SlideShare a Scribd company logo
1 of 3
Assignment Content
You are part of a team selected by the Chief Information Officer
(CIO) to perform a security audit for one of the companies
explored in this course. Vampire Legends (Week 1)
Cruisin’ Fusion (Weeks 2- 3)
Devil’s Canyon (Weeks 4 – 5)
Create
a 10- to 12-slide presentation (not including the title and
reference slides) that shows the results of your security audit
based on the following audit process:
Potential Risk to be Reviewed:Describe the risk.
Example: Viruses and malware can negatively impact the
confidentiality, integrity, and availability of organizational
data.
Regulation and Compliance Issues:Analyze how regulations and
compliance issues could impact the organization.
Provide a detailed analysis of regulations and compliance
issues, beyond the simple explanation in score point two.
Regulation and Compliance Resources and Tools: Analyze what
resources and/or tools are available to address regulations and
compliance issues.
Describe the control objective and the specific controls you will
evaluate to determine potential risk is mitigated. Please note
that typically, there will be more than one control that should be
reviewed for a potential risk.
Example: Determine whether anti-virus software is in use.
Example: Determine whether virus signatures are periodically
updated.
Example: Determine whether periodic virus scans are
performed.
Provide a detailed analysis of the resources and/or tools
available, beyond the simple explanation in score point two.
IT Security – Processes and Methods: Differentiate between the
various processes and methods involved in management of IT
security resources.
Review the various options available to address those processes
and methods previously explained, and which ones might be
feasible.
IT Security – Measures: Analyze the various security measures
that could be taken within the organization.
Demonstrate a detailed understanding of what the alternatives
are to approach security, how much security is needed, different
methods to employ, etc.
Describe the criteria/measures that you will use to evaluate the
adequacy of each area/review step that you review (i.e., what
criteria will you use to perform your evaluation/how will you
determine that the risk has been mitigated to an acceptable
level).
Example: 100% of servers and PCs have virus software
installed.
Example: 100% of the virus software installed is set to
automatically update, including virus signatures.
Example: 100% of the virus software installed is set to
automatically perform a scan at least weekly.
Include
a 1/2- to 1-page executive summary to support your
presentation. Include appropriate references.

More Related Content

Similar to Assignment ContentYou are part of a team selected by the C.docx

It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit ProcessRam Srivastava
 
What to Expect During a Vulnerability Assessment and Penetration Test
What to Expect During a Vulnerability Assessment and Penetration TestWhat to Expect During a Vulnerability Assessment and Penetration Test
What to Expect During a Vulnerability Assessment and Penetration TestShyamMishra72
 
Assignment Content   After reviewing the material your gro.docx
Assignment Content   After reviewing the material your gro.docxAssignment Content   After reviewing the material your gro.docx
Assignment Content   After reviewing the material your gro.docxlesleyryder69361
 
The Technical Report and Executive SummaryTechnical report Your.docx
The Technical Report and Executive SummaryTechnical report Your.docxThe Technical Report and Executive SummaryTechnical report Your.docx
The Technical Report and Executive SummaryTechnical report Your.docxgloriab9
 
Crucial Steps to Cyber Resilience: A Guide to Effective VAPT
Crucial Steps to Cyber Resilience: A Guide to Effective VAPTCrucial Steps to Cyber Resilience: A Guide to Effective VAPT
Crucial Steps to Cyber Resilience: A Guide to Effective VAPTShyamMishra72
 
Cmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWCmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWshyamuop
 
CMGT 400 Entire Course NEW
CMGT 400 Entire Course NEWCMGT 400 Entire Course NEW
CMGT 400 Entire Course NEWshyamuopfive
 
Online Training Information Security Management
Online Training Information Security ManagementOnline Training Information Security Management
Online Training Information Security Managementeasy2comply
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills
 
InstructionsAssignment #6Write a 1 to 2 page essay paper th.docx
InstructionsAssignment #6Write a 1 to 2 page essay paper th.docxInstructionsAssignment #6Write a 1 to 2 page essay paper th.docx
InstructionsAssignment #6Write a 1 to 2 page essay paper th.docxLaticiaGrissomzz
 
Reorganizing Federal IT to Address Today's Threats
Reorganizing Federal IT to Address Today's ThreatsReorganizing Federal IT to Address Today's Threats
Reorganizing Federal IT to Address Today's ThreatsLumension
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxtienboileau
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesRyan Faircloth
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-SessionRyan Faircloth
 
Cain and AbelOphcrackStart H.docx
Cain and AbelOphcrackStart H.docxCain and AbelOphcrackStart H.docx
Cain and AbelOphcrackStart H.docxRAHUL126667
 
case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)ishan parikh production
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
 
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
Cyber Audit | Cyber Crime | Network Security |  Cyber Security Audit- 2023.pdfCyber Audit | Cyber Crime | Network Security |  Cyber Security Audit- 2023.pdf
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdfCyber Security Experts
 

Similar to Assignment ContentYou are part of a team selected by the C.docx (20)

It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit Process
 
What to Expect During a Vulnerability Assessment and Penetration Test
What to Expect During a Vulnerability Assessment and Penetration TestWhat to Expect During a Vulnerability Assessment and Penetration Test
What to Expect During a Vulnerability Assessment and Penetration Test
 
Assignment Content   After reviewing the material your gro.docx
Assignment Content   After reviewing the material your gro.docxAssignment Content   After reviewing the material your gro.docx
Assignment Content   After reviewing the material your gro.docx
 
Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016
 
Cmgt 430 cmgt430
Cmgt 430 cmgt430Cmgt 430 cmgt430
Cmgt 430 cmgt430
 
The Technical Report and Executive SummaryTechnical report Your.docx
The Technical Report and Executive SummaryTechnical report Your.docxThe Technical Report and Executive SummaryTechnical report Your.docx
The Technical Report and Executive SummaryTechnical report Your.docx
 
Crucial Steps to Cyber Resilience: A Guide to Effective VAPT
Crucial Steps to Cyber Resilience: A Guide to Effective VAPTCrucial Steps to Cyber Resilience: A Guide to Effective VAPT
Crucial Steps to Cyber Resilience: A Guide to Effective VAPT
 
Cmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWCmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEW
 
CMGT 400 Entire Course NEW
CMGT 400 Entire Course NEWCMGT 400 Entire Course NEW
CMGT 400 Entire Course NEW
 
Online Training Information Security Management
Online Training Information Security ManagementOnline Training Information Security Management
Online Training Information Security Management
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
 
InstructionsAssignment #6Write a 1 to 2 page essay paper th.docx
InstructionsAssignment #6Write a 1 to 2 page essay paper th.docxInstructionsAssignment #6Write a 1 to 2 page essay paper th.docx
InstructionsAssignment #6Write a 1 to 2 page essay paper th.docx
 
Reorganizing Federal IT to Address Today's Threats
Reorganizing Federal IT to Address Today's ThreatsReorganizing Federal IT to Address Today's Threats
Reorganizing Federal IT to Address Today's Threats
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docx
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
 
Cain and AbelOphcrackStart H.docx
Cain and AbelOphcrackStart H.docxCain and AbelOphcrackStart H.docx
Cain and AbelOphcrackStart H.docx
 
case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
Cyber Audit | Cyber Crime | Network Security |  Cyber Security Audit- 2023.pdfCyber Audit | Cyber Crime | Network Security |  Cyber Security Audit- 2023.pdf
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
 

More from lesleyryder69361

Assignment details written in the attachmentsYou need to choose an.docx
Assignment details written in the attachmentsYou need to choose an.docxAssignment details written in the attachmentsYou need to choose an.docx
Assignment details written in the attachmentsYou need to choose an.docxlesleyryder69361
 
