COVID-19 updates and information.
Discover DC DaysJuly 20 and 21
This course will focus on establishing the balance between business use and safeguard policies. It will concentrate on preparation of policies based on the different security domains based on business process. This course extends to cover laws governing breach of security policies and response mechanisms. Learners must begin by understanding business process before a security policy can be established. Processes are examined in order to visualize underlying security weaknesses and vulnerabilities and to assess the frameworks necessary for drafting an appropriate IT Security Policy. This will form one of the base components of the audit process investigated in the Security Auditing and Governance course in semester 2.