TutorialWeek04 - ITC482 Computer Management & Security...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Tutorial Week 04 Tutorial Week 04 Week 04 – Information Security Policy Review Questions 1. What is information security policy? Why it is critical to the success of the information security program? 2. Of the controls or countermeasures used to control information security risk, which is viewed as the least expensive? What are the primary costs of this type of control? 3. List and describe the three challenges in shaping policy. 4. List and describe the three guidelines for sound policy, as stated by Bergeron and Bérubé. 5. Describe the bull’s-eye model. What does it say about policy in the information security program? 6. Are policies different from standards? In what way? 7. Are policies different from procedures? In what way? 8. For a policy to have any effect, what must happen after it is approved by management? What are some ways to accomplish this?
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 2

TutorialWeek04 - ITC482 Computer Management & Security...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online