Planning an IT Infrastructure Audit for Compliance

Description
Term?Paper:?Planning?an?IT?Infrastructure?Audit?for?Compliance
PLEASE?NOTE?THIS?ASSIGNMENT?MUST?BE?WRITTEN?AT?A?MASTER?S?DEGREE?LEVEL.
ANYTHING?BELOW?WILL?BE?UNACCEPTABLE.?

DO?NOT?MISS?ANY?COMPONENTS?OF?THE?INSTRUCTIONS.?ALL?QUESTIONS?MUST?BE
THOROUGHLY?ADDRESSED.?

Use?headers?for?each?question?answered?to?assist?in?organization?for?the?reader.?
The?audit?planning?process?directly?affects?the?quality?of?the?outcome.?A?proper?plan?ensures?that?resources?are
focused?on?the?right?areas?and?that?potential?problems?are?identified?early.?A?successful?audit?first?outlines?the
objectives?of?the?audit,?the?procedures?that?will?be?followed,?and?the?required?resources.
Choose?an?organization?you?are?familiar?with?and?develop?a?nine?(9)?page?IT?infrastructure?audit?for?compliance
in?which?you:
1.?Define?the?following?items?for?an?organization?you?are?familiar?with:
a.?Scope
b.?Goals?and?objectives
c.?Frequency?of?the?audit
d.?Duration?of?the?audit
2.?Identify?the?critical?requirements?of?the?audit?for?your?chosen?organization?and?explain?why?you?consider
them?to?be?critical?requirements.
3.?Choose?privacy?laws?that?apply?to?the?organization,?and?suggest?who?is?responsible?for?privacy?within?the
organization.
4.?Develop?a?plan?for?assessing?IT?security?for?your?chosen?organization?by?conducting?the?following:
a.?Risk?management
b.?Threat?analysis
c.?Vulnerability?analysis
d.?Risk?assessment?analysis
5.?Explain?how?to?obtain?information,?documentation,?and?resources?for?the?audit.
6.?Analyze?how?each?of?the?seven?(7)?domains?aligns?within?your?chosen?organization.
7.?Align?the?appropriate?goals?and?objectives?from?the?audit?plan?to?each?domain?and?provide?a?rationale?for?your
alignment.
8.?Develop?a?plan?that:
a.?Examines?the?existence?of?relevant?and?appropriate?security?policies?and?procedures.
b.?Verifies?the?existence?of?controls?supporting?the?policies.
c.?Verifies?the?effective?implementation?and?ongoing?monitoring?of?the?controls.
9.?Identify?the?critical?security?control?points?that?must?be?verified?throughout?the?IT?infrastructure,?and?develop
a?plan?that?includes?adequate?controls?to?meet?high?level?defined?control?objectives?within?this?organization.
10.?Use?at?least?6?(six)?ACADEMIC?resources?in?this?assignment?ONLY.?Note:?Wikipedia?and?similar?Websites
do?not?qualify?as?quality?resources.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Hi there! Click one of our representatives below and we will get back to you as soon as possible.

Chat with us on WhatsApp