StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Course:Audit & Security - Essay Example

Cite this document
Summary
Nowadays, when information is considered to be one of the most valuable assets an organisation has, information security is a key issue for many businesses and organisations including universities. Information security is understood as managing the risks posed to organisations…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful
Course:Audit & Security
Read Text Preview

Extract of sample "Course:Audit & Security"

Download file to see previous pages

So, today every organisation needs to protect its information of any forms (Honan, 2009). Guttman and Roback (1995) assert that executives should view information security as an important management issue and seek to protect their information resources as they would any other valuable assets. The ISO 27001 information security standard offers companies a risk-based approach to securing their information assets. ISO 27001 defines an ISMS, or Information Security Management System, that is “a part of the overall management system, based on a business risk approach, to establish, implement, operate, monitor, review, maintain and improve information security” (Calder, 2009, p.4). In this system the development and implementation of the audit processes in order to assess the security level of the organisational information system is a very significant aspect.

The main objective of any audit is to establish difference between the standard specifications and the reality from the organisations. Also as Honan points out, an audit “provides a means of being alerted to critical events as they happen, …[as well as] provides a historical view of what happened so that incidents can be investigated” (2009, p.253). The security audit of computing resources used by students in the computing laboratories on the first floor of the King William Building was conducted by the auditor of the AuditSec Company in response to the request of the School of Computing & Mathematics Sciences (CMS) in the University of Greenwich.

My overall audit objective was to test the effectiveness of selected information security politics in the CMS and to ensure that employees and students of the CMS operate in accordance with the specified procedures and requirements in meeting the organisation’s goals in relation to information security. As was specified in the audit request, the current audit did not have to cover all

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Course:Audit & Security Essay Example | Topics and Well Written Essays - 4000 words”, n.d.)
Course:Audit & Security Essay Example | Topics and Well Written Essays - 4000 words. Retrieved from https://studentshare.org/miscellaneous/1564555-courseaudit-security
(Course:Audit & Security Essay Example | Topics and Well Written Essays - 4000 Words)
Course:Audit & Security Essay Example | Topics and Well Written Essays - 4000 Words. https://studentshare.org/miscellaneous/1564555-courseaudit-security.
“Course:Audit & Security Essay Example | Topics and Well Written Essays - 4000 Words”, n.d. https://studentshare.org/miscellaneous/1564555-courseaudit-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Course:Audit & Security

How Should Organizational Information Systems Be Audited for Security

Professor Name ID # Date How should organizational information systems be audited for security Paper 1: Information security auditing is a process of carrying out self-governing assessments of an organization's processes, policies, measures, standards and practices implemented in an attempt to protect electronic information from loss, damage, rejection of availability or unintended disclosure.... At the present, businesses should take a number of steps in an attempt to formulate or improve an IS security audit facility....
4 Pages (1000 words) Essay

Major Threats in Cybersecurity

Name: Title: Course: Tutor: Date: Cyber security Topic 1 Companies globally continue to record increasing incidences of cyber attacks with the recent years recording remarkable increase in both the rate and sophistication.... Salomon (2010) reports 40% chance of this occurrence according to reports from the FBI Computer Crime and security findings.... Training employees adequately on security and dividing critical functions among them limits frauds or sabotage committed solely (Cappelli, Moore, Shimeall & Trzeciak, 2006)....
3 Pages (750 words) Coursework

Improvement of the Education of Pre-Service

audit Report al Affiliation) Introduction.... The paper discusses the audit report on the standards and techniques that the government needs to improve performance of these subjects.... The project will take developmental and long-term approach to math and science issues ("audit report" 2008).... Subsequently, it creates lower representation in science and math ("audit report" 2009).... However, it is faced by risk of trade union that is volatile especially around after working hours of teachers ("audit report" 2004)....
3 Pages (750 words) Assignment

Interoffice Memo

If one of your security professionals does encounter an issue, for instance, an employee believes someone has used their computer or workstation to commit such an act, ask the employee to keep his or her hands off all computer and peripheral equipment.... However, I am thankful that you showed enough concern to contact me about this matter....
8 Pages (2000 words) Essay

Planning an IT Infrastructure Audit for Compliance

nbsp;… IT infrastructure audit helps the digital organizations to assess and address questions of IT security, information workflow and information privacy and integrity of the organization.... It also provides auditing and IT security services to various digital organizations in Canada.... This paper ''Planning an IT Infrastructure audit for Compliance'' discusses that information technology auditing refers to the process of reviewing and evaluating the systems of processing the automated information technology, the non-automated processes of IT, and IT interfaces....
11 Pages (2750 words) Research Proposal

Post of Loss Prevention Team Leader

nbsp;Most of the work that I did in the company included troubleshooting organizational issues, identifying security issues and weak points in the organization by reviewing investigation results, financial audits and exception reports, conducting organizational training in general mostly on security-related issues and checking audit investigations in the organization.... Additionally, my experience in the organization gave me the knowledge of identifying security issues and weak points in the organization by reviewing investigation results, financial audits and exception report an aspect, which the Azadea Group is looking for as one of the qualifications for that position....
4 Pages (1000 words) Resume/CV

Poor Security Policies of Welco Insurance PLC

The case study “Poor security Policies of Welco Insurance PLC” explores unpleasant findings of the internal audit and its further advice to prevent security breach attacks, Implement suitable measures, management and administrative, physical and technical control.... security Management is a huge challenge for many organizations as complexity and uncertainty have increased in today's world.... security Management can conflict within the organization and can pose to be a significant barrier to process and work effectively as the strategic goals are often in conflict with the security rules....
14 Pages (3500 words) Case Study

The Volkswagen Group AG - Information Systems Auditing

Volkswagen has found it necessary to conduct an IS risk audit to enhance its preparedness and response towards future IS risks that span the various departments of the company: internally, externally, and inside the vehicles.... The firm believes that the audit will enable it to achieve the seamless flow of information between the departments of the company and between the company and its partners without the threat of succumbing to cyber insecurity and the failure of fragmented information systems such as the emissions software....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us