comment on the need and rationale for Risk Assessment Policy

Question description

Security policies are common within organizations that focus on providing a secure computing environment. Imagine that you are tasked with drafting a security policy for an organization of your choice. Draft a security policy for an existing or fictitious organization. You have viewed some sample policies at http://www.sans.org/security-resources/policies/.

In your response, comment on the need and rationale for each of the following types of policies:

1. Acceptable use policy (AUP)

2. Risk Assessment Policy

3. Remote Access Policy

In your paper, ensure that you describe the significance and purpose of the three policy documents listed above and explain how they relate to your selected chosen organization. Your response should be five to six pages in APA style.

find the cost of your paper

use this application to solve,,Netbeans,,creator

use this application to solve,,Netbeans,,creator I uploaded two pictures these are the situations and the question the major is: Computing and Information system

Table Business Rules

Chapter 4 discusses Business Rules. For the 5 tables you are working on please establish business rules for each of the tables and columns. For example and using the EmployeeID….