• Home
  • Blog
  • CYB 608 W3 Importance of IT Audit and Vulnerability Assessments Discussion

CYB 608 W3 Importance of IT Audit and Vulnerability Assessments Discussion

0 comments

FIRST:

Select ONE of the Options below as your primary topic. To help keep track of replies vs. original postings, your Subject line should start with: Lastname – Option [A or B] (e.g. Simpson – Option A).

Option A

    • Describe some ways you can automate IT audits and assessments.

Option B

    • Assume the professor is the owner of a small business with 20 employees in an office building located in north San Diego, with servers located in a data center hosting facility within 10 miles of the office.
    • Discuss how you would approach the business owner to conduct a vulnerability assessment and IT Audit.
    • For your discussion, think about how you would convince a non-technical executive of the need and the safety of performing a vulnerability assessment and IT Audit.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}