CIS 558 RANK Learn Do Live /cis558rank.com CIS 558 RANK Learn Do Live /cis558rank.com | Page 5
3. Suggest key controls that organizations could implement to
mitigate these risks and vulnerabilities.
4. Develop a list of IT audit tasks that address a cloud computing
environment based on the results from the analysis of the case
studies, the risks and vulnerabilities, and the mitigation controls.
5. Use at least three (3) quality resources in this assignment. Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12),
with one-inch margins on all sides; citations and references must
follow APA or school-specific format. Check with your professor for
any additional instructions.
• Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the date.
The cover page and the reference page are not included in the
required assignment page length.
The specific course learning outcomes associated with this
assignment are:
• Describe the process of performing effective information
technology audits and general controls.
• Describe the various general controls and audit approaches for
software and architecture to include operating systems,
telecommunication networks, cloud computing, service-oriented
architecture and virtualization.