CIS 558 All Assignments CIS 558 All Assignments | Page 8
2. Examine the risks and vulnerabilities associated with public clouds, private clouds, and
hybrids. Include primary examples applicable from the case studies you previously reviewed.
3. Suggest key controls that organizations could implement to mitigate these risks and
vulnerabilities.
4. Develop a list of IT audit tasks that address a cloud computing environment based on the
results from the analysis of the case studies, the risks and vulnerabilities, and the mitigation
controls.
5. Use at least three (3) quality resources in this assignment . Note: Wikipedia and similar
Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the
professor’s name, the course title, and the date. The cover page and the reference page are not
included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Describe the process of performing effective information technology audits and general
controls.
• Describe the various general controls and audit approaches for software and architecture to
include operating systems, telecommunication networks, cloud computing, service-oriented
architecture and virtualization.
• Use technology and information resources to research issues in information technology audit
and control.
• Write clearly and concisely about topics related to information technology audit and control
using proper writing mechanics and technical style conventions