Information Security Policies Discussion
UC Information Security Policies Discussion
Read Chapters 13 & 14
Recommended Materials/Resources
Please use the following author’s names, book/article titles, web sites, and/or keywords to search for supplementary information to augment your learning in this subject.
- Reynolds, George. Ethics in Information Technology, Cengage Learning, 2014.
- Meiners, Roger E., Ringleb, AI H., and Edwards, Frances L. The Legal Environment of Business, Cengage Learning, 2014.
- Why is it necessary to define policy elements?
- Discuss the terms confidentiality, integrity and availability as they relate to information systems. Why should this be included in information systems policies?
- What is the importance of aligning security policies, controls and procedures with regulations?
- Do you believe that training is a necessity in the implementation of new policies? Please give reasons to support your answer.

Having Trouble Meeting Your Deadline?
Get your assignment on Information Security Policies Discussion completed on time. avoid delay and – ORDER NOW