Category Archives: CIS 558

CIS 558 Week 1 Discussion COBIT Planning latest

To Buy This material Click below link

http://www.assignmentclick.com/cis-558-strayer/cis-558-week-1-discussion-cobit-planning-latest

CIS 558 Week 1 Discussion COBIT Planning latest

“COBIT Planning”  Please respond to the following:

Describe how organizations establish the five (5) COBIT IT governance focus areas: strategic alignment, value delivery, risk management, resource management, and performance management
Suppose senior management has tasked you with the planning of the COBIT compliance project. In terms of the COBIT framework, predict which key areas are likely to be problematic to implement. Suggest at least two (2) possible solutions to these problematic areas.

For more Assignments visit  http://www.assignmentclick.com

CIS 558 Week 2 Discussion Question Developing an ERM plan latest

To Buy This material Click below link

http://www.assignmentclick.com/cis-558-strayer/cis-558-week-2-discussion-question-developing-an-erm-plan-latest

CIS 558 Week 2 Discussion Question Developing an ERM plan latest

“Developing an ERM plan”  Please respond to the following:

From a management perspective, decide which key policies and procedures one should consider as the starting point when developing an ERM plan for an organization. Defend your position.

Provide a list of essential personnel whom you believe should be involved in creating and maintaining an ERM plan for an organization. Describe the role of each person. Suggest a timeline for establishing an ERM plan, giving your opinion on how frequently the plan should be reviewed.

For more Assignments visit  http://www.assignmentclick.com

CIS 558 Week 3 Assignment 1 ERM Roadmap (2 Papers) latest

To Buy This material Click below link

http://www.assignmentclick.com/cis-558-strayer/cis-558-week-3-assignment-1-erm-roadmap-latest

CIS 558 Week 3 Assignment 1 ERM Roadmap (2 Papers) latest

This Tutorial contains 2 Papers

CIS 558 Week 3 Assignment 1 ERM Roadmap

Week 3 Assignment 1
Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Assignment 1: ERM Roadmap
Due Week 3 and worth 125 points

The following material may be useful for the completion of this assignment. You may refer to the documents titled “Embracing Enterprise Risk Management: Practical Approaches for Getting Started” and “Developing Key Risk Indicators to Strengthen Enterprise Risk Management”, located at http://www.coso.org/-ERM.htm.

Imagine you are an Information Technology Manager employed by a business that needs you to develop a plan for an effective Enterprise Risk Management (ERM) program. In the past, ERM has not been a priority for the organization. Failed corporate security audits, data breaches, and recent latests stories have convinced the Board of Directors that they must address these weaknesses. As a result, the CEO has tasked you to create a brief overview of ERM and provide recommendations for establishing an effective ERM program that will be used as a basis to address this area moving forward.

Write a three to four (3-4) page paper in which you:
1. Summarize the COSO Risk Management Framework and COSO’s ERM process.
2. Recommend to management the approach that they need to take to implement an effective ERM program. Include the issues and organizational impact they might encounter if they do not implement an effective ERM program.
3. Analyze the methods for establishing key risk indicators (KRIs).
4. Suggest the approach that the organization needs to take in order to link the KRIs with the organization’s strategic initiatives.
5. Use at least three (3) quality resources in this assignment (in addition to and that support the documents from the COSO Website referenced in this assignment). Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Describe the COSO enterprise risk management framework.
• Describe the process of performing effective information technology audits and general controls.
• Use technology and information resources to research issues in information technology audit and control.
• Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

For more Assignments visit  http://www.assignmentclick.com

CIS 558 Week 3 Discussion Mitigating Wireless Risk latest

To Buy This material Click below link

http://www.assignmentclick.com/cis-558-strayer/cis-558-week-3-discussion-mitigating-wireless-risk-latest

CIS 558 Week 3 Discussion Mitigating Wireless Risk latest

“Mitigating Wireless Risk”  Please respond to the following:

Suggest two (2) of the risks and two (2) of the benefits associated with the implementation of wireless networks.

