Reference no: EM132748513
Background: According to Sharda (2015), Management needs to approach security in a way that expresses its importance and instructs users on what they need to do to achieve safety. Without sound management policy, access and storage technologies will be useless.
Reference: Sharda, R., Delen, Dursun, Turban, E., Aronson, J. E., Liang, T-P., & King, D. (2015). Business Intelligence and Analytics: Systems for Decision Support. 10th Edition. By PEARSON Education. Inc.
ISBN-13: 978-0-13-305090-5
Assignment: About the background statement above, research for commonly used management security policy areas, mention three out what you find in your research exercise and describe an example policy for each area.