies and procedures; b)
Verified the existence of controls supporting the policies; c)
Verified the effective implementation and ongoing monitoring
of the controls.
Partially developed a plan that: a) Examined the existence of
relevant and appropriate security policies and procedures; b)
Verified the existence of controls supporting the policies; c)
Verified the effective implementation and ongoing monitoring
of the controls.
Satisfactorily developed a plan that: a) Examined the existence
of relevant and appropriate security policies and procedures; b)
Verified the existence of controls supporting the policies; c)
Verified the effective implementation and ongoing monitoring
of the controls.
Thoroughly developed a plan that: a) Examined the existence of
relevant and appropriate security policies and procedures; b)
Verified the existence of controls supporting the policies; c)
Verified the effective implementation and ongoing monitoring
of the controls.
9. Identify the critical security control points that must be
verified throughout the IT infrastructure, and develop a plan
that includes adequate controls to meet high-level defined
control objectives within this organization.
Weight: 15%
Did not submit or incompletely identified the critical security
control points that must be verified throughout the IT
infrastructure, and did not submit or incompletely developed a
plan that includes adequate controls to meet high-level defined
control objectives within this organization.
Insufficiently identified the critical security control points that
must be verified throughout the IT infrastructure, and
insufficiently developed a plan that includes adequate controls
to meet high-level defined control objectives within this
organization.
Partially identified the critical security control points that must
be verified throughout the IT infrastructure, and partially
developed a plan that includes adequate controls to meet high-
level defined control objectives within this organization.
Satisfactorily identified the critical security control points that
must be verified throughout the IT infrastructure, and
satisfactorily developed a plan that includes adequate controls
to meet high-level defined control objectives within this
organization.
Thoroughly identified the critical security control points that
must be verified throughout the IT infrastructure, and
thoroughly developed a plan that includes adequate controls to
meet high-level defined control objectives within this
organization.
10. 3 references
Weight: 5%
No references provided
Does not meet the required number of references; all references
poor quality choices.
Does not meet the required number of references; some
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
11. Clarity, writing mechanics, and formatting requirements
Weight: 5%
More than 8 errors present
7-8 errors present
5-6 errors present
3-4 errors present
0-2 errors present
Note Chapter 5 of the required textbook may be helpful in the com.docx

More Related Content

DOCX
Term Paper Planning an IT Infrastructure Audit for Compliance  Due .docx
DOCX
Planning an IT Infrastructure Audit for ComplianceThe audit planni.docx
DOCX
Text book title and AuthorMoeller, Robert R. IT audit, cont.docx
DOC
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
DOC
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
DOC
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
DOC
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
DOC
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Term Paper Planning an IT Infrastructure Audit for Compliance  Due .docx
Planning an IT Infrastructure Audit for ComplianceThe audit planni.docx
Text book title and AuthorMoeller, Robert R. IT audit, cont.docx
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...

Similar to Note Chapter 5 of the required textbook may be helpful in the com.docx (20)

