Why are security policies important? What happens without a security policy?

In a virtual meeting, how can you ensure a group is communicating effectively?
August 5, 2017
Since John was in custody, what are the procedural steps the police were required to take once John began to incriminate himself?
August 5, 2017
Show all

Why are security policies important? What happens without a security policy?

Please make sure you use the attached readings links for background information before responding to this discussion question. There is also a video links provided in the Reading links attachment, Please be sure to view it prior to answering this questions. (I have taken my time to paste all the require resources you need for this work) Please you have to use them to work this discussion.

 

Post your response to one of the following questions

1. Why are security policies important? What happens without a security policy? What are the elements that a good security policy should contain?

2. Explain information security confidentiality, integrity, and availability. Summarize one common attack (e.g., Denial of Service) and state whether the attack compromises confidentiality, integrity, and/or availability. Be sure to explain why or how the attack compromises one, two, or three of the pillars of information security. Note: You can also discuss authenticity and non-repudiation, if you want to.

Provide in-text citations and references for 3 or more authoritative sources. Put the refere

Leave a Reply

Your email address will not be published. Required fields are marked *