• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: MIS5205-Introduction
      • Week 2: Framework-Function-Process
      • Week 3: GCC-DBMS
      • Week 4: Operating Systems
      • Week 5: OS Auditing and IT Risk Assessment
      • Week 6: Network and Network Auditing
      • Week 7: Service Level Agreement
    • Second Half of the Semester
      • Week 8: Datacenter Operations Review
      • Week 9: BCP and DR
      • Week 10: Application Control
      • Week 11: Information Security
      • Week 12: Change Management and Licensing
      • Week 13: Fall Break/No Class
      • Week 14: Auditing Capacity/Performance/EndUser Computing
      • Week 15: Emerging technology risks and controls (presentation)
  • Assignments
    • Team Assignment #1
    • Team Assignment #2
    • Team Assignment #3
    • Emerging technology
    • Cybersecurity/Data Breach
  • Webex
  • HBR Coursepack
  • Gradebook

ITACS 5205

Temple University

Team Assignment #2

Assignment Two

10/03/2017

Internal Audit Senior Managers are asking you to develop a Risk and Control Matrix for the IT audit entity you plan to audit and incorporate the RCM into the Audit Planning Memo your team worked on.

The risk and control matrix should identify and key risks associated with the operating systems you are going to audit and should be created in a table format (Ref. to  RCM Template) and should contain the following components:

  1. Risk Events (C.I.A) & Risk Description Detail – Answer the “so what” question
  2. Inherent Risk Rating Rationale (Likelihood, Impact)
  3. Inherent Risk Rating (H/M/L)
  4. Expected Controls (What should be in place to mitigate the risk identified)
  5. Control Assessment (evaluating of the design of the controls – Hypothetical)

 

Sample IT Risk Definition:

    1. IT Governance
    2. System Development
    3. System Documentation
    4. Library Management and Change Control
    5. Information Security
    6. Desktop and Servers
    7. Infrastructure Disaster Recovery
    8. Data Center Operation Services
    9. Data Center Physical Security
    10. Data Transmission
    11. Data Integrity
    12. End User Computing
    13. Telecommunication
    14. Vendor Resilience

Due Date: EOD 10/17/2017

Sample RAM Template:

risk-assessment-matrix-template

 

Email to: Liang.yao@temple.edu Please call me or email me should you have any questions regarding the completion of this assignment BEFORE the due date.

 

 

Primary Sidebar

Weekly Discussions

  • Welcome (1)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in