Assignment Details A high school girl has been caught shoplifting at.docx
Assignment Details A high school girl has been caught shoplifting at.docxAssignment Details A high school girl has been caught shoplifting at.docx
Assignment Details A high school girl has been caught shoplifting at.docxlesleyryder69361
 
Assignment Details A 12-year-old boy was caught in the act of sexual.docx
Assignment Details A 12-year-old boy was caught in the act of sexual.docxAssignment Details A 12-year-old boy was caught in the act of sexual.docx
Assignment Details A 12-year-old boy was caught in the act of sexual.docxlesleyryder69361
 
Assignment Details (350 WORDS)The last quarter of the 20th c.docx
Assignment Details (350 WORDS)The last quarter of the 20th c.docxAssignment Details (350 WORDS)The last quarter of the 20th c.docx
Assignment Details (350 WORDS)The last quarter of the 20th c.docxlesleyryder69361
 
Assignment Details (300 words and references)Collaborati.docx
Assignment Details (300 words and references)Collaborati.docxAssignment Details (300 words and references)Collaborati.docx
Assignment Details (300 words and references)Collaborati.docxlesleyryder69361
 
Assignment Details (2-3 pages) Research information about cu.docx
Assignment Details (2-3 pages) Research information about cu.docxAssignment Details (2-3 pages) Research information about cu.docx
Assignment Details (2-3 pages) Research information about cu.docxlesleyryder69361
 
Assignment Details (250 - 300 words)Now that the research .docx
Assignment Details (250 - 300 words)Now that the research .docxAssignment Details (250 - 300 words)Now that the research .docx
Assignment Details (250 - 300 words)Now that the research .docxlesleyryder69361
 
Assignment detailed instructions Write a three-page (minimum of 7.docx
Assignment detailed instructions Write a three-page (minimum of 7.docxAssignment detailed instructions Write a three-page (minimum of 7.docx
Assignment detailed instructions Write a three-page (minimum of 7.docxlesleyryder69361
 
Assignment detailed instructions Write a three-page (minimum of 750.docx
Assignment detailed instructions Write a three-page (minimum of 750.docxAssignment detailed instructions Write a three-page (minimum of 750.docx
Assignment detailed instructions Write a three-page (minimum of 750.docxlesleyryder69361
 
Assignment Description 400 wordsOne of the more important me.docx
Assignment Description 400 wordsOne of the more important me.docxAssignment Description 400 wordsOne of the more important me.docx
Assignment Description 400 wordsOne of the more important me.docxlesleyryder69361
 
Assignment DescriptionYou work for a small community hospita.docx
Assignment DescriptionYou work for a small community hospita.docxAssignment DescriptionYou work for a small community hospita.docx
Assignment DescriptionYou work for a small community hospita.docxlesleyryder69361
 
Assignment description The tourism industry represents about .docx
Assignment description The tourism industry represents about .docxAssignment description The tourism industry represents about .docx
Assignment description The tourism industry represents about .docxlesleyryder69361
 
Assignment DescriptionYou will prepare and deliver a speech .docx
Assignment DescriptionYou will prepare and deliver a speech .docxAssignment DescriptionYou will prepare and deliver a speech .docx
Assignment DescriptionYou will prepare and deliver a speech .docxlesleyryder69361
 
Assignment DescriptionYou are to write an essay in which you .docx
Assignment DescriptionYou are to write an essay in which you .docxAssignment DescriptionYou are to write an essay in which you .docx
Assignment DescriptionYou are to write an essay in which you .docxlesleyryder69361
 
Assignment DescriptionYou are the lead human–computer intera.docx
Assignment DescriptionYou are the lead human–computer intera.docxAssignment DescriptionYou are the lead human–computer intera.docx
Assignment DescriptionYou are the lead human–computer intera.docxlesleyryder69361
 
Assignment DescriptionYou are now ready to start representin.docx
Assignment DescriptionYou are now ready to start representin.docxAssignment DescriptionYou are now ready to start representin.docx
Assignment DescriptionYou are now ready to start representin.docxlesleyryder69361
 
