SlideShare a Scribd company logo
Assignment Content
You are part of a team selected by the Chief Information Officer
(CIO) to perform a security audit for one of the companies
explored in this course. Vampire Legends (Week 1)
Cruisin’ Fusion (Weeks 2- 3)
Devil’s Canyon (Weeks 4 – 5)
Create
a 10- to 12-slide presentation (not including the title and
reference slides) that shows the results of your security audit
based on the following audit process:
Potential Risk to be Reviewed:Describe the risk.
Example: Viruses and malware can negatively impact the
confidentiality, integrity, and availability of organizational
data.
Regulation and Compliance Issues:Analyze how regulations and
compliance issues could impact the organization.
Provide a detailed analysis of regulations and compliance
issues, beyond the simple explanation in score point two.
Regulation and Compliance Resources and Tools: Analyze what
resources and/or tools are available to address regulations and
compliance issues.
Describe the control objective and the specific controls you will
evaluate to determine potential risk is mitigated. Please note
that typically, there will be more than one control that should be
reviewed for a potential risk.
Example: Determine whether anti-virus software is in use.
Example: Determine whether virus signatures are periodically
updated.
Example: Determine whether periodic virus scans are
performed.
Provide a detailed analysis of the resources and/or tools
available, beyond the simple explanation in score point two.
IT Security – Processes and Methods: Differentiate between the
various processes and methods involved in management of IT
security resources.
Review the various options available to address those processes
and methods previously explained, and which ones might be
feasible.
IT Security – Measures: Analyze the various security measures
that could be taken within the organization.
Demonstrate a detailed understanding of what the alternatives
are to approach security, how much security is needed, different
methods to employ, etc.
Describe the criteria/measures that you will use to evaluate the
adequacy of each area/review step that you review (i.e., what
criteria will you use to perform your evaluation/how will you
determine that the risk has been mitigated to an acceptable
level).
Example: 100% of servers and PCs have virus software
installed.
Example: 100% of the virus software installed is set to
automatically update, including virus signatures.
Example: 100% of the virus software installed is set to
automatically perform a scan at least weekly.
Include
a 1/2- to 1-page executive summary to support your
presentation. Include appropriate references.

More Related Content

DOCX
Wk 6 - Security AuditYou are part of a team selected by the Chie.docx
DOCX
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
DOCX
Cmgt 582 Effective Communication / snaptutorial.com
DOCX
Cmgt 582 Education Specialist -snaptutorial.com
PPTX
Cyber Security Audit and Information Security.pptx
PPT
Information Serurity Risk Assessment Basics
DOCX
ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
DOCX
ISE 620 Final Project Guidelines and Rubric Overview .docx
Wk 6 - Security AuditYou are part of a team selected by the Chie.docx
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582 Education Specialist -snaptutorial.com
Cyber Security Audit and Information Security.pptx
Information Serurity Risk Assessment Basics
ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
ISE 620 Final Project Guidelines and Rubric Overview .docx

Similar to Assignment ContentYou are part of a team selected by the C.docx (20)

PDF
Cmgt 400 cmgt400
PDF
It Security Audit Process
PDF
What to Expect During a Vulnerability Assessment and Penetration Test
DOCX
Assignment Content   After reviewing the material your gro.docx
PPTX
Security assessment isaca sv presentation jan 2016
PDF
Cmgt 430 cmgt430
PDF
Cyber Security Risk Mitigation Checklist
PDF
The Role of Penetration Testing in Strengthening Organizational Cyber securit...
DOCX
The Technical Report and Executive SummaryTechnical report Your.docx
PDF
Crucial Steps to Cyber Resilience: A Guide to Effective VAPT
DOCX
CMGT 400 Entire Course NEW
DOCX
Cmgt 400 Entire Course NEW
PPTX
Online Training Information Security Management
PDF
Vskills Certified Network Security Professional Sample Material
PPT
Reorganizing Federal IT to Address Today's Threats
DOCX
Many companies and agencies conduct IT audits to test and assess the.docx
PPTX
A Framework for Developing and Operationalizing Security Use Cases
PPTX
325838924-Splunk-Use-Case-Framework-Introduction-Session
DOCX
Cain and AbelOphcrackStart H.docx
DOCX
case studies on risk management in IT enabled organisation(vadodara)
Cmgt 400 cmgt400
It Security Audit Process
What to Expect During a Vulnerability Assessment and Penetration Test
Assignment Content   After reviewing the material your gro.docx
Security assessment isaca sv presentation jan 2016
Cmgt 430 cmgt430
Cyber Security Risk Mitigation Checklist
The Role of Penetration Testing in Strengthening Organizational Cyber securit...
The Technical Report and Executive SummaryTechnical report Your.docx
Crucial Steps to Cyber Resilience: A Guide to Effective VAPT
CMGT 400 Entire Course NEW
Cmgt 400 Entire Course NEW
Online Training Information Security Management
Vskills Certified Network Security Professional Sample Material
Reorganizing Federal IT to Address Today's Threats
Many companies and agencies conduct IT audits to test and assess the.docx
A Framework for Developing and Operationalizing Security Use Cases
325838924-Splunk-Use-Case-Framework-Introduction-Session
Cain and AbelOphcrackStart H.docx
case studies on risk management in IT enabled organisation(vadodara)
Ad

More from lesleyryder69361 (20)

