Aizoon's 5-Day It Audit Case

Improved Essays
Midstate’s Network Administrator and I attended a Cybersecurity Training session in Winslow a few weeks ago. Our understanding of these requirements is limited since this is the company’s first exposure to NIST 800-171, and, customers are now imposing Cybersecurity requirements -- a December 31, 2017 deadline is looming. Many of the requirements are now in place, however, those remaining are dependent upon a 3rd party IT Audit requirement; making your offer of a 5-day IT Audit of Midstate Machine exceedingly attractive. Do you believe that Aizoon’s 5-day IT Audit could expedite Midstate Machine’s with compliance of the 3rd party IT Audit

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    On Thursday, May 12th, at approximately 1421, I, Officer Josh Summey was contacted by Games Supervisor, Unit 551 with a request to pull one of his associates and Audit him as one of his Supervisors witnessed him counting his money and messing with his shoe. I made my way from the Monitor Room to Showplace Long Range Shot and escorted Mr. Justin Cassidy to Showplace Bank where his till was counted and found to have no variance. I then escorted Mr. Cassidy to the North Carolina Interview and performed a Compliance Verification Audit which turned up 27$ from his shoe. He informed me of this fact before beginning the Audit and told me that this was his own cash and that he always kept his money in his shoes instead of his wallet. After questioning…

    • 177 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    From physical security to device security applications our network will be protected against both internal and external threats. The above mentioned architecture will step data through a variety of security configurations which will methodically mitigate the top four possible security threats. Additional support from the ISP may also be required when confronting DOS attacks as may attempt to overload security appliances. This will be mitigated by our multiple ISP connection but we must include information about DOS attacks in our service agreement with the ISP. Our network will prove to be more secure than other WWTC branches and will most likely become the security standard across the…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Rfp Task 5

    • 1162 Words
    • 5 Pages

    • Copies of relevant configuration, network and system topology documentation. • Access to relevant internal and external systems as needed. TASK 2: BES CYBER ASSET, BES CYBER SYSTEM, SECURE ARCHITECTURE DESIGN (CYBER) & PHYSICAL SECURITY DRAWING The Supplier will develop the NERC CIP project BCA List based upon the NextEra NERC CIPFPL CIP-002-6 procedures defining the NextEra BES Assets, the proposed Electronic Security Perimeter (ESP) design, the IM Corporate Controls Network design and the OEM system designs. Developing the BCA List may include the following activities (as required): 1.…

    • 1162 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Triton Multi-INT

    • 505 Words
    • 3 Pages

    I am a little concern about the bidding or proposal against RMF effort. There is tremendous work need to be done for the RMF compliance that leading to an ATO. Without the ATO, even your system is built with the state-of-the-art technology, you are not allow to operate in the field. I do not see that importance reflect on the proposal. I am not sure whether Triton Multi-INT (or the Triton baseline) is a program of record that needs an ATO or it only needs to be RMF compliance.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Mediacom Audit Case

    • 542 Words
    • 3 Pages

    Pete Clark, Director, Business Operations has been with Mediacom since July 2009. During this time Pete’s performance has been acceptable with his last performance scores at 3.32. Throughout 2017 Pete’s performance has been less than what is expected in this role. His 2017 MMIP Mid-Year Score is 2.78.…

    • 542 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Andy Evans It Analysis

    • 792 Words
    • 4 Pages

    Speak Melinda is doing great in school, has many friends and she is happily content with her life, but why did this change over the course of summer vacation. Here’s how it all goes down, nobody wants to talk to her and no one wants to be her friend because she simply called the police at a summer party. At Merryweather High School, Melinda Sordino starts her freshman year with a bad start. She does anything she can to avoid and get away from here teachers. The one and only teacher that she doesn’t hate is her art teacher, Mr. Freeman.…

    • 792 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The American Institute of Certified Public Accountants (AICPA) is the world’s largest representation of certified public accountants (CPAs). Established in 1887, the AIPCA serves as an advocate for CPAs, CGMAs, and has a mission of powering the success of global business, CPAs, and CGMAs through the use of education, resources, and advocacy (AICPA, 2016). The AICPA supports FASB by providing technical support, standard setting, and guidelines to CPAs nationwide. Because accounting is complex in nature this governing body works in collaboration with other institutes to ensure that organizations are adhering to the accounting standards established under the General Accepted Accounting Principles (GAAP). This paper will focus primarily on the AICPAs relationship in advising the FASB, their function in setting the auditing standards for public accounting firms and their relationship with authoritative rule making boards such as The International Accounting Standards Board (IASB), The Government Accounting Standards Board, and the HFMA Principles and Practice Board.…

    • 924 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Mr Ciesielski Case Study

    • 138 Words
    • 1 Pages

    I concur with the employee's self-assessment, Mr. Ciesielski has exceeded the requirements of this critical element. Mr. Ciesielski has provided Subject Matter Expert (SME) support to Government and contractor entities for any items that dealt with Incident Management. Most significantly, he demonstrated a high standard of effective communication and professionalism while contributing to the INC process and CSI review during the IMWG meeting. He is the NETOPS representative for the review of time-specific deliverables, attending meetings and ensuring that final products met technical standards, quality and designated due dates for the project he was assigned. Most notably, he updated the RCA Hand Off SOP, and developed and finalized the…

    • 138 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Dage Michael Martinez Fraud Auditing May 1, 2016 Fraud Audit Program: Hollate Assess: Fraud: Type/Scheme Control Opportunity Occurs/Fraud Scenario Concealment Red Flags Conversion Journal Entry Scheme The scheme likely occurred due to management override of controls.…

    • 1732 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Chapter Questions- Chapter 7-28 1. Aibileen try’s to counteract the negative effects of Elizabeth’s criticism and coldness to Mae Mobley by, attempting to focus more on baby girl (Mae Mobley) and herself. This helps Aibileen cancel out the negative effects of Elizabeth’s comments and judgment by not giving her the attention, and trying to ignore what she says. 2. Aibileen raises children that are not her own and she teaches the kid the values of respect and understanding themselves and others.…

    • 903 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Internal Affairs Analysis

    • 1330 Words
    • 6 Pages

    The “Internal Affairs” Wikipedia page needed a lot of work and still needs a lot more information. It had little to no information on the subject. Even after adding new content to the page, there is still a lot of material that needs to be covered. The article is somewhat informative; it is adequate enough to give readers the gist of the topic. The content that was added this semester adequately described the police behavior of the internal affairs unit to a point.…

    • 1330 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In the light of the growing number of scams, accounting scandals, massaging of books, misuse and misappropriation of public money, the importance of Corporate Governance can’t be overstressed. Formation and proper functioning of Corporate Governance body abiding by international rules and regulations has become of quintessential importance today as survival and success in global market can be ensured only via foreign investment, foreign customers: simply in a word by going global. Image 1: Reference Bullet no. 17 Corporate Governance is the way a corporation polices itself. It intends to increase the accountability, transparency and efficiency of the management and advocates adoption of consumer and environment friendly business practices.…

    • 903 Words
    • 4 Pages
    Improved Essays