Examines the steps required in policy development including password protection, acceptable use of organization information technology assets, risk acceptance, identification of threats, countermeasures, intellectual property, proprietary info and privacy issues, compliance reporting, and escalation procedures. Discusses access controls, security standards, and policy implementation.
Sort by "All" in the top right to see previous semesters.