The security audit is defined as an assessment of executing effective security system of an organization. In other words, the security audit assumes that every organization has its security policy at hand, but this is not always the case (Cooke, et al. 2012). However, it’s difficult finding a written security policy in most informal or unwritten security policies. The IT Department uses Security policies as a way of practicing security standardization through the written form in which it has to be agreed upon by the employees by reading and signing it.
The city auditor who is a legal officer is chosen by the council of the city. The city auditor is supposed to report to the council through the policy committee executive the public depend on them (Peltier, 2016). The examination’s operation is conducted by the city auditor in the city and is assisted by its body of affiliation to help in the governance role of the council.
Delegate your assignment to our experts and they will do the rest.
The primary objective of implementing the security information is to come up with a framework of security policy. In this case, the goal of corporate security policies is mainly base on defining the guidelines, procedures and practicing configuration as well as safety management in the environment. The audit department and the IT and its directives play this role for easy accessibility (Hausman, 2012). The audit objectives conducted by the Department of Winnipeg’s City include: to assess the management awareness and staff regarding .security IT policy of the City of Winnipeg's. It also looked on the understanding of management assessment and employees and identifying the opportunities for fundamental improvement of the IT security policy.
In other words, in today’s environmental business, protecting and securing assets information is vital. Therefore IT system is crucial in securing and connecting the organizations involved in business.
References
Hausman, J. A. (Ed.). (2012). Contingent valuation: A critical assessment (Vol. 220). Elsevier.
Hu, Q., Dinev, T., Hart, P., & Cooke, D. (2012). Managing employee compliance with information security policies: The critical role of top management and organizational culture. Decision Sciences , 43 (4), 615-660.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management . CRC Press.