DOC
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
DOC
Cis 349 week 10 term paper planning an it infrastructure audit for compliance
DOCX
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
DOCX
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
DOCX
Points 200 Term Paper The Rookie Chief Information Security .docx
PPT
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
DOCX
Term Paper The Rookie Chief Information Security Officer.docx
DOCX
The Rookie Chief Information Security OfficerThis assignment consi.docx
DOCX
ISE 510 Final Project Milestone Two Guidelines and Rubric .docx
DOCX
The Rookie Chief Information Security OfficerWorth 200 poi
DOCX
Term Paper Security Regulation ComplianceDue Week 10 and worth 10.docx
PPTX
Cyber Security Audit and Information Security.pptx
DOCX
Assignment 1 Developing the Corporate Strategy for Information Secu.docx
DOCX
Term Paper The Rookie Chief Information Security OfficerD
DOCX
IT 549 Final Project Guidelines and Rubric Overview .docx
DOCX
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
DOCX
Assignment ContentYou are part of a team selected by the C.docx
DOCX
Assignment ContentYou are part of a team selected by the Chi.docx
DOCX
This assignment consists of five (5) parts     Part 1 Organi.docx
DOC
Strayer cis 558 week 10 term paper managing an it infrastructure audit
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Cis 349 week 10 term paper planning an it infrastructure audit for compliance
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
Points 200 Term Paper The Rookie Chief Information Security .docx
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
Term Paper The Rookie Chief Information Security Officer.docx
The Rookie Chief Information Security OfficerThis assignment consi.docx
ISE 510 Final Project Milestone Two Guidelines and Rubric .docx
The Rookie Chief Information Security OfficerWorth 200 poi
Term Paper Security Regulation ComplianceDue Week 10 and worth 10.docx
Cyber Security Audit and Information Security.pptx
Assignment 1 Developing the Corporate Strategy for Information Secu.docx
Term Paper The Rookie Chief Information Security OfficerD
IT 549 Final Project Guidelines and Rubric Overview .docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
Assignment ContentYou are part of a team selected by the C.docx
Assignment ContentYou are part of a team selected by the Chi.docx
This assignment consists of five (5) parts     Part 1 Organi.docx
Strayer cis 558 week 10 term paper managing an it infrastructure audit

More from IlonaThornburg83 (20)

DOCX
One aspect of epidemiology is the study of the epidemic, endemic, an.docx
DOCX
Once you click the Assignment icon above, you will find links to Qui.docx
DOCX
one day when you woke up you saw doreman in you room .he has a tim.docx
DOCX
One afternoon at work, Natalie received a phone call from her daught.docx
DOCX
Once the United States got involved in World War I, what role did it.docx
DOCX
Once a Delinquent, Always a Delinquent  Please respond to the foll.docx
DOCX
On page 118 of your textbook is a picture of the sculpture Pietà by .docx
DOCX
Once a disease is thought to be caused by an infectious agent, a r.docx
DOCX
Once you have identified two questions that interest you, conduct an.docx
DOCX
On December 31, 2015, Ms. Levine CPA, your manager and the treasurer.docx
DOCX
On Dumpster Diving” by Lars Eighner (50 Essays, p. 139-15.docx
DOCX
Ok so I have done all the calculations, graphs and interpritations m.docx
DOCX
Ok so I know this is extreme short notice but I have a final 6 page .docx
DOCX
Offenses and Punishment. Please respond to the following Explai.docx
DOCX
Omit all general journal entry explanations.Be sure to include c.docx
DOCX
Offer an alternative explanation for how these patterns of criminal .docx
DOCX
Often, as a business operates, the partners bring some of their pers.docx
DOCX
Of all the GNR technologies (genetic engineering, nanotechnology and.docx
DOCX
Of the five management functions, which do you expect will experienc.docx
DOCX
Of the numerous forms of communication technologies presented in thi.docx
One aspect of epidemiology is the study of the epidemic, endemic, an.docx
Once you click the Assignment icon above, you will find links to Qui.docx
one day when you woke up you saw doreman in you room .he has a tim.docx
One afternoon at work, Natalie received a phone call from her daught.docx
Once the United States got involved in World War I, what role did it.docx
Once a Delinquent, Always a Delinquent  Please respond to the foll.docx
On page 118 of your textbook is a picture of the sculpture Pietà by .docx
Once a disease is thought to be caused by an infectious agent, a r.docx
Once you have identified two questions that interest you, conduct an.docx
On December 31, 2015, Ms. Levine CPA, your manager and the treasurer.docx
On Dumpster Diving” by Lars Eighner (50 Essays, p. 139-15.docx
Ok so I have done all the calculations, graphs and interpritations m.docx
Ok so I know this is extreme short notice but I have a final 6 page .docx
Offenses and Punishment. Please respond to the following Explai.docx
Omit all general journal entry explanations.Be sure to include c.docx
Offer an alternative explanation for how these patterns of criminal .docx
Often, as a business operates, the partners bring some of their pers.docx
Of all the GNR technologies (genetic engineering, nanotechnology and.docx
Of the five management functions, which do you expect will experienc.docx
Of the numerous forms of communication technologies presented in thi.docx

Recently uploaded (20)

PPTX
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PPTX
Reproductive system-Human anatomy and physiology
PPTX
Diploma pharmaceutics notes..helps diploma students
PPTX
4. Diagnosis and treatment planning in RPD.pptx
PDF
PUBH1000 - Module 6: Global Health Tute Slides
PDF
African Communication Research: A review
PDF
anganwadi services for the b.sc nursing and GNM
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PDF
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
PPTX
2025 High Blood Pressure Guideline Slide Set.pptx
PDF
Journal of Dental Science - UDMY (2020).pdf
PPTX
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
PDF
faiz-khans about Radiotherapy Physics-02.pdf
PPTX
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
PDF
0520_Scheme_of_Work_(for_examination_from_2021).pdf
PDF
Laparoscopic Colorectal Surgery at WLH Hospital
PDF
Physical education and sports and CWSN notes
PDF
Journal of Dental Science - UDMY (2022).pdf
PPTX
Case Study on mbsa education to learn ok
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
Reproductive system-Human anatomy and physiology
Diploma pharmaceutics notes..helps diploma students
4. Diagnosis and treatment planning in RPD.pptx
PUBH1000 - Module 6: Global Health Tute Slides
African Communication Research: A review
anganwadi services for the b.sc nursing and GNM
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
2025 High Blood Pressure Guideline Slide Set.pptx
Journal of Dental Science - UDMY (2020).pdf
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
faiz-khans about Radiotherapy Physics-02.pdf
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
0520_Scheme_of_Work_(for_examination_from_2021).pdf
Laparoscopic Colorectal Surgery at WLH Hospital
Physical education and sports and CWSN notes
Journal of Dental Science - UDMY (2022).pdf
Case Study on mbsa education to learn ok

