Describe steps to choosing the appropriate security policy


Discussion: Information Security Policy Development

Well-managed information security programs include the development and enforcement of information security policies. There is, however, a fair amount of diversity in how government agencies and organizations approach the task of creating and enforcing information security policies.

Use the study materials and engage in any additional research needed to fill in knowledge gaps. Then discuss the following:

• Describe the steps to choosing the appropriate security policy selection and organization that an organization will implement.

• Identify the roles and responsibilities that are appropriate for information security policy creation team members.

• Explain what mechanisms will be included in the policy creation process to ensure fair and equitable enforcement of these policies once implemented.

The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Describe steps to choosing the appropriate security policy
Reference No:- TGS02114224

Now Priced at $15 (50% Discount)

Recommended (92%)

Rated (4.4/5)