discussion points

Using the case scenario from Lab 1 (and used in Assignment 1) examine the use of risk analysis and how it facilitates the development and implementation of an information security policy together with its accompanying standards, guidelines, and procedures. You will also introduce and discuss the need to maintain the timeliness of the security policy, and to periodically review and update it.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Rubric for Learner Posts


Synthesis of concepts in 250 or more words and Well formed conclusions (critical to class performance)


Applications of personal experience


Uses external resources validating position with applicable knowledge


Writing standards: appropriate use of terms, correct spelling and grammar


Participation in discussion, feedback and posting to two fellow classmates 150 words or more – minus these points for not submitting on time.


Total Points: