For this assignment, you must compare and contrast information technology and security policies, standards, and procedures.

Information technology and security policies

Information technology and security policies

 

  1. Create a policy compliance evaluation tool in the form of an evaluation rubric, matrix, or checklist that will assist with evaluating an IT policy. The tool should have an appropriate number of criteria and a scale in which to evaluate each criterion.
  2. Use the policy compliance evaluation tool you created to evaluate the IT and systems security policy of an organization of your choice. You must be able to locate the policy online.

Hire a professional tutor and get high-quality, unique assignments. We will assist you breakdown tough concepts to enable you to sharpen your skills.

  1. Write a report that includes the following:
    1. Information technology and security policies
    2. Description of the selected organization, along with the web address for the IT policy.
    3. Description of the IT policy at a high level, stating the policy number and title.
    4. Explanation of the rationale for the evaluation and impact of non-compliance.
    5. Three recommendations to improve the IT policy you evaluated.
    6. Discussion of the strengths and weaknesses of the tool you created.

Length: 5-7 page report, not including cover and reference pages

The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course.

Requirements: 5 to 6 pages

Sometimes the nomenclature used to define information security policies and related documentation can be confusing.  Much of that confusion comes from the fact that the information security industry often uses these terms interchangeably.   At Information Shield, we adopt the following definitions that have proven effective over the years.