Information System Control and Auditing Report for LMJ-Star Services

Verified

Added on  2022/09/12

|5
|712
|21
Report
AI Summary
This report examines information system control and auditing, addressing the critical issue of cyber fraud within the context of LMJ-Star Services. It emphasizes the need for robust IT policies to mitigate risks. The report discusses key aspects of data protection, including confidentiality, integrity, and availability, alongside employee awareness regarding data handling and network usage. It explores the importance of business alignment, risk management, and stakeholder management to enhance system security. Furthermore, the report highlights the significance of access control, particularly in healthcare settings, emphasizing the need for strong security programs and compliance with regulations such as HIPAA to protect sensitive health information. The conclusion underscores the necessity of implementing and strictly adhering to these policies to safeguard the organization from external threats and improve overall system security.
Document Page
Running head: INFORMATION SYSTEM CONTROL AND AUDITING
INFORMATION SYSTEM CONTROL AND AUDITING
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1INFORMATION SYSTEM CONTROL AND AUDITING
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
Conclusion..................................................................................................................................3
Referencing................................................................................................................................4
Document Page
2INFORMATION SYSTEM CONTROL AND AUDITING
Introduction
Cyber fraud is one of the biggest problems nowadays. It can be stated that various
way should be followed to maintain these attacks, specifically in the Information Technology
infrastructure. That is why the audit of the current situation will help to provide the proper
security in the LMJ star services (Goodman, Straub and Baskerville, 2016). In this report, all
the companies IT policies should be discussed which will help to protect the company.
Discussion
First of all, several points have to be managed correctly to get the solution done with
the help of task. The professional practices are needed to specify the problem detection and
awareness in the specific area of LMJ-Star Services. Main three points are needed to be
addressed to protect the system. Data protection: Frist of all confidentiality of the data. All
of the assets and data should be protected from the unauthorised entity. Integrity should be
maintained. The asset should be modified as per the requirement, after that it should be
handled with proper manner. The availability of the data should be restricted for the
authorised user. That is how all data should be protected. Also, the employee should be aware
of their usage of the mail, external device and networks.
The business allignmnet should be changed according to the requirement. The product quality
and the innovation should be managed to make the situation better. The risk should be
managed to make the system flawaless. The employee with talent in soecific field should be
added to make the system better. On the otherhand the stakeholder managedment should be
included, to get the write amount of information. The cost optimaization should be managed
with a UPDATED TEAM. The servive process and the culture should be properly addresses.
All of these change will help to make a better system appropriately. The access control
should be strongly coupled with the paediatric department, intensive care, maternity wards
Document Page
3INFORMATION SYSTEM CONTROL AND AUDITING
task completion. The video surveillance should be properly maintained to take care of the
employee task completion. The database should be maintained to make the task done. The
health information and the personally identifiable info should be also maintained to make the
task done. The HIPAA should be properly maintained to make the system properly to
complete the procedure of the task properly (Tvaronavičienė,2018). The PHI and the PHR are
simulated with the various software with the completion of the task. There are various
procedure to maintain the health completion which is needed to be completed properly. Also,
the security program should be maintained with the business executives and the IT managers.
Conclusion
It can be concluded the cyber-attack will hamper hugely in LMJ-Star Services
organization. That is why policies should be followed to protect the organization from the
external attacks. The company should maintain strictly this policy which will manage the
situation appropriately. That is how the policies should be maintained to make the LMJ star
services better.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4INFORMATION SYSTEM CONTROL AND AUDITING
Referencing
Dean, B., & McDermott, R. (2017). A research agenda to improve decision making in cyber
security policy. Penn St. JL & Int'l Aff., 5, 29.
Goodman, S., Straub, D. W., & Baskerville, R. (2016). Information security: policy,
processes, and practices. Routledge.
May, P. J., Koski, C., & Stramp, N. (2016). Issue expertise in policymaking. Journal of
Public Policy, 36(2), 195-218.
Tvaronavičienė, M. (2018). TOWARDS EFFICIENT POLICY MAKING: FORECASTS OF
VULNERABILITY TO EXTERNAL GLOBAL THREATS. Journal of Security &
Sustainability Issues, 7(3).
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]