security_proposal (1).docx Security Proposal Student™s Name Institution Affiliation City/State Date Security Proposal A security audit is essential as it helps in the identification of the possible security risk
...
security_proposal (1).docx Security Proposal Student™s Name Institution Affiliation City/State Date Security Proposal A security audit is essential as it helps in the identification of the possible security risks so that changes can be made to protect the company (Kanatov, Atymtayeva & Yagaliyeva, 2014). Companies need to run security audits after an agreed period. It is needed in an organization for the prevention of data loss and shutting down of operations. There are specific problems that cannot be afforded by any organization as damage may be caused. For Dayton Soft Products, a security audit can be outsourced for useful flowing of data and activities in the organization. The security audit team can lay the groundwork for enforcements or improvements needed in the security area. The focus of this paper is on an information security audit which involves the incorporation of the data, procedures, software, and hardware components. In conducting this security audit at Dayton Soft Products, it is essential that the respective professionals consider the following recommendations. First, the company should define the type of audit to be conducted. There are two types of security audits: the internal and external audit (Kanatov, Atymtayeva & Yagaliyeva, 2014). For an internal audit, Dayton should establish a baseline from where the improvement for future audits can be measured. This type of audit ideal for the company as the external audit is expensive in its application. Second, the company . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . .
[Show More]