1)DISCUSSION BOARD (200 WORDS WITH IN-TEXT CITATION ) KINDLY SMALL IN SIMILARITYAt the end of each unit, DB participation is assessed based on level of engagement and the quality of the contribution...

1 answer below »



1)DISCUSSION BOARD (200 WORDS WITH IN-TEXT CITATION ) KINDLY SMALL IN SIMILARITY




At the end of each unit, DB participation is assessed based on level of engagement and the quality of the contribution to the discussion. DBs allow learners to learn through sharing ideas and experiences as they relate to course content. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB are accepted after the end of the unit. Learners must demonstrate an appropriate depth of understanding of course content to receive credit for having submitted substantive posts. Typically, this is achieved with 3–4 strong paragraphs for Main Posts and 2–3 strong paragraphs for Response Posts.




As you begin to perform the information systems audit for PVSS, assume the identity of a different person in the scenario. For this Discussion Board, you are now the Network Systems Manager for PVSS.




As the Network Systems Manager, how would you create the followingfour controls (or policies) to be used by PVSS:







  • Entity level control



  • Network level control



  • Operating system level control



  • Web or database server level control






Keep in mind that each control should focus on a specific topic and offer the following structure:










  • The Policy Statement:This is a statement definingthe specific action or regulation.






  • Responsibilities:Who is responsible for various actions?






  • Enforcement:How the policy will be validated?






  • Violations:What are the consequences for violation?















2) Individual Project (800 WORDS IN-TEXT CITATION) KINDLY SMALL IN SIMILARITY














In the Individual Project from unit 2, you were tasked to identify four vulnerabilities for various network assets. For this assignment, describe the following in 5 pages:











  • Cover page (does not count towards the page length requirement)








  • List and discuss the vulnerabilities and assets.








  • Rank the top six most vulnerable assets. Justify your rankings.








  • Given an existing scenario where there is an Information System audit:











    • Describe how the team would approach an audit of the six assets against the controls from Part 1.








    • Describe the types of tests that would be performed and any anticipated findings that could arise based on the climate described to this point for PVSS.








Answered 1 days AfterMar 07, 2023

Answer To: 1)DISCUSSION BOARD (200 WORDS WITH IN-TEXT CITATION ) KINDLY SMALL IN SIMILARITYAt the end of each...

Ayan answered on Mar 09 2023
31 Votes
WRITTEN ASSIGNMENT        2
WRITTEN ASSIGNMENT
Table of contents
Discussion board    3
Individual Project    5
Introduction    5
Vulnerabilities and assets    5
Ranking of the top six most vulnerable assets    5
Approach to the audit    6
Anticipated findings    6
Conclusion    8
References    9
Discussion board
    As
the Network Systems Manager for PVSS, I would create the following four controls (or policies) to be used by PVSS:
Entity level control –
· The Policy Statement: PVSS shall implement an entity-level control to safeguard sensitive data against unauthorized access, disclosure, or modification.
· Responsibilities: The Information Security Manager (ISM) is responsible for defining and implementing entity-level controls (Ghosh & Iyer, 2019). All employees are responsible for complying with the policy.
· Enforcement: The policy will be validated through periodic compliance audits and vulnerability assessments.
· Violations: Any violation of the policy will be dealt with according to the company's disciplinary policies and may result in termination of employment and/or legal action.
Network level control –
· The Policy Statement: PVSS shall implement network-level controls to prevent unauthorized access to the company network.
· Responsibilities: The Network Systems Manager is responsible for defining and implementing network-level controls. All employees are responsible for complying with the policy.
· Enforcement: The policy will be validated through periodic compliance audits and vulnerability assessments.
· Violations: Any violation of the policy will be dealt with according to the company's disciplinary policies and may result in termination of employment and/or legal action.
Operating system level control –
· The Policy Statement: PVSS shall implement operating system level controls to ensure the confidentiality, integrity, and availability of information stored on company servers.
· Responsibilities: The IT Manager is responsible for defining and implementing operating system level controls (Kizza, 2019). All employees are responsible for complying with the policy.
· Enforcement: The policy will be validated through periodic compliance audits and vulnerability assessments.
· Violations: Any violation of the policy will be dealt with according to the company's disciplinary policies and may result in termination of employment and/or legal action.
Web or database server level control –
· The Policy Statement: PVSS shall implement web or database server level controls to protect web and database servers from unauthorized access or modification.
· Responsibilities: The Web Administrator is responsible for defining and implementing web or database server level controls (Singh & Kaur, 2020). All employees are responsible for complying with the policy.
· Enforcement: The policy will be validated through periodic compliance audits and vulnerability assessments.
· Violations: Any violation of the policy will be dealt with...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here