Many types of information security policies
There are many types of information security policies out there. On your own, search for one institution that provides security policies from a variety of higher education institutions. Then, evaluate the specific policy by discussing your findings in a PowerPoint presentation. Your presentation must address the following points outlined below.
o Discuss the process of how your chosen organization develops, implements, and maintains various types of information. This information is discussed in Chapter 4 of your reading. (You might compare your findings with the material discussed in the textbook or the NIST Special Publication, which is provided in the Unit III Suggested Unit Resources section.)
o What are the functional components of an information security program?
o Does the program of the organization you chose include every component? If not, how does it function?
Sample Answer
Task: Analyze an information security policy from a higher education institution, focusing on its development, implementation, maintenance, and alignment with information security program components.
Challenges:
- Policy Accessibility: Ensuring the chosen institution provides public access to its information security policies.
- Policy Depth: Ensuring the selected policy offers sufficient detail for analysis.
- Time Constraints: Balancing research and analysis with presentation development.