CIS 558 Course Great Wisdom / tutorialrank.com CIS 558 Course Great Wisdom / tutorialrank.com | Page 5
2 . Examine the risks and vulnerabilities associated with public clouds , private clouds , and hybrids . Include primary examples applicable from the case studies you previously reviewed . 3 . Suggest key controls that organizations could implement to mitigate these risks and vulnerabilities . 4 . Develop a list of IT audit tasks that address a cloud computing environment based on the results from the analysis of the case studies , the risks and vulnerabilities , and the mitigation controls . 5 . Use at least three ( 3 ) quality resources in this assignment . Note : Wikipedia and similar Websites do not qualify as quality resources . Your assignment must follow these formatting requirements :
• Be typed , double spaced , using Times New Roman font ( size 12 ), with one-inch margins on all sides ; citations and references must follow APA or school-specific format . Check with your professor for any additional instructions .
• Include a cover page containing the title of the assignment , the student ’ s name , the professor ’ s name , the course title , and the date . The cover page and the reference page are not included in the required assignment page length . The specific course learning outcomes associated with this assignment are :
• Describe the process of performing effective information technology audits and general controls .
• Describe the various general controls and audit approaches for software and architecture to include operating systems , telecommunication networks , cloud computing , serviceoriented architecture and virtualization .
• Use technology and information resources to research issues in information technology audit and control .
2 . Examine the risks and vulnerabilities associated with public clouds , private clouds , and hybrids . Include primary examples applicable from the case studies you previously reviewed . 3 . Suggest key controls that organizations could implement to mitigate these risks and vulnerabilities . 4 . Develop a list of IT audit tasks that address a cloud computing environment based on the results from the analysis of the case studies , the risks and vulnerabilities , and the mitigation controls . 5 . Use at least three ( 3 ) quality resources in this assignment . Note : Wikipedia and similar Websites do not qualify as quality resources . Your assignment must follow these formatting requirements :
• Be typed , double spaced , using Times New Roman font ( size 12 ), with one-inch margins on all sides ; citations and references must follow APA or school-specific format . Check with your professor for any additional instructions .
• Include a cover page containing the title of the assignment , the student ’ s name , the professor ’ s name , the course title , and the date . The cover page and the reference page are not included in the required assignment page length . The specific course learning outcomes associated with this assignment are :
• Describe the process of performing effective information technology audits and general controls .
• Describe the various general controls and audit approaches for software and architecture to include operating systems , telecommunication networks , cloud computing , serviceoriented architecture and virtualization .
• Use technology and information resources to research issues in information technology audit and control .