Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

YOUR TASK (worth 10% of the overall mark for this course offering): Conduct an IT audit of your own personal computer system to determine how

image text in transcribed
YOUR TASK (worth 10% of the overall mark for this course offering): Conduct an IT audit of your own personal computer system to determine how secure this system is against "hack attacks" from some third party. Your audit report should specify the computer system's current configuration in terms of: - [a] If the computer is up to date with the most recent operating system's service packs and software patches. [b] If the antivirus software installed on the computer has been updated with the latest virus signatures and if this anti-virus software has been scheduled to run regular scans to detect known viruses and any software applications which appear to be making unauthorized changes to the system. [c] If there is a password protocol in effect for every user account whereby all users of the computer are obliged to change their passwords at regular intervals and that these passwords should contain a variety of alpha-numeric characters. NOTE: Your audit report should describe the computer system as it is and - if appropriate - make recommendations for enforcing protocols to reduce the likelihood of the computer system being compromised. YOUR TASK (worth 10% of the overall mark for this course offering): Conduct an IT audit of your own personal computer system to determine how secure this system is against "hack attacks" from some third party. Your audit report should specify the computer system's current configuration in terms of: - [a] If the computer is up to date with the most recent operating system's service packs and software patches. [b] If the antivirus software installed on the computer has been updated with the latest virus signatures and if this anti-virus software has been scheduled to run regular scans to detect known viruses and any software applications which appear to be making unauthorized changes to the system. [c] If there is a password protocol in effect for every user account whereby all users of the computer are obliged to change their passwords at regular intervals and that these passwords should contain a variety of alpha-numeric characters. NOTE: Your audit report should describe the computer system as it is and - if appropriate - make recommendations for enforcing protocols to reduce the likelihood of the computer system being compromised

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Software Quality Assurance Internal Audit And IT Audit Integrated Testing Security And Audit

Authors: Abu Sayed Mahfuz

1st Edition

0367567970, 978-0367567972

More Books

Students also viewed these Accounting questions

Question

Establish identity. cos( + ) = -cos

Answered: 1 week ago

Question

solve and show your solution and explanation

Answered: 1 week ago

Question

f. Did they change their names? For what reasons?

Answered: 1 week ago