Reference no: EM133767872
Policies provide the foundational requisites of a cybersecurity program. Policies are pivotal in protecting assets and shaping the procedures ultimately intended to reduce organizational risk.
In your journal, describe the purpose of an acceptable use policy, an incident response policy, and a password management policy. Explain why each is important to an organization.
Your journal entry should be three paragraphs long, one paragraph per policy.
Overview
Journals are private and between you and the instructor only. Approach these activities as an opportunity to reflect upon and apply what you learn each week based on the assigned readings, discussions, and activities. As a successful professional, you will need good reflective and writing skills. Journal activities offer you the opportunity to develop these skills further. The journal entries in this course are graded separately.
Prompt
First, complete the assigned readings for the week. Then read the journal prompt and write a reflection. Your journal entry should be two paragraphs long and address the prompt provided in each module.
In your response, be certain to address the following critical elements:
Critical Thinking and Reflection: Support the claims with relevant examples of previous and logical thought processes.
Integration and Application: Show excellent depth of knowledge of the module content and exhibit careful consideration of the topic.
Voice: Write in a style that is appealing and appropriate for the intended audience and use a consistent voice that is evident throughout.