Assignment DescriptionManagement is worried, after consultin.docx
Assignment DescriptionManagement is worried, after consultin.docxAssignment DescriptionManagement is worried, after consultin.docx
Assignment DescriptionManagement is worried, after consultin.docxlesleyryder69361
 
Assignment DescriptionEgo Integrity PresentationImagine .docx
Assignment DescriptionEgo Integrity PresentationImagine .docxAssignment DescriptionEgo Integrity PresentationImagine .docx
Assignment DescriptionEgo Integrity PresentationImagine .docxlesleyryder69361
 
Assignment DescriptionCultural Group Exploration Assignment .docx
Assignment DescriptionCultural Group Exploration Assignment .docxAssignment DescriptionCultural Group Exploration Assignment .docx
Assignment DescriptionCultural Group Exploration Assignment .docxlesleyryder69361
 
Assignment description from the syllabusEach member of the matc.docx
Assignment description from the syllabusEach member of the matc.docxAssignment description from the syllabusEach member of the matc.docx
Assignment description from the syllabusEach member of the matc.docxlesleyryder69361
 

More from lesleyryder69361 (20)

Assignment details written in the attachmentsYou need to choose an.docx
Assignment details written in the attachmentsYou need to choose an.docxAssignment details written in the attachmentsYou need to choose an.docx
Assignment details written in the attachmentsYou need to choose an.docx
 
Assignment Details A high school girl has been caught shoplifting at.docx
Assignment Details A high school girl has been caught shoplifting at.docxAssignment Details A high school girl has been caught shoplifting at.docx
Assignment Details A high school girl has been caught shoplifting at.docx
 
Assignment Details A 12-year-old boy was caught in the act of sexual.docx
Assignment Details A 12-year-old boy was caught in the act of sexual.docxAssignment Details A 12-year-old boy was caught in the act of sexual.docx
Assignment Details A 12-year-old boy was caught in the act of sexual.docx
 
Assignment Details (350 WORDS)The last quarter of the 20th c.docx
Assignment Details (350 WORDS)The last quarter of the 20th c.docxAssignment Details (350 WORDS)The last quarter of the 20th c.docx
Assignment Details (350 WORDS)The last quarter of the 20th c.docx
 
Assignment Details (300 words and references)Collaborati.docx
Assignment Details (300 words and references)Collaborati.docxAssignment Details (300 words and references)Collaborati.docx
Assignment Details (300 words and references)Collaborati.docx
 
Assignment Details (2-3 pages) Research information about cu.docx
Assignment Details (2-3 pages) Research information about cu.docxAssignment Details (2-3 pages) Research information about cu.docx
Assignment Details (2-3 pages) Research information about cu.docx
 
Assignment Details (250 - 300 words)Now that the research .docx
Assignment Details (250 - 300 words)Now that the research .docxAssignment Details (250 - 300 words)Now that the research .docx
Assignment Details (250 - 300 words)Now that the research .docx
 
Assignment detailed instructions Write a three-page (minimum of 7.docx
Assignment detailed instructions Write a three-page (minimum of 7.docxAssignment detailed instructions Write a three-page (minimum of 7.docx
Assignment detailed instructions Write a three-page (minimum of 7.docx
 
Assignment detailed instructions Write a three-page (minimum of 750.docx
Assignment detailed instructions Write a three-page (minimum of 750.docxAssignment detailed instructions Write a three-page (minimum of 750.docx
Assignment detailed instructions Write a three-page (minimum of 750.docx
 
Assignment Description 400 wordsOne of the more important me.docx
Assignment Description 400 wordsOne of the more important me.docxAssignment Description 400 wordsOne of the more important me.docx
Assignment Description 400 wordsOne of the more important me.docx
 
Assignment DescriptionYou work for a small community hospita.docx
Assignment DescriptionYou work for a small community hospita.docxAssignment DescriptionYou work for a small community hospita.docx
Assignment DescriptionYou work for a small community hospita.docx
 
