Question: 01. (20 points) (Hints - Che lecture slides) a. What is information security policy and how it is showed in the spheres of security Thints
01. (20 points) (Hints - Che lecture slides) a. What is information security policy and how it is showed in the spheres of security Thints fig 4.112 List and describe the three guidelines for sound policy, as stated by Bergeron and Borub. ANSWER b. Describe the bull's-eye model. What does it say about policy in the InfoSec program? ANSWER: List and describe the three types of InfoSec policy as described by NIST SP 800-14. ANSWER: c d. Briefly explain EISP components and ISSP document organization practices with advantages and disadvantages Hints: Tables 4.1.4.4)
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