Note Chapter 5 of the required textbook may be helpful in the com.docx

  • 1. Note: Chapter 5 of the required textbook may be helpful in the completion of the assignment. The audit planning process directly affects the quality of the outcome. A proper plan ensures that resources are focused on the right areas and that potential problems are identified early. A successful audit first outlines the objectives of the audit, the procedures that will be followed, and the required resources. Choose an organization you are familiar with and develop an eight to ten (8-10) page IT infrastructure audit for compliance in which you: Define the following items for an organization you are familiar with: Scope Goals and objectives Frequency of the audit Duration of the audit Identify the critical requirements of the audit for your chosen organization and explain why you consider them to be critical requirements. Choose privacy laws that apply to the organization, and suggest who is responsible for privacy within the organization. Develop a plan for assessing IT security for your chosen organization by conducting the following: Risk management Threat analysis Vulnerability analysis Risk assessment analysis Explain how to obtain information, documentation, and resources for the audit. Analyze how each of the seven (7) domains aligns within your chosen organization. Align the appropriate goals and objectives from the audit plan to each domain and provide a rationale for your alignment. Develop a plan that:
  • 2. Examines the existence of relevant and appropriate security policies and procedures. Verifies the existence of controls supporting the policies. Verifies the effective implementation and ongoing monitoring of the controls. Identify the critical security control points that must be verified throughout the IT infrastructure, and develop a plan that includes adequate controls to meet high-level defined control objectives within this organization. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Describe the parameters required to conduct and report on IT infrastructure audit for organizational compliance. Describe the components and basic requirements for creating an audit plan to support business and system considerations Develop IT compliance audit plans Use technology and information resources to research issues in security strategy and policy formation. Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions. Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing
  • 3. skills, using the following rubric. Points: 200 Term Paper: Planning an IT Infrastructure Audit for Compliance Criteria Unacceptable Below 60% F Meets Minimum Expectations 60-69% D Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Define the following items for an organization you are familiar with: a) Scope; b) Goals and objectives; c) Frequency of the audit; d) Duration of the audit. Weight: 5% Did not submit or incompletely defined the following items for an organization you are familiar with: a) Scope; b) Goals and objectives; c) Frequency of the audit; d) Duration of the audit. Insufficiently defined the following items for an organization you are familiar with: a) Scope; b) Goals and objectives; c) Frequency of the audit; d) Duration of the audit. Partially defined the following items for an organization you are familiar with: a) Scope; b) Goals and objectives; c) Frequency of the audit; d) Duration of the audit. Satisfactorily defined the following items for an organization you are familiar with: a) Scope; b) Goals and objectives; c)
  • 4. Frequency of the audit; d) Duration of the audit. Thoroughly defined the following items for an organization you are familiar with: a) Scope; b) Goals and objectives; c) Frequency of the audit; d) Duration of the audit. 2. Identify the critical requirements of the audit for your chosen organization and explain why you consider them to be critical requirements. Weight: 10% Did not submit or incompletely identified the critical requirements of the audit for your chosen organization and did not submit or incompletely explained why you consider them to be critical requirements. Insufficiently identified the critical requirements of the audit for your chosen organization and insufficiently explained why you consider them to be critical requirements. Partially identified the critical requirements of the audit for your chosen organization and partially explained why you consider them to be critical requirements. Satisfactorily identified the critical requirements of the audit for your chosen organization and satisfactorily explained why you consider them to be critical requirements. Thoroughly identified the critical requirements of the audit for your chosen organization and thoroughly explained why you consider them to be critical requirements. 3. Choose privacy laws that apply to the organization, and suggest who is responsible for privacy within the organization. Weight: 5% Did not submit or incompletely chose privacy laws that apply to the organization, and did not submit or incompletely suggested who is responsible for privacy within the organization.
  • 5. Insufficiently chose privacy laws that apply to the organization, and insufficiently suggested who is responsible for privacy within the organization. Partially chose privacy laws that apply to the organization, and partially suggested who is responsible for privacy within the organization. Satisfactorily chose privacy laws that apply to the organization, and satisfactorily suggested who is responsible for privacy within the organization. Thoroughly chose privacy laws that apply to the organization, and thoroughly suggested who is responsible for privacy within the organization. 4. Develop a plan for assessing IT security for your chosen organization by conducting the following: a) Risk management; b) Threat analysis; c) Vulnerability analysis; d) Risk assessment analysis. Weight: 20% Did not submit or incompletely developed a plan for assessing IT security for your chosen organization by conducting the following: a) Risk management; b) Threat analysis; c) Vulnerability analysis; d) Risk assessment analysis. Insufficiently developed a plan for assessing IT security for your chosen organization by conducting the following: a) Risk management; b) Threat analysis; c) Vulnerability analysis; d) Risk assessment analysis. Partially developed a plan for assessing IT security for your chosen organization by conducting the following: a) Risk management; b) Threat analysis; c) Vulnerability analysis; d) Risk assessment analysis. Satisfactorily developed a plan for assessing IT security for your chosen organization by conducting the following: a) Risk management;