For each of the risks, provide key suggestions for mitigating or eliminating those risks from an auditor’s perspective. Suggest key methods for measuring the effectiveness of your solutions.

For more Assignments visit  http://www.assignmentclick.com

CIS 558 Week 4 Case Study 1 Mitigating Cloud Computing Risks (2 Papers) latest

To Buy This material Click below link

http://www.assignmentclick.com/cis-558-strayer/cis-558-week-4-case-study-1-mitigating-cloud-computing-risks-latest

CIS 558 Week 4 Case Study 1 Mitigating Cloud Computing Risks (2 Papers) latest

This Tutorial contains 2 Papers

Week 4 Case Study 1
Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Case Study 1: Mitigating Cloud Computing Risks
Due Week 4 and worth 125 points

Imagine you are an Information Security Manager in a medium-sized organization. Your CIO has asked you to prepare a case analysis report and presentation on establishing internal controls in cloud computing. The CIO has seen several resources online which discuss the security risks related to Cloud based computing and storage. One that stood out was located at http://www.isaca.org/Journal/Past-Issues/2011/Volume-4/Pages/Cloud-Computing-Risk-Assessment-A-Case-Study.aspx. You are being asked to summarize the information you can find on the Internet and other sources that are available.  Moving forward, the CIO wants to have a firm grasp of the benefits and risks associated with public, private, and hybrid cloud usage. There is also concern over how these systems, if they were in place, should be monitored to ensure not only proper usage, but also that none of these systems or their data have been compromised.

Write a three to four (3-4) page paper in which you:
1. Provide a summary analysis of the most recent research that is available in this area.
2. Examine the risks and vulnerabilities associated with public clouds, private clouds, and hybrids. Include primary examples applicable from the case studies you previously reviewed.
3. Suggest key controls that organizations could implement to mitigate these risks and vulnerabilities.
4. Develop a list of IT audit tasks that address a cloud computing environment based on the results from the analysis of the case studies, the risks and vulnerabilities, and the mitigation controls.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Describe the process of performing effective information technology audits and general controls.
• Describe the various general controls and audit approaches for software and architecture to include operating systems, telecommunication networks, cloud computing, service-oriented architecture and virtualization.
• Use technology and information resources to research issues in information technology audit and control.
• Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions

For more Assignments visit  http://www.assignmentclick.com

CIS 558 Week 4 Discussion Obstacles to CMMI Development latest

To Buy This material Click below link

http://www.assignmentclick.com/cis-558-strayer/cis-558-week-4-discussion-obstacles-to-cmmi-development-latest

CIS 558 Week 4 Discussion Obstacles to CMMI Development latest

“Obstacles to CMMI Development”  Please respond to the following:

Elaborate on three (3) of the obstacles that must be overcome as a business moves up the CMMI model. Suggest key methods for overcoming the obstacles you have identified.

Describe the measurable benefits of progressing up the CMMI model. From an auditing perspective, determine the manner in which these benefits might be observed.

For more Assignments visit  http://www.assignmentclick.com

CIS 558 Week 5 Discussion Automated Auditing latest

To Buy This material Click below link

http://www.assignmentclick.com/cis-558-strayer/cis-558-week-5-discussion-automated-auditing-latest

CIS 558 Week 5 Discussion Automated Auditing latest

“Automated Auditing”  Please respond to the following:

CAATTs can be helpful when dealing with immense amounts of data. However, developing a CAATT system can be time consuming. Argue for or against the use of CAATT systems.

Identify the key elements of building an effective CAATT system. Elaborate on two (2) challenges faced when designing an effective CAATT system, and suggest possible solutions to these problems.

For more Assignments visit  http://www.assignmentclick.com

CIS 558 Week 6 Assignment 2 Software Engineering, CMMI, and ITIL (2 Papers) latest

To Buy This material Click below link

http://www.assignmentclick.com/cis-558-strayer/cis-558-week-6-assignment-2-software-engineering,cmmi,and-itil-latest

CIS 558 Week 6 Assignment 2 Software Engineering, CMMI, and ITIL (2 Papers) latest

This Tutorial contains 2 Papers

Realizing that an organization’s CMMI level impacts an organization’ s success on requests for proposals (RFPs), your CIO wants to get the software development processes to CMMI level 3. Your organization has started developing software applications and database systems for their customers. The CIO wants to ensure that the software development and database development processes are being properly managed and audited, and he wants to ensure that the organization begins taking the necessary steps to progress to CMMI level 3. In preparation for your response, review the CMMI information available at the Carnegie Mellon Website.