Assignment description The tourism industry represents about .docx
Assignment description The tourism industry represents about .docxAssignment description The tourism industry represents about .docx
Assignment description The tourism industry represents about .docx
 
Assignment DescriptionYou will prepare and deliver a speech .docx
Assignment DescriptionYou will prepare and deliver a speech .docxAssignment DescriptionYou will prepare and deliver a speech .docx
Assignment DescriptionYou will prepare and deliver a speech .docx
 
Assignment DescriptionYou are to write an essay in which you .docx
Assignment DescriptionYou are to write an essay in which you .docxAssignment DescriptionYou are to write an essay in which you .docx
Assignment DescriptionYou are to write an essay in which you .docx
 
Assignment DescriptionYou are the lead human–computer intera.docx
Assignment DescriptionYou are the lead human–computer intera.docxAssignment DescriptionYou are the lead human–computer intera.docx
Assignment DescriptionYou are the lead human–computer intera.docx
 
Assignment DescriptionYou are now ready to start representin.docx
Assignment DescriptionYou are now ready to start representin.docxAssignment DescriptionYou are now ready to start representin.docx
Assignment DescriptionYou are now ready to start representin.docx
 
Assignment DescriptionManagement is worried, after consultin.docx
Assignment DescriptionManagement is worried, after consultin.docxAssignment DescriptionManagement is worried, after consultin.docx
Assignment DescriptionManagement is worried, after consultin.docx
 
Assignment DescriptionEgo Integrity PresentationImagine .docx
Assignment DescriptionEgo Integrity PresentationImagine .docxAssignment DescriptionEgo Integrity PresentationImagine .docx
Assignment DescriptionEgo Integrity PresentationImagine .docx
 
Assignment DescriptionCultural Group Exploration Assignment .docx
Assignment DescriptionCultural Group Exploration Assignment .docxAssignment DescriptionCultural Group Exploration Assignment .docx
Assignment DescriptionCultural Group Exploration Assignment .docx
 
Assignment description from the syllabusEach member of the matc.docx
Assignment description from the syllabusEach member of the matc.docxAssignment description from the syllabusEach member of the matc.docx
Assignment description from the syllabusEach member of the matc.docx
 

Recently uploaded

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 

Recently uploaded (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Assignment ContentYou are part of a team selected by the C.docx

  • 1. Assignment Content You are part of a team selected by the Chief Information Officer (CIO) to perform a security audit for one of the companies explored in this course. Vampire Legends (Week 1) Cruisin’ Fusion (Weeks 2- 3) Devil’s Canyon (Weeks 4 – 5) Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the results of your security audit based on the following audit process: Potential Risk to be Reviewed:Describe the risk. Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data. Regulation and Compliance Issues:Analyze how regulations and compliance issues could impact the organization. Provide a detailed analysis of regulations and compliance issues, beyond the simple explanation in score point two. Regulation and Compliance Resources and Tools: Analyze what resources and/or tools are available to address regulations and compliance issues.
  • 2. Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be more than one control that should be reviewed for a potential risk. Example: Determine whether anti-virus software is in use. Example: Determine whether virus signatures are periodically updated. Example: Determine whether periodic virus scans are performed. Provide a detailed analysis of the resources and/or tools available, beyond the simple explanation in score point two. IT Security – Processes and Methods: Differentiate between the various processes and methods involved in management of IT security resources. Review the various options available to address those processes and methods previously explained, and which ones might be feasible. IT Security – Measures: Analyze the various security measures that could be taken within the organization. Demonstrate a detailed understanding of what the alternatives are to approach security, how much security is needed, different methods to employ, etc. Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable
  • 3. level). Example: 100% of servers and PCs have virus software installed. Example: 100% of the virus software installed is set to automatically update, including virus signatures. Example: 100% of the virus software installed is set to automatically perform a scan at least weekly. Include a 1/2- to 1-page executive summary to support your presentation. Include appropriate references.