  • 6. b) Threat analysis; c) Vulnerability analysis; d) Risk assessment analysis. Thoroughly developed a plan for assessing IT security for your chosen organization by conducting the following: a) Risk management; b) Threat analysis; c) Vulnerability analysis; d) Risk assessment analysis. 5. Explain how to obtain information, documentation, and resources for the audit. Weight: 5% Did not submit or incompletely explained how to obtain information, documentation, and resources for the audit. Insufficiently explained how to obtain information, documentation, and resources for the audit. Partially explained how to obtain information, documentation, and resources for the audit. Satisfactorily explained how to obtain information, documentation, and resources for the audit. Thoroughly explained how to obtain information, documentation, and resources for the audit. 6. Analyze how each of the seven (7) domains aligns within your chosen organization. Weight: 5% Did not submit or incompletely analyzed how each of the seven (7) domains aligns within your chosen organization. Insufficiently analyzed how each of the seven (7) domains aligns within your chosen organization. Partially analyzed how each of the seven (7) domains aligns within your chosen organization. Satisfactorily analyzed how each of the seven (7) domains aligns within your chosen organization. Thoroughly
  • 7. analyzed how each of the seven (7) domains aligns within your chosen organization. 7. Align the appropriate goals and objectives from the audit plan to each domain and provide a rationale for your alignment. Weight: 5% Did not submit or incompletely aligned the appropriate goals and objectives from the audit plan to each domain and did not submit or incompletely provided a rationale for your alignment. Insufficiently aligned the appropriate goals and objectives from the audit plan to each domain and insufficiently provided a rationale for your alignment. Partially aligned the appropriate goals and objectives from the audit plan to each domain and partially provided a rationale for your alignment. Satisfactorily aligned the appropriate goals and objectives from the audit plan to each domain and satisfactorily provided a rationale for your alignment. Thoroughly aligned the appropriate goals and objectives from the audit plan to each domain and thoroughly provided a rationale for your alignment. 8. Develop a plan that: a) Examines the existence of relevant and appropriate security policies and procedures; b) Verifies the existence of controls supporting the policies; c) Verifies the effective implementation and ongoing monitoring of the controls. Weight: 20% Did not submit or incompletely developed a plan that: a) Examined the existence of relevant and appropriate security policies and procedures; b) Verified the existence of controls supporting the policies; c) Verified the effective implementation and ongoing monitoring of the controls.
  • 8. Insufficiently developed a plan that: a) Examined the existence of relevant and appropriate security policies and procedures; b) Verified the existence of controls supporting the policies; c) Verified the effective implementation and ongoing monitoring of the controls. Partially developed a plan that: a) Examined the existence of relevant and appropriate security policies and procedures; b) Verified the existence of controls supporting the policies; c) Verified the effective implementation and ongoing monitoring of the controls. Satisfactorily developed a plan that: a) Examined the existence of relevant and appropriate security policies and procedures; b) Verified the existence of controls supporting the policies; c) Verified the effective implementation and ongoing monitoring of the controls. Thoroughly developed a plan that: a) Examined the existence of relevant and appropriate security policies and procedures; b) Verified the existence of controls supporting the policies; c) Verified the effective implementation and ongoing monitoring of the controls. 9. Identify the critical security control points that must be verified throughout the IT infrastructure, and develop a plan that includes adequate controls to meet high-level defined control objectives within this organization. Weight: 15% Did not submit or incompletely identified the critical security control points that must be verified throughout the IT infrastructure, and did not submit or incompletely developed a plan that includes adequate controls to meet high-level defined control objectives within this organization. Insufficiently identified the critical security control points that must be verified throughout the IT infrastructure, and insufficiently developed a plan that includes adequate controls to meet high-level defined control objectives within this organization. Partially identified the critical security control points that must
  • 9. be verified throughout the IT infrastructure, and partially developed a plan that includes adequate controls to meet high- level defined control objectives within this organization. Satisfactorily identified the critical security control points that must be verified throughout the IT infrastructure, and satisfactorily developed a plan that includes adequate controls to meet high-level defined control objectives within this organization. Thoroughly identified the critical security control points that must be verified throughout the IT infrastructure, and thoroughly developed a plan that includes adequate controls to meet high-level defined control objectives within this organization. 10. 3 references Weight: 5% No references provided Does not meet the required number of references; all references poor quality choices. Does not meet the required number of references; some references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. 11. Clarity, writing mechanics, and formatting requirements Weight: 5% More than 8 errors present 7-8 errors present 5-6 errors present 3-4 errors present 0-2 errors present