Description
Instructions
Search for sample security policies on the Web. Identify five Enterprise Security Policies (EISP). Compare these with the framework presented in this chapter and comment on how good the policies are and what might be missing or need strengthening.