DOCX
Assignment details written in the attachmentsYou need to choose an.docx
DOCX
Assignment Details A high school girl has been caught shoplifting at.docx
DOCX
Assignment Details A 12-year-old boy was caught in the act of sexual.docx
DOCX
Assignment Details (350 WORDS)The last quarter of the 20th c.docx
DOCX
Assignment Details (300 words and references)Collaborati.docx
DOCX
Assignment Details (2-3 pages) Research information about cu.docx
DOCX
Assignment Details (250 - 300 words)Now that the research .docx
DOCX
Assignment detailed instructions Write a three-page (minimum of 7.docx
DOCX
Assignment detailed instructions Write a three-page (minimum of 750.docx
DOCX
Assignment Description 400 wordsOne of the more important me.docx
DOCX
Assignment DescriptionYou work for a small community hospita.docx
DOCX
Assignment description The tourism industry represents about .docx
DOCX
Assignment DescriptionYou will prepare and deliver a speech .docx
DOCX
Assignment DescriptionYou are to write an essay in which you .docx
DOCX
Assignment DescriptionYou are the lead human–computer intera.docx
DOCX
Assignment DescriptionYou are now ready to start representin.docx
DOCX
Assignment DescriptionManagement is worried, after consultin.docx
DOCX
Assignment DescriptionEgo Integrity PresentationImagine .docx
DOCX
Assignment DescriptionCultural Group Exploration Assignment .docx
DOCX
Assignment description from the syllabusEach member of the matc.docx
Assignment details written in the attachmentsYou need to choose an.docx
Assignment Details A high school girl has been caught shoplifting at.docx
Assignment Details A 12-year-old boy was caught in the act of sexual.docx
Assignment Details (350 WORDS)The last quarter of the 20th c.docx
Assignment Details (300 words and references)Collaborati.docx
Assignment Details (2-3 pages) Research information about cu.docx
Assignment Details (250 - 300 words)Now that the research .docx
Assignment detailed instructions Write a three-page (minimum of 7.docx
Assignment detailed instructions Write a three-page (minimum of 750.docx
Assignment Description 400 wordsOne of the more important me.docx
Assignment DescriptionYou work for a small community hospita.docx
Assignment description The tourism industry represents about .docx
Assignment DescriptionYou will prepare and deliver a speech .docx
Assignment DescriptionYou are to write an essay in which you .docx
Assignment DescriptionYou are the lead human–computer intera.docx
Assignment DescriptionYou are now ready to start representin.docx
Assignment DescriptionManagement is worried, after consultin.docx
Assignment DescriptionEgo Integrity PresentationImagine .docx
Assignment DescriptionCultural Group Exploration Assignment .docx
Assignment description from the syllabusEach member of the matc.docx
Ad

Recently uploaded (20)

PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Classroom Observation Tools for Teachers
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
History, Philosophy and sociology of education (1).pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Cell Types and Its function , kingdom of life
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PDF
1_English_Language_Set_2.pdf probationary
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Classroom Observation Tools for Teachers
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Practical Manual AGRO-233 Principles and Practices of Natural Farming
History, Philosophy and sociology of education (1).pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Cell Types and Its function , kingdom of life
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Final Presentation General Medicine 03-08-2024.pptx
Final Presentation General Medicine 03-08-2024.pptx
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Supply Chain Operations Speaking Notes -ICLT Program
A systematic review of self-coping strategies used by university students to ...
Weekly quiz Compilation Jan -July 25.pdf
Unit 4 Skeletal System.ppt.pptxopresentatiom
1_English_Language_Set_2.pdf probationary
Chinmaya Tiranga quiz Grand Finale.pdf
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE

Assignment ContentYou are part of a team selected by the C.docx

  • 1. Assignment Content You are part of a team selected by the Chief Information Officer (CIO) to perform a security audit for one of the companies explored in this course. Vampire Legends (Week 1) Cruisin’ Fusion (Weeks 2- 3) Devil’s Canyon (Weeks 4 – 5) Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the results of your security audit based on the following audit process: Potential Risk to be Reviewed:Describe the risk. Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data. Regulation and Compliance Issues:Analyze how regulations and compliance issues could impact the organization. Provide a detailed analysis of regulations and compliance issues, beyond the simple explanation in score point two. Regulation and Compliance Resources and Tools: Analyze what resources and/or tools are available to address regulations and compliance issues.
  • 2. Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be more than one control that should be reviewed for a potential risk. Example: Determine whether anti-virus software is in use. Example: Determine whether virus signatures are periodically updated. Example: Determine whether periodic virus scans are performed. Provide a detailed analysis of the resources and/or tools available, beyond the simple explanation in score point two. IT Security – Processes and Methods: Differentiate between the various processes and methods involved in management of IT security resources. Review the various options available to address those processes and methods previously explained, and which ones might be feasible. IT Security – Measures: Analyze the various security measures that could be taken within the organization. Demonstrate a detailed understanding of what the alternatives are to approach security, how much security is needed, different methods to employ, etc. Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable
  • 3. level). Example: 100% of servers and PCs have virus software installed. Example: 100% of the virus software installed is set to automatically update, including virus signatures. Example: 100% of the virus software installed is set to automatically perform a scan at least weekly. Include a 1/2- to 1-page executive summary to support your presentation. Include appropriate references.