IT managers will commonly manage software development and systems integration activities. Write a 3 page paper in which you:

Describe the software engineering process, the challenges in managing software development activities, and the potential interface issues from the software development perspective.
Analyze the CMMI levels and define a roadmap that the organization will ned to follow in order to get their software development processes to CMMI level three. Note: This is important because the CMMI level that an organization achieves impacts their software development reputation.
Explain the auditing tasks that must be performed in order to achieve level 3.
Determine the continuous assurance auditing activities that the organization will need to implement to help achieve CMMI level three.
Analyze the ITIL service management guidelines and principles.
Examine how ITIL service management practices relate to CMMI levels and continuous service auditing.
Use at least four (4) quality resources in this assignment.

Note: Wikipedia and similar Websites do not qualify as quality resources.

For more Assignments visit  http://www.assignmentclick.com

CIS 558 Week 6 Discussion Audit Project Control latest

To Buy This material Click below link

http://www.assignmentclick.com/cis-558-strayer/cis-558-week-6-discussion-audit-project-control-latest

CIS 558 Week 6 Discussion Audit Project Control latest

“Audit Project Control”  Please respond to the following:

Compare and contrast an IT Audit project with other projects which might be found in an IT department. Describe two (2) challenges that are unique to IT Audit projects. Suggest an approach to mitigate each challenge you selected.

Based on the challenges identified, describe the controls that the project manager would need to implement in order to overcome potential project control issues.

For more Assignments visit  http://www.assignmentclick.com

CIS 558 Week 7 Case Study 2 HIPAA and IT Audits (2 Papers) latest

To Buy This material Click below link

http://www.assignmentclick.com/cis-558-strayer/cis-558-week-7-case-study-2-hipaa-and-it-audits-latest

CIS 558 Week 7 Case Study 2 HIPAA and IT Audits (2 Papers) latest

This Tutorial contains 2 Papers

Case Study 2: HIPAA and IT Audits

Due Week 7 and worth 75 points

Imagine you are a CIO at a medium-sized hospital, and you have been asked by the CEO to provide a case analysis report that will be provided to the senior leadership in the organization. They are concerned about the HIPAA Security and Privacy Rules and its impact on the organization. Unfamiliar with the details of HIPAA, you begin looking at the information provided by the Department of Health and Human Services. Specifically, you are asked to provide an analysis on the summary of the cases.

Section 1. Written Paper

Many organizations have been fined significant amounts for non-compliance with HIPAA. To help ensure that your organization remains in compliance with HIPAA regulations you have been asked to write a three (3) page paper in which you:

1a. Create an overview of the HIPAA Security Rule and Privacy Rule. Include an explanation of the resolution process when a case is reported.
1b. Analyze the major types of incidents and breaches that occur based on the cases reported.
1c. Analyze the technical controls and the non-technical controls that are needed to mitigate the identified risks and vulnerabilities.
1d. Analyze and describe the network architecture that is needed within an organization, including a medium-sized hospital, in order to be compliant with HIPAA regulations.
1e. Analyze how a medium-sized hospital is similar to and different from other non-medical organizations in regards to HIPAA compliance.
1f. List the IT audit steps that need to be included in the organization’s overall IT audit plan to ensure compliance with HIPAA rules and regulations.
1g. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Section 2. Network Architecture

2a. Create a network architecture diagram (using Visio or an open-source equivalent to Visio for creating diagrams), based on the description of the network architecture that you defined above for the organization to be compliant with HIPAA regulations.
2b. Include in the diagram the switches, routers, firewalls, IDS/IPS, and any other devices needed for a compliant network architecture.

For more Assignments visit  http://www.assignmentclick.com