You have been asked to design a security policy for a database that contains very sensitive information. Discuss five important issues that should be addressed
What would be your approach to introduce potential information systems security (ISS) risks to management? Also, how could you enforce the security
What would be your approach to introduce potential information systems security (ISS) risks to management? Also, how could you enforce the security controls if policies were created based on your recommendations? Course Textbook(s) Johnson, R., & Easttom, C. (2022). Security policies and implementation issues (3rd ed.). Jones & Bartlett Learning.