HW03_PoliciesAndAuditing
.doc
keyboard_arrow_up
School
Utah Valley University *
*We aren’t endorsed by this school
Course
4700
Subject
Information Systems
Date
Dec 6, 2023
Type
doc
Pages
4
Uploaded by BaronFlamingoPerson398
IT 4700 – Enterprise Cybersecurity Management
Utah Valley University
Fall 2023 semester
Homework #3: Policies and Auditing
Student Name
Post the completed assignment in Canvas by the due date.
The following formats are acceptable:
PDF, HTML, MS Word.
Handwritten work is not acceptable.
Other file formats are not
acceptable.
Start with the cybersecurity goals known as “the CIA triad.”
Confidentiality, Integrity, and
Availability.
Add any other goals that you think should be considered in your enterprise.
PART A)
For each of your cybersecurity goals, list at least two policy statements that will help you meet
the goal.
Remember that a policy describes
what
should happen and not
how
it should happen.
In grading this part, I will be looking specifically at whether you are writing policy
or
procedure
.
Cybersecurity Goal
Policy Statements
Confidentiality
Passwords will be kept secret
Each Device will have a unique password
Integrity
No attempting to access information not accessible
No modifying of information not allowed
Availability
All passwords will be accessible to the proper people when/if needed
All services will be accessible to the proper people
…
…
PART B)
In PART A you created cyber security policies for your home (or other) enterprise.
Now you will
perform an audit to determine if you are
in compliance
with the policies that you created in the
previous assignment.
Because this is an internal audit it will be less formal than audits that were
described in the lecture.
You are free to modify the formatting if you have another style that is
better for you.
Audit Report
Write an audit report.
Keep it simple.
For each policy statement from PART A (there were at
least six) you should list which controls have been (or should be) put into place.
Test each
control.
Describe the test that you performed and the results of the test.
For each control list any
recommendations for improvement.
At the end of the audit include a short summary with:
1.
One paragraph describing what is working well.
2.
A second paragraph describing what is not working well.
3.
A third paragraph describing what needs to be done to improve compliance with the
policies.
Your grade for the assignment depends on how well your audit report is (complete, easy to
read, useful), not on “passing” results of the audit report.
Below is an example audit for one
policy statement.
Remember to include the three summary paragraphs
described above.
EXAMPLE audit for one policy/control
Policy Statement
(from PART A)
Control
Test Description
Test Result
Recommendation
Each account on a
computing device
will be protected
with a nontrivial
and non-default
password.
Password
protection
of
accounts.
Each account on a
computer, router,
tablet, or phone that
accesses the network
was checked to verify
that it is password
protected, that the
password is not a
default password, and
that the password is
not trivial (i.e.
“password”).
The router was
found to have a
default password.
All other
accounts passed.
A new procedure
should be created
to require this test
to be performed
on any equipment
as it is added to
the network.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help