Planning an IT Infrastructure Audit for Compliance

Description
Term?Paper:?Planning?an?IT?Infrastructure?Audit?for?Compliance
***PLEASE?NOTE?THIS?ASSIGNMENT?MUST?BE?WRITTEN?AT?A?MASTER?S?DEGREE?LEVEL.
ANYTHING?BELOW?WILL?BE?UNACCEPTABLE.?***
**DO?NOT?MISS?ANY?COMPONENTS?OF?THE?INSTRUCTIONS.?ALL?QUESTIONS?MUST?BE
THOROUGHLY?ADDRESSED.?**
*Use?headers?for?each?question?answered?to?assist?in?organization?for?the?reader.?*
The?audit?planning?process?directly?affects?the?quality?of?the?outcome.?A?proper?plan?ensures?that?resources?are
focused?on?the?right?areas?and?that?potential?problems?are?identified?early.?A?successful?audit?first?outlines?the
objectives?of?the?audit,?the?procedures?that?will?be?followed,?and?the?required?resources.
Choose?an?organization?you?are?familiar?with?and?develop?a?nine?(9)?page?IT?infrastructure?audit?for?compliance
in?which?you:
1.?Define?the?following?items?for?an?organization?you?are?familiar?with:
a.?Scope
b.?Goals?and?objectives
c.?Frequency?of?the?audit
d.?Duration?of?the?audit
2.?Identify?the?critical?requirements?of?the?audit?for?your?chosen?organization?and?explain?why?you?consider
them?to?be?critical?requirements.
3.?Choose?privacy?laws?that?apply?to?the?organization,?and?suggest?who?is?responsible?for?privacy?within?the
organization.
4.?Develop?a?plan?for?assessing?IT?security?for?your?chosen?organization?by?conducting?the?following:
a.?Risk?management
b.?Threat?analysis
c.?Vulnerability?analysis
d.?Risk?assessment?analysis
5.?Explain?how?to?obtain?information,?documentation,?and?resources?for?the?audit.
6.?Analyze?how?each?of?the?seven?(7)?domains?aligns?within?your?chosen?organization.
7.?Align?the?appropriate?goals?and?objectives?from?the?audit?plan?to?each?domain?and?provide?a?rationale?for?your
alignment.
8.?Develop?a?plan?that:
a.?Examines?the?existence?of?relevant?and?appropriate?security?policies?and?procedures.
b.?Verifies?the?existence?of?controls?supporting?the?policies.
c.?Verifies?the?effective?implementation?and?ongoing?monitoring?of?the?controls.
9.?Identify?the?critical?security?control?points?that?must?be?verified?throughout?the?IT?infrastructure,?and?develop
a?plan?that?includes?adequate?controls?to?meet?high?level?defined?control?objectives?within?this?organization.
10.?Use?at?least?6?(six)?ACADEMIC?resources?in?this?assignment?ONLY.?Note:?Wikipedia?and?similar?Websites
do?not?qualify?as?quality?resources.

find the cost of your paper