Authentication
1. In your own words, list the five goals of information security governance.
2.Using the example of an Issue-Specific Policy Statement Framework from the lecture this week, create your own IT policy.
Using the example of an Issue-Specific Policy Statement Framework from the lecture this week, create your own IT policy.