Information System Control and Auditing Report - LMJ Star Services

Verified

Added on  2022/09/12

|9
|1574
|16
Report
AI Summary
This report examines information system control and auditing, specifically addressing the needs of LMJ Star Services (LSS). It delves into critical aspects of access control, including generic identities, privileged accounts, and data security levels. The report emphasizes the importance of access control authorization through strong passwords and employee awareness. It also discusses access confidentiality via network segregation and secure logins. Furthermore, the report highlights the role of security specialists, modification policies, and various control processes such as rule-based, mandatory, role-based, and discretionary access controls. The conclusion underscores the significance of cyber security in protecting sensitive data and recommends implementing robust policies and employee training to secure the system effectively. The report also includes detailed references to support its findings.
Document Page
Running head: INFORMATION SYSTEM CONTROL AND AUDITING
INFORMATION SYSTEM CONTROL AND AUDITING
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1INFORMATION SYSTEM CONTROL AND AUDITING
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
Conclusion..................................................................................................................................4
Referencing................................................................................................................................5
Document Page
2INFORMATION SYSTEM CONTROL AND AUDITING
Introduction
The system administrator with the top governmental agencies and organizational field
will be given access for the information handling. The physical access and the limit access of
the data should be managed to stop the various attacks. The system should be protected to
maintain the several attacks to manage the situation appropriately. The main acess control
policies will help to maintain access control standards, network access control, user access,
operating system control, higher risk system access, passwords, control remote user access to
maintain the system appropriately. The main activity of securing the system from the
unauthorized physical attacks. So the computer network of the LMJ star services is needed to
be protected appropriately (Carr.,2016).The policies should be maintained by LMJ star
services, which will help to protect the used systems.
Discussion
There are several points that have to be maintained adequately to get the task done for
the policy maintain. Those are:
Generic identities: The generic ID should be created to manage the access of the data,
which is needed to manage internet service provider. The generic identities are needed
to access the confidential data with the identifiable information.
Privileged Accounts: The domain administrator, root access, local administrator,
super user; all of the accesses should be maintained to manage the situation
appropriately. Some authorisation should be managed by the senior manager written
request. That is how the protection should be strongly coupled. Privileged account
should not be used for the standard activities. That is how the system reconfiguration
should be managed and programme should be managed to take care the system.
Document Page
3INFORMATION SYSTEM CONTROL AND AUDITING
Maintain the data security level: The data sensitivity level should be appropriately
checked, also data maintenance should be needed. If the technical support should be
failed, still the data should be protected. The IMT management data system and
database integrity should be managed to take care the situation. Infortion security
classification should be taken cared by the administrator. Any research data supply
should be managed. Also the protective measure should be managed to get the target
amount of result(Gupta,Agrawal and Yamaguchi,2016).
Access control authorisation: The account should be managed by the appropriate user
and proper password which is needed to protect the system appropriately. The
password should be made with the cryptographically format, that is how hacking will
be impossible for hackers. The symbol, uppercase and the; lower case formation of
the password will help to manage the strong password appropriately. To prevent the
password problem, an IT help desk should be added to manage the system. The
employee awareness is also needed to make the system more secured
(Efthymiopoulos., 2016).
Access Confidentiality: The access should be managed thorough the authorised
person to make the system better. The network segregation, firewall making and the
secure login will help to manage the system more flawless to make the system better.
Role base access control may be used for the secure access system. The public
information should not be protected by the access control (Christou., 2016).
Security specialist: IT security is a little bit hard to maintain. That is why it can be
concluded that special trained employee should be assigned to take care of the
circumstances. It will be closely related to privacy. The governing policy and
