10 May 2022

102

Briefing Statement for IT Security Audit Plan

Format: APA

Academic level: College

Paper type: Coursework

Words: 297

Pages: 1

Downloads: 0

The security audit is defined as an assessment of executing effective security system of an organization. In other words, the security audit assumes that every organization has its security policy at hand, but this is not always the case (Cooke, et al. 2012). However, it’s difficult finding a written security policy in most informal or unwritten security policies. The IT Department uses Security policies as a way of practicing security standardization through the written form in which it has to be agreed upon by the employees by reading and signing it.

The city auditor who is a legal officer is chosen by the council of the city. The city auditor is supposed to report to the council through the policy committee executive the public depend on them (Peltier, 2016). The examination’s operation is conducted by the city auditor in the city and is assisted by its body of affiliation to help in the governance role of the council.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The primary objective of implementing the security information is to come up with a framework of security policy. In this case, the goal of corporate security policies is mainly base on defining the guidelines, procedures and practicing configuration as well as safety management in the environment. The audit department and the IT and its directives play this role for easy accessibility (Hausman, 2012). The audit objectives conducted by the Department of Winnipeg’s City include: to assess the management awareness and staff regarding .security IT policy of the City of Winnipeg's. It also looked on the understanding of management assessment and employees and identifying the opportunities for fundamental improvement of the IT security policy.

In other words, in today’s environmental business, protecting and securing assets information is vital. Therefore IT system is crucial in securing and connecting the organizations involved in business.

References

Hausman, J. A. (Ed.). (2012).  Contingent valuation: A critical assessment (Vol. 220). Elsevier.

Hu, Q., Dinev, T., Hart, P., & Cooke, D. (2012). Managing employee compliance with information security policies: The critical role of top management and organizational culture.  Decision Sciences 43 (4), 615-660.

Peltier, T. R. (2016).  Information Security Policies, Procedures, and Standards: guidelines for effective information security management . CRC Press.

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Briefing Statement for IT Security Audit Plan.
https://studybounty.com/briefing-statement-for-it-security-audit-plan-coursework

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Technology

Implementation Roadmap

AT&T is a telecommunication company that has a platform for selling phones and provision of internet and other services. Implementation of big data analytics in the company requires the completion of a particular...

Words: 545

Pages: 2

Views: 69

17 Sep 2023
Technology

Big Data in Fraud Detection: How It is Used and What to Expect

Chameleon Carriers The replication of trucking companies and trucks under different business names has grown rampant, as the Federal Motor Carrier Safety Administration (FMCSA) program reports. A large...

Words: 508

Pages: 2

Views: 436

17 Sep 2023
Technology

The 5G Networks: How They Work, and What They Mean for the Future

The world of technology is rapidly developing with the reliance of the internet at its core. 4G has been the primary platform of the internet but based on the slow speed, and the high dependence of technology has led...

Words: 284

Pages: 1

Views: 111

17 Sep 2023
Technology

How to Write a Successful Business Case

A successful business case is based on a need. One of the most disturbing problems in the health sector is cybercrime. We intend to develop a strategy that will leverage IT-based techniques and measures to reduce...

Words: 263

Pages: 1

Views: 63

17 Sep 2023
Technology

The 5nm Transistor: The Future of Computing

The November 16th, 1904 invention of the vacuum tube was the humble beginning of the modern-day transistor. The first working transistors were developed at Bell Labs by William Shockley, John Bardeen, and Walter...

Words: 2221

Pages: 4

Views: 55

17 Sep 2023
Technology

Wireless Communication Technologies

Wireless communication taken analogically simply refers to the channel of telephony communication that does not apply the use of wires (Bose, 2010) . Such a channel makes use of electromagnetic waves available in the...

Words: 1046

Pages: 4

Views: 159

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration