discussion points

Using the case scenario from Lab 1 (and used in Assignment 1) examine the use of risk analysis and how it facilitates the development and implementation of an information security policy together with its accompanying standards, guidelines, and procedures. You will also introduce and discuss the need to maintain the timeliness of the security policy, and to periodically review and update it.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Rubric for Learner Posts

Points

Synthesis of concepts in 250 or more words and Well formed conclusions (critical to class performance)

20

Applications of personal experience

10

Uses external resources validating position with applicable knowledge

10

Writing standards: appropriate use of terms, correct spelling and grammar

20

Participation in discussion, feedback and posting to two fellow classmates 150 words or more – minus these points for not submitting on time.

40

Total Points:

100