Perform a web search on recent in the past 3 years articles


Requirement:

You need to choose a case study and write down all the IT risk as report. you can check what IT risk factor in the lecture notes.IS Audit Report

Important note:

- This is an individual assignment. You must complete the task independently. If you submit a report that is similar to any of your classmate's reports it will be considered academic dishonesty. Refer to the Macquarie University Academic Honesty Procedure and associated documents.

- Please also refer to the submission instruction as per unit guide.

Estimated student workload: 30 hours

Task

Perform a web search on recent (in the past 3 years) articles to find an interesting case study, such as news articles in relation to IS risks.

You will need to attach the original version of the case study or provide the URL link to the original case in the appendix when you submit the assignment.

Assuming that you are an IS auditor, prepare an IS audit plan and report to the management of your client. The document must include the followings:

1) Executive Summary
You will need to prepare an executive summary document (0.5 page maximum) to the board of directors.

2) Background to the Case
Background to the client's business and computerised environment. - This is to demonstrate your understanding of the client's business and IS environment.

3) IS Risks
Identify IS risks from the case study, including analysing the likelihood, level of risks and implications to the business.

4) Audit Plan, Objectives and Procedures
Prepare an audit plan outlining the areas that you propose to audit. In addition, you will need to include audit objectives and audit procedures for each of the area(s) that you plan to audit.

5) Audit Questions and Documents
For each of the audit objectives, provide at least three examples of interview questions that you will use to gather evidence from clients, including naming relevant documents that you may want to obtain for the audit.

6) Control Recommendations
Provide a set of recommendations of control mechanism(s) to mitigate for each of the IS risks. Identify the benefits of your recommendation to your client.

Required
Write a report that addresses all of the above sections.

- Format requirements: "Times New Roman" size 12 with 1.5 line spacing, approximately 1500
- 2000 words in total (not including references). You must include the total of words used in your report. The report should have appropriate headings and subheadings (including an introduction and conclusion).

- You must acknowledge the use of the work of others (e.g. the academic journal articles on which your report is based) using the Harvard referencing style (see https://www.lib.mq.edu.au/research/referencing.html). Any ideas or quotations must be correctly cited in the body of your report and a reference list must be provided at the end of your report.

- Once you have submitted your report, check the originality report in turn-it-in and ensure similarity with other sources is referenced. You can resubmit your report until the due date.

- Please note that the originality report for a resubmission takes 24 hours to be produced. Please ensure that you allow adequate time, if you are considering resubmission.

- Review the marking rubric so that you understand the expected standards and how you will receive feedback.

I have provide you a couple of case study in the pass three year, you can choose any of them to write.

I Have researched a few companies which i believe could be used for this assignment and attached links to get you opinion as to which company is the best options.

2014 JP Morgan Data Breach: https://www.businessinsider.com.au/jp-morgan-data-breach-2014-10?r=US&IR=T

2015 Anthem Data Breach: https://en.wikipedia.org/wiki/Anthem_medical_data_breach

2014 Credit Card Breach Target: https://techcrunch.com/2014/01/10/targets-data-breach-gets-worse-70-million-customers-had-info-stolen-including-names-emails-and-phones/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&utm_content=Netvibes

2016 Hollywood Presbyterian Medical Center: https://www.techtimes.com/articles/135310/20160222/la-hospital-hit-by-ransomware-pays-hackers-17-000-is-it-the-right-choice.htm (2) 8005-8227

Harvard Style

Number of Ref: Above 10

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: Perform a web search on recent in the past 3 years articles
Reference No:- TGS01383198

Expected delivery within 24 Hours