effective bullies should be stopped to make the system better. The industry trend
should be needed to finish the process of assignment. The role of the specialist is to
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4INFORMATION SYSTEM CONTROL AND AUDITING
give knowledge about the risk to the employee. That is how the employee should be
awarded through the various task. The security is very much needed for the privacy of
task completion. The firmware and the medical equipment should be modified to take
care of the circumstances appropiately to get the task done (Ruohonen, Hyrynsalmi
and Leppänen,2016).
Modification policies: Some basic policies should be maintained to make the system
better. Suppose the password is needed to be strong, it can be stated that the password
should be combined with the upper and the lower case of the charter, also combined
with the symbols. That is how the combination trace will be very hard to predict
through the software also. Another one aspect is needed to maintain, that the
password should be changed within a certain amount of time. The security logs should
be monitored to make the scenario better (Stoddart.,2016). The unnecessary or the
same name account should be removed. Several unauthorised software should be
removed from each and every computer. There chat client problems should be solved
through the progression of assignment completion with the scenario of the own
mobile problems to complete the process of the work properly. The physical port
completion should be maintained to complete the progress properly to get the
assignment finished (Rizal and Yani,2016).
Control process that has to be managed properly to maintain the LMJ star services.
There are several tasks that have to be managed to finish the situation of control
management (Wang et al.,2016). Those controls are Rule-based Control: The role
access of the problem should be handled to protect the system. Mandatory access
control: The sensitivity level modification will be done through this process which
will help to secure the system in a systematic way. Role-Based Access Control: The
MAC address situation should be done with this procedure to make the system better
Document Page
5INFORMATION SYSTEM CONTROL AND AUDITING
(Eddolls.,2016). Discretionary Access Control: The path modification will be done
through this process in such a way, that the assignment should be conserved to finish
the process of the assignment. So all of this will help to access and finish the data in
such a way, that the task maintenance should be done in such a way, that the target
assignment simulation will be helpful to get the task done with the proper security
(Maheshwari,2016).
Conclusion
The cyber-attack is a huge problem in the hospital management system. All the
sensitive data may be hampered for this attack process of LMJ star services. That is why it
can be concluded that the task should be maintained for the perfect secured system in the
hospital. The database is also needed to be modified with the backup system, which will help
to make the situation better. Several policies have been discussed to protect the system
properly to get the task done with the case scenario. There are several methods that have to be
followed, also the employee should have to be maintained to make the situation better. If the
system should follow all the policies and properly protected by them, then the system should
be secured.
Referencing
Carr, M. (2016). Public–private partnerships in national cyber-security
strategies. International Affairs, 92(1), 43-62.
Christou, G. (2016). Cybersecurity in the European Union: resilience and adaptability in
governance policy. Springer.
Eddolls, M. (2016). Making cybercrime prevention the highest priority. Network
Security, 2016(8), 5-8.
Document Page
6INFORMATION SYSTEM CONTROL AND AUDITING
Efthymiopoulos, M. P. (2016). Cyber-security in smart cities: the case of Dubai. Journal of
Innovation and Entrepreneurship, 5(1), 11.
Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.). (2016). Handbook of research on
modern cryptographic solutions for computer and cyber security. IGI global.
Maheshwari, P. (2016). Security issues of cyber physical system: a review. International
Journal Computer Application, 7-11.
Rizal, M., & Yani, Y. (2016). Cybersecurity Policy and Its Implementation in
Indonesia. Journal of ASEAN Studies, 4(1), 61-78.
Ruohonen, J., Hyrynsalmi, S., & Leppänen, V. (2016). An outlook on the institutional
evolution of the European Union cyber security apparatus. Government Information
Quarterly, 33(4), 746-756.
Stoddart, K. (2016). UK cyber security and critical national infrastructure
protection. International Affairs, 92(5), 1079-1105.
Wang, Y., Wang, Y., Liu, J., Huang, Z., & Xie, P. (2016, June). A survey of game theoretic
methods for cyber security. In 2016 IEEE First International Conference on Data
Science in Cyberspace (DSC) (pp. 631-636). IEEE.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7INFORMATION SYSTEM CONTROL AND AUDITING
Document Page
8INFORMATION SYSTEM CONTROL AND AUDITING
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]