CIS 349 Evaluating Access Control Methods

Strayer CIS 349 Information Technology Audit and Control, Assignment 3: Evaluating Access Control Methods, 6 pages, 1207 words, for Auditing IT Infrastructures for Compliance. Imagine you are an Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization's current methods of access control are no longer sufficient.

Continue Reading

CIS 349 Designing Compliance within the LAN-to-WAN Domain

Strayer CIS 349 Information Technology Audit and Control, Assignment 4: Designing Compliance within the LAN to WAN Domain, 7 pages, 1426 words, for Auditing IT Infrastructures for Compliance. Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four states Virginia, Florida, Arizona, and California.

Continue Reading

CIS 349 Planning an IT Infrastructure Audit for Compliance

Strayer CIS 349 Information Technology Audit and Control, Final Term Paper, Planning an IT Infrastructure Audit for Compliance, 26 pages, 4630 words, for Auditing IT Infrastructures for Compliance. The audit planning process directly affects the quality of the outcome. A proper plan ensures that resources are focused on the right areas and that potential problems are identified early. A successful audit first outlines the objectives of the audit, the procedures that will be followed, and the required resources.

Continue Reading

CIS 349 Designing FERPA Technical Safeguards

Strayer CIS 349 Information Technology Audit and Control, Assignment 1: Designing FERPA Technical Safeguards. 5 pages, 846 words, for Auditing IT Infrastructures for Compliance. Imagine you are an Information Security consultant for a small college registrar's office

Continue Reading

CIS 349 Organizational Risk Appetite and Risk Assessment

Strayer CIS 349 Information Technology Audit and Control, Assignment 2: Organizational Risk Appetite and Risk Assessment 5 pages, 907 words, Graded A for Auditing IT Infrastructures for Compliance. Imagine that a software development company has just appointed you to lead a risk assessment project.

Continue Reading
Close Menu