logo

Cybersecurity | Information System Control and Auditing

   

Added on  2022-09-12

7 Pages1217 Words15 Views
Running head: INFORMATION SYSTEM CONTROL & AUDITING
INFORMATION SYSTEM CONTROL & AUDITING
Name of the Student
Name of the University
Author Note

1 INFORMATION SYSTEM CONTROL & AUDITING
Table of Contents
Introduction................................................................................................................................2
Description.................................................................................................................................2
Conclusion..................................................................................................................................4
Referencing................................................................................................................................5

2 INFORMATION SYSTEM CONTROL & AUDITING
Introduction
Cybersecurity is a huge issue that has to be maintained properly to get the solution for
making the health care system more secured. That is why it can be stated that various task
completion should be maintained to get the system secured. There are several process that
should be followed to make the framework properly acceptable for the organization. In the
following report the robustness, integrity, availability, and the framework modification
procedure will be properly addressed to make the audit for the organization(Pan and
Seow,2016).
Description
There are several small points that needed to be considered to make the system more
flawless and proper to make the situation better. There are malware and threat can
attack the system for the sensitive data that is why these steps should be modified.
First of all, the cybersecurity training and the education of the employee is needed for
the employee maturity to save the system. Another aspect is, those mobile containing
the various documents should be properly protected (Rikhardsson and Dull, 2016).
The newly recruited employee should properly be trained, they will help to protect the
system with the device maintenance procedure. The used computer should be
firewall-protected, it will prevent various attacks from the unauthorised system. The
legal and repute antivirus should be installed in the systems to protect the system
properly. The proper updating of the anti-virus should help to prevent the system from
the new released viruses. Also the strong password is needed to complete the
procedure of the security; for this reason symbol, numeric and alphabet key mixture
will be needed to hack the system properly (Knechel and Salterio,2016). The network

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information System Control and Auditing | Report
|5
|712
|21

Information and Systems Security
|7
|1270
|80

Information System Control and Auditing | Policies
|4
|557
|15

Cybersecurity Training
|4
|790
|406

Use of Microsoft Hyper-V
|5
|929
|171

HI6008 - Business Research on Cyber Security
|19
|3876
|330