In a Word document, show how you would use that(Audit Process.jpg ) process wit

ZNUxvz
timer Asked: Jan 11th, 2015

Question Description

In a Word document, show how you would use that(Audit Process.jpg ) process with the attached case study. This is your plan for conducting the audit for Dalton,Walton, & Carlton, Inc.You should write it as if they are your customer and will receive this document. Include a flowchart showing your steps and a full explanation of how each step would be used in the case study to develop an audit plan, audit steps, audit report, and a mitigation plan.


Case study(1) (1).docx 



Unformatted Attachment Preview

Case Study – Architecture Firm. Dalton, Walton, & Carlton, Inc. is an architecture firm with approximately 250 employees in four cities in a regional area. The main office is in Kansas City, Mo, which houses 100 of the employees. The main office is located in a suburb neighborhood where physical security is not considered a concern. You are an independent auditor brought in by Dalton, Walton, & Carlton’s management. They’ve tasked you with conducting an audit of their entire IT infrastructure & organization. Their IT infrastructure is as follows: o o o o They primarily use Microsoft servers and PCs with a number of Mac computers used to perform design work. They use Active Directory, have a Web Server for their Internet web site, four servers used as file shares (one in each office), four servers housing their architecture applications, a training server, five MS SQL database servers, and two Microsoft Exchange servers for email. o There are 20 Windows 2008 R2 servers in the main office, twelve of which are virtualized on three physical servers. o System updates and patches are run from the main office. Most systems get Microsoft updates once a month, but some are missed. Also, most third party products (e.g., Adobe PDF & Flash) are not kept up to date. o Each satellite office has 3-4 servers for storing files and running local applications. o Each office has its own, decentralized wireless network connected to the production network. o Each employee has a desktop or laptop PC running Windows 7. HR personnel have laptops for conducting interviews. They outsource their email spam filter and all HR applications to two separate third party companies. The network sits behind a gateway router and firewall. Antivirus is in use, but is not automatically updated across the company. Employees often work remotely and only use their login and password to gain access to the corporate systems. There is a Director of IT who has a full time staff of 5 employees, one of which does security duties part time. There are a few known issues with their IT infrastructure and organization: o o o o o Recently, a number of PCs and office equipment has been stolen out of the office. It’s at the data owner’s discretion as to whether or not to secure their data files or folders. Many do not secure their files, while some lock them so only they have access. There have been rumors that customer data and intellectual property have been lost. Two employees recently left your company and went to your biggest competitor, where they just landed a contract with your largest account. Vendors are allowed access to the site and computers without authorization or supervision. Onsite staff at each location provides IT support part time along with their other responsibilities. Password resets are done by giving out a generic password — Chiefs2011. See the weekly assignment’s page for specific information on this assignment. Case Study – Architecture Firm. Dalton, Walton, & Carlton, Inc. is an architecture firm with approximately 250 employees in four cities in a regional area. The main office is in Kansas City, Mo, which houses 100 of the employees. The main office is located in a suburb neighborhood where physical security is not considered a concern. You are an independent auditor brought in by Dalton, Walton, & Carlton’s management. They’ve tasked you with conducting an audit of their entire IT infrastructure & organization. Their IT infrastructure is as follows: o o o o They primarily use Microsoft servers and PCs with a number of Mac computers used to perform design work. They use Active Directory, have a Web Server for their Internet web site, four servers used as file shares (one in each office), four servers housing their architecture applications, a training server, five MS SQL database servers, and two Microsoft Exchange servers for email. o There are 20 Windows 2008 R2 servers in the main office, twelve of which are virtualized on three physical servers. o System updates and patches are run from the main office. Most systems get Microsoft updates once a month, but some are missed. Also, most third party products (e.g., Adobe PDF & Flash) are not kept up to date. o Each satellite office has 3-4 servers for storing files and running local applications. o Each office has its own, decentralized wireless network connected to the production network. o Each employee has a desktop or laptop PC running Windows 7. HR personnel have laptops for conducting interviews. They outsource their email spam filter and all HR applications to two separate third party companies. The network sits behind a gateway router and firewall. Antivirus is in use, but is not automatically updated across the company. Employees often work remotely and only use their login and password to gain access to the corporate systems. There is a Director of IT who has a full time staff of 5 employees, one of which does security duties part time. There are a few known issues with their IT infrastructure and organization: o o o o o Recently, a number of PCs and office equipment has been stolen out of the office. It’s at the data owner’s discretion as to whether or not to secure their data files or folders. Many do not secure their files, while some lock them so only they have access. There have been rumors that customer data and intellectual property have been lost. Two employees recently left your company and went to your biggest competitor, where they just landed a contract with your largest account. Vendors are allowed access to the site and computers without authorization or supervision. Onsite staff at each location provides IT support part time along with their other responsibilities. Password resets are done by giving out a generic password — Chiefs2011. See the weekly assignment’s page for specific information on this assignment.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

This question has not been answered.

Create a free account to get help with this and any other question!

Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors