You must develop a policy for conducting IT audits and develop a project plan for conducting two-week IT audits

You are an information security manager for a large national retailer and are directly responsible for the planning and oversight of IT audits. At the request of the board of directors, the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure. The planning and management aspects of IT audit are critical to the overall success of the audit and, consequently the overall success of the systems implemented in the organization.

You must develop a policy for conducting IT audits and develop a project plan for conducting two-week IT audits.In addition to the typical networking and Internetworking infrastructure of a medium-sized organization, the organization has the following characteristics:

  • They have a main office and 268 stores in the United States.
  • They use a cloud computing environment for storage and applications.
  • Their IT infrastructure includes Cisco workgroup and core switches, Cisco routers, Cisco firewalls and intrusion prevention systems, and servers running Microsoft Windows Server 2012.
  • They have over 1,000 desktops and approximately 500 organization-owned laptops at the main headquarters.
  • They allow employees to bring their own devices into the organization; however, they are subject to search upon entry and exit from the building.
  • They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners.
  • They enable wireless access at the main office and the stores.
  • They process an average of 67.2 credit card transactions per hour, every day, at each location, and via their corporate website.

Write a 4–6 page paper in which you:

  1. Explain the management plan for conducting IT audits, including:
    • Risk management.
    • System software and applications.
    • Wireless networking.
    • Cloud computing.
    • Virtualization.
    • Cybersecurity and privacy.
    • BCP and DRP.
    • Network security.
  2. Use at least three quality resources. Note: Wikipedia and similar websites do not qualify as quality resources.

LOOKING FOR THIS ASSIGNMENT OR A SIMILAR ONE? WE HAVE HAD A GOOD SUCCESS RATE ON THIS PAPER! ORDER WITH US TODAY FOR QUALITY WORK AND GET A DISCOUNT!

ORDER NOW

Disclaimer:

All types of paper that Discount Writers provides is only for the purpose of assistance! No text, paper, assignment, discussion would be similar with another student therefore guaranteeing Uniqueness and can be used with proper references only!

More tools: Better Grades: Choose your Homework Help:

Assignment Help: We would write your papers according to the instructions provided and guarantee you timely work

 

Entire Online Class Help: We are here for you and we would do your entire Class work from discussions, assignments, Replies, Exams and Quizzes at a Cost

 

Exam/ Quiz Help: We have a team of writers who specialize on exams from any specific field and we would give you an A+ Grade!

 

ORDER NOW