Security Proposal.docx Security Proposal CMGT/433 Security Proposal A security audit is essential as it helps in the identification of the possible security risks so that changes can be made to protect the compan
...
Security Proposal.docx Security Proposal CMGT/433 Security Proposal A security audit is essential as it helps in the identification of the possible security risks so that changes can be made to protect the company (Kanatov, Atymtayeva, & Yagaliyeva, 2014).Companies need to run security audits after an agreed period. It is needed in an organization for the prevention of data loss and shutting down of operations. There are specific problems that cannot be afforded by any organization as damage may be caused. For Maverick Transportation, a security audit can be outsourced for useful flowing of data and activities in the organization. The security audit team can lay the groundwork for enforcements or improvements needed in the security area. The focus of this paper is on an information security audit which involves the incorporation of the data, procedures, software, and hardware components. In conducting this security audit at Maverick Transportation, it is essential that the respective professionals consider the following recommendations. First, the company should define the type of audit to be conducted. There are two types of security audits: the internal and external audit(Kanatov, Atymtayeva, & Yagaliyeva, 2014). For an internal audit, Maverick Transportation should establish a baseline from where the improvement for future audits can be measured. This type of audit ideal for the company as the external audit is expensive in its application. Second, the company should consider assessin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . .
[Show More]