Information security audit comp 0392 - the auditor should


OBJECTIVES

This assignment is designed to assess students' ability to:

- Produce a concise detailed report about the importance of information security audit policy and its components
- To have excellent understanding relating to information security audit policy and its components
- To develop skills in manipulating and performing an information security audit
- To be able to define components of information security audit policy according to corporate requirements
- To be able to manage metrics, statistics, and facts about security audit policy effectively.
- Use of CU Harvard referencing system to cite and reference academic resources

OUTCOME

Student must have understanding of the following points

- Develop Information Security audit baseline(s).
- Perform an audit to identify events and corrective actions.
- Produce an audit-letter (report) to the organization's senior management.

Tasks:

These days, most of organizations are considering information security audit as a high priority due to the above said reasons. Hence, An information security audit is an audit on the level of information security in an organization. The organization's IT environment has to be controlled to meet the business requirements. For that purpose, an effective risk-based Information Security audit program with generally accepted audit standards and guidelines should be developed. Critically analyze and provide your findings on the following four aspects of information security audit

Task 1:

Assignment work proposal submission

Task 2:

The auditor should have a sufficient knowledge about the company and its critical business activities before starting an audit review. Critically analyze the part of an Information Security auditor towards audit planning and preparation.

Task 3:

The auditor should consider various criteria the auditing approach. Analyze one of information security auditing frameworks or approaches that an auditor should establish over starting the auditing process.

Task 4:

The technical auditing is consider main phase of IS auditing. Therefore, as IS auditor evaluate the different types of controls and their use in Information Security audit.

Task 5:

As an Information Security Auditor, conduct an audit on network security tools of any organization (of your choice) and provide a comprehensive report to its senior management. The auditing report should include the auditor's (in this case your) inquiries and procedures followed during audit in detail.

- Prepare a report in MS-Word format not exceeding 25 pages describing the tasks 1 to 4 and upload it to Moodle.

- Prepare a PowerPoint presentation to explain your findings and actions on the tasks 1 to 4 and upload it to Moodle. This will be used during viva exam.

TASKS DESCRIPTION AND MARKS DISTRIBUTION

Marks will be awarded on each task based on the fulfilled following expectation

TASK1: Work Proposal

Submit a work proposal for this assignment on or before, which must include: Understanding of deliverables - a detail description of deliverables, General overview of proposed plan - initial understanding of solution to all the tasks, Resources identified, Work proposal should be submitted in the form of word document in Moodle

TASK 2: Audit planning and preparation

Expected topics - meeting with management, review current/existing reports, review job descriptions, review organization's IT policies and procedures, Evaluate the company's IT budget and systems planning documentation, etc.

TASK 3: Auditor's established frameworks for an audit process

Expected topics - Analyze one of information security auditing frameworks or approaches that an auditor should establish over starting the auditing process. Include definitions, process, phases, advantages, versions and diagrams

TASK 4: Analyze the type of controls

Expected topics - detailed description on various possible control types

TASK 5: Perform audit and generate report

Expected topics - report on proper format as close to an audit charter, evidence on findings, description of inquiries and procedures followed, use of risk assessment, corporate governance applied, audit planning, etc.

Request for Solution File

Ask an Expert for Answer!!
Auditing: Information security audit comp 0392 - the auditor should
Reference No:- TGS01707859

Expected delivery within 24 Hours