Question Description
Using the case scenario from Lab 1 (and used in Assignment 1) examine the use of risk analysis and how it facilitates the development and implementation of an information security policy together with its accompanying standards, guidelines, and procedures. You will also introduce and discuss the need to maintain the timeliness of the security policy, and to periodically review and update it.
Rubric for Learner Posts |
Points |
Synthesis of concepts in 250 or more words and Well formed conclusions (critical to class performance) |
20 |
Applications of personal experience |
10 |
Uses external resources validating position with applicable knowledge |
10 |
Writing standards: appropriate use of terms, correct spelling and grammar |
20 |
Participation in discussion, feedback and posting to two fellow classmates 150 words or more – minus these points for not submitting on time. |
40 |
Total Points: |
100 |
Using the case scenario from Lab 1 (and used in Assignment 1) examine the use of risk analysis and how it facilitates the development and implementation of an information security policy together with its accompanying standards, guidelines, and procedures. You will also introduce and discuss the need to maintain the timeliness of the security policy, and to periodically review and update it. Rubric for Learner Posts Points Synthesis of concepts in 250 or more words and Well formed conclusions (critical to class performance) 20 Applications of personal experience 10 Uses external resources validating position with applicable knowledge 10 Writing standards: appropriate use of terms, correct spelling and grammar 20 Participation in discussion, feedback and posting to two fellow classmates 150 words or more – minus these points for not submitting on time. 40 Total Points: 100