Describe the business environment and identify the risk and reasoning

explain what some of the differences between the two passenger lists might tell us about those people or about the types of societies that each group of people was entering.
March 29, 2019
Examine the laws discussed in Chapter 9, which protect individual freedoms and the implementation of criminal justice policies.
March 29, 2019

Describe the business environment and identify the risk and reasoning

Research sample policies

Familiarize yourself with various templates and sample policies used in the IT field. Do not just copy

another company’s security policy, but rather learn from the best practices of other companies and apply

them to yours. Use these resources to help structure your policies:

● Information Security Policy Templates

● Sample Data Security Policies

● Additional Examples and Tips

Instructions

With the description of the business environment (the fictional company that has opened in a shopping

mall) in mind and your policy review and research complete, create a new security strategy in the format

of a company memo (no less than three to five pages) in which you do the following:

1. Describe the business environment and identify the risk and reasoning

Provide a brief description of all the important areas of the business environment that you’ve

discovered in your research. Be sure to identify the reasons that prompted the need to create a

security policy.

2. Assemble a security policy

Assemble a security policy or policies for this business. Using the memo outline as a guide,

collect industry-specific and quality best practices. In your own words, formulate your fictional

company’s security policy or policies. You may use online resources, the Strayer Library, or other

industry-related resources such as the National Security Agency (NSA) and Network World. In a

few brief sentences, provide specific information on how your policy will support the business’

goal.

3. Develop standards

Develop the standards that will describe the requirements of a given activity related to the policy.

Standards are the in-depth details of the security policy or policies for a business.

4. Develop practices

Develop the practices that will be used to ensure the business enforces what is stated in the

security policy or policies and standards.

Format your assignment according to the following formatting requirements:

• This course is designed to prepare you for a career in IT. While most Strayer University courses

require APA (essay) format, this course focuses on writing in a business format. Review this

resource to learn more about the important features of business writing: The One Unbreakable

Rule in Business Writing.

● You may use the provided memo outline as a guide for this assignment, or you may use your

own. Get creative and be original! (You should not just copy a memo from another source.) Adapt

the strategy you create to your “company” specifically. In the workplace, it will be important to use

company standard documents for this type of communication.

● Do not cut and paste someone else’s strategy. Plagiarism detection software will be used to

evaluate your submissions. 

 

"Is this question part of your assignment? We Can Help!"

WhatsApp chat