Authentication 1. In your own words, list the five goals of information security governance. 2.Using the example of an Issue-Specific Policy Statement Framework from the lecture this week, create your own IT policy.
Authentication 1. In your own words, list the five goals of information security governance. 2.Using the example of an Issue-Specific Policy Statement Framework from the lecture this week, create your own IT policy.