CIS 349 Evaluating Access Control Methods

Strayer CIS 349 Information Technology Audit and Control, Assignment 3: Evaluating Access Control Methods, 6 pages, 1207 words, for Auditing IT Infrastructures for Compliance. Imagine you are an Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization’s current methods of access control are no […]

CIS 349 Midterm Exam

Strayer CIS 349 Information Technology Audit and Control, Midterm Exam, for Auditing IT Infrastructures for Compliance. Question 1 A large organization’s enterprise resource planning (ERP) system is being audited. Which of the following auditing scopes is most likely to apply? Organizational Compliance Application Technical

CIS 349 Designing Compliance within the LAN-to-WAN Domain

Strayer CIS 349 Information Technology Audit and Control, Assignment 4: Designing Compliance within the LAN to WAN Domain, 7 pages, 1426 words, for Auditing IT Infrastructures for Compliance. Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four states Virginia, Florida, Arizona, and California.

CIS 349 Planning an IT Infrastructure Audit for Compliance

Strayer CIS 349 Information Technology Audit and Control, Final Term Paper, Planning an IT Infrastructure Audit for Compliance, 26 pages, 4630 words, for Auditing IT Infrastructures for Compliance. The audit planning process directly affects the quality of the outcome. A proper plan ensures that resources are focused on the right areas and that potential problems […]