Any topic (writer's choice)

Instructions

The learning outcome for this unit involves the process of developing an information system (IS) compliance audit plan for an organization. There are many factors involved in this process including examining the requirements, developing a plan, creating documentation, and anticipating corrective measures. All these considerations are brought together and addressed in this assignment.Assume you are in charge of an anticipated IT compliance audit for the system/application domain. The chief information officer (CIO) wants to be prepared and asks you to create a plan. Address the following in your plan:Explain the information security systems requirements for securing the system/application domain.Evaluate the controls needed for securing the system/application domain.Develop the compliance requirements for the system/application domain.Describe the general procedures and best practices for system/application domain compliance.Summarize potential corrective measures for audit findings in the system/application domain.Your response must be at least four pages in length, double-spaced. Use two sources: the course textbook and a resource from the CSU Online Library. They must be referenced; paraphrased and quoted material must have accompanying APA citations.

Answer

Computer ScienceThe preparation of an information system compliance audit plan requires information security systems that will be needed for the application and system domain. One such requirement is the operating systems which are comprised of the servers, computers and networks. The organization will also need the systems for Enterprise Resource Planning and emails, as well as web browsers. Likewise, it is necessary for us to have authorized physical access that has been defined by Peltier (2016) as the tool that allows administrators and permitted users to gain access to information system networks. Another requirement is logical access that deals with all types of data required in the performance of activities. Furthermore, there is need for software vulnerability analysis. This will c...

To avoid plagiarism, part of the answer is hidden. Click on the button below to order the full answer.
Order Answer Back
Price Calculator
Manage orders
Why we are Ranked the best
  • Unlimited Revisions
  • Free 24/7 Support and chat
  • Money back guaranteed
  • Low prices with discounts
  • Experienced writers.
  • Free Unlimited support

Hear from our customers

Get a quote Chat with support Find an expert Frequently asked questions