View attachment
using the case scenario from Lab 1 (and used in Assignment 1) examine the use
of risk analysis and how it facilitates the development and implementation of an
information security policy together with its accompanying standards, guidelines,
and procedures. You will also introduce and discuss the need to maintain the
timeliness of the security policy, and to periodically review and update it.