Computer Science ISSC 479 Assignment 2

 This week’s assignment we are going to produce a brand-new set of security policies for . The assigned reading for this week gives us a small base for the type of policies that we should include. However, I want you to take the provided security policy and develop it further based off your experience to date and based on additional research you are going to do.

 Assignment Guidelines

Step 1: After reading the document this week, you will need to go out and do extra research to see what other security policies are in use and publicly available. This research combined with the knowledge you have built over the past two courses should be sufficient to produce a good set of security policies.

Step 2: Integrate your work with the provided base policies and finalize them in a Word document.

Step 3: Verify that your policies have addressed as many scenarios as possible, i.e. there may be a few additional policies that were not in this weeks reading.