CIS 558 All Assignments CIS 558 All Assignments | Page 8

2. Examine the risks and vulnerabilities associated with public clouds, private clouds, and hybrids. Include primary examples applicable from the case studies you previously reviewed. 3. Suggest key controls that organizations could implement to mitigate these risks and vulnerabilities. 4. Develop a list of IT audit tasks that address a cloud computing environment based on the results from the analysis of the case studies, the risks and vulnerabilities, and the mitigation controls. 5. Use at least three (3) quality resources in this assignment . Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: • Describe the process of performing effective information technology audits and general controls. • Describe the various general controls and audit approaches for software and architecture to include operating systems, telecommunication networks, cloud computing, service-oriented architecture and virtualization. • Use technology and information resources to research issues in information technology audit and control. • Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions