Reference no: EM132663073
For leaders, implementing security policies is all about working through others to gain their support and adhere to the policies. Discuss widely accepted leadership rules which apply to security policies.
Discuss the importance of creating an IT security framework that aligns with organizational goals.
Compare and Contrast access control in relation to risk, threat and vulnerability.
Identify and discuss two - three information security policy implementation issues & their recommended resolution(s).
Explain the relationship between access control and its impact on an organization's security procedures & policies.
Discuss quality control vs quality assurance.
Discuss the ways in which "good" policy can reduce the likelihood of the risk occurring or reduce its impact.
Describe access control and its level of importance within operations security.
Argue the need for organizations to implement access controls in relation to the: awareness principle, accountability principle, ethics principle, and timeliness principle.
Describe the necessary components within an organization's IT security policy.