Access over 20 million homework & study documents

Security Proposal

Content type
User Generated
Subject
Programming
School
University of Pheonix
Type
Homework
Rating
Showing Page:
1/6
Running Head: SECURITY PROPOSAL 1
Security Proposal
Student Name:
Course Name:
Professor Name:
Date:

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/6
SECURITY PROPOSAL 2
Security Proposal
Security audit can be defined as a systemic evaluation of the company’s security information
system, conducted by measuring its wellness in conforming to the establishment of particular set
criteria. Security audit thoroughly assesses the physical configuration of the security system, its
environment, the software, and the information handling process among other practices.
Dayton Soft Products needs to conduct such an audit to safeguard its information system from
being exposed to security threats which possess a great risk to its services (Patterson, 2017). An
IT audit for Dayton Soft Products is good for defending its systems against cyber-crimes and
other security associated problems that might be open for exploitation in the company’s IT
infrastructure. Reasons, why Dayton Soft Products needs a security audit, is as follows:
A security audit evaluates the flow of data within the company’s business. As much
as data is concerned, security control is paramount, Dayton Soft Products needs to be
aware of how data flows in then out of the company and who has access to it.
Security auditing identifies vulnerability points and problem areas. As an IT
organization, Dayton Soft Products has several components, for example, the hardware,
data, software, and procedures. By conducting auditing on all these components, it’s
probably possible to pinpoint a problem, tests can be carried out based on experience
where security incidences were identified and hence providing a way of ensuring proper
configuration of the IT infrastructure (Walsh, 2018).
Security auditing helps an IT firm determine whether it must alter its security
policies or not. After pre-audit; where relevant information is obtained, auditors analyze
and test the entire system. Throughout the process, the auditors document everything they
have so far discovered regarding the safety and effectiveness of Dayton’s IT system. The

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/6

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 6 pages?
Access Now
Unformatted Attachment Preview
Running Head: SECURITY PROPOSAL 1 Security Proposal Student Name: Course Name: Professor Name: Date: SECURITY PROPOSAL 2 Security Proposal Security audit can be defined as a systemic evaluation of the company’s security information system, conducted by measuring its wellness in conforming to the establishment of particular set criteria. Security audit thoroughly assesses the physical configuration of the security system, its environment, the software, and the information handling process among other practices. Dayton Soft Products needs to conduct such an audit to safeguard its information system from being exposed to security threats which possess a great risk to its services (Patterson, 2017). An IT audit for Dayton Soft Products is good for defending its systems against cyber-crimes and other security associated problems that might be open for exploitation in the company’s IT infrastructure. Reasons, why Dayton Soft Products needs a security audit, is as follows: • A security audit evaluates the flow of data within the company’s business. As much as data is concerned, security control is paramount, Dayton Soft Products needs to be aware of how data flows in then out of the company and who has access to it. • Security auditing identifies vulnerability points and problem areas. As an IT organization, Dayton Soft Products has several components, for example, the hardware, data, software, and procedures. By conducting auditing on all these components, it’s ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Very useful material for studying!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4