·
Describe the parameters required to conduct and report on IT
infrastructure audit for organizational compliance.
·
Use technology and information resources to research issues
in security strategy and policy formation.
·
Write clearly and concisely about topics related to information
technology audit and control using proper writing mechanics and
technical style conventions.
===============================================
CIS 349 Week 5 Discussion
FOR MORE CLASSES VISIT
www.cis349rank.com
"Monitoring the User Domain" Please respond to the following:
It is common knowledge that employees are a necessary part of any
business. Identify three (3) best practices in the user domain and
suggest the control type(s) (technical or manual) that are best suited
to monitor each best practice
Describe how the implementation process for such controls might
vary based on the business type. Determine the impact that other
factors such as physical security, device type, and connectivity
(wireless or wired) might have on the choices that are made.
===============================================
CIS 349 Week 6 Assignment 3 Evaluating Access Control
Methods (2 Papers)