Assignment 4: Evaluate Security Policy Components
For this assignment, you will evaluate the components of an information security policy through discussion with your classmates.
Discussion Requirements
There are two parts to this discussion. You will initiate a discussion with one other person, while you will also reply to anyone who initiates a discussion with you. For all posts that you make, you must do your own writing. Use of ChatGPT or other artificial intelligence tools is NOT PERMITTED.
Initiated Discussion
Read other students’ initial discussion posts. Find an initial discussion post that has no more than one other person replying and (if possible) that is written by a different person from the one you engaged in Assignment 2. Also try to find an initial discussion post on a different security component than the one you selected for Assignment 3. If you can’t find an initial discussion post that satisfies all 3 of these constraints, prioritize the first one to avoid overloading one person with more than two questions.
Initiate a discussion by replying to this other student’s initial post with a well-considered question about their security component.
By way of example (this list is far from exhaustive):
- You might be confused about something they said about their component. You could ask for clarification.
- You might have an idea for another vulnerability that their component could unintentionally create. In this case, form a question like “have you considered… ?”.
- You might have something to add to the other person’s analysis of their policy component. Again, try to figure out how to phrase this addition in the form of a question.
If you’re the first person asking a question for another student’s initial post, then you may ask any question. If you’re the second person, then ask a different question from the one that has already been asked. If two other people have already asked a question, then please choose a different student’s initial discussion post.
In your first reply post, begin by introducing yourself briefly. Your question should follow, phrased in a polite and professional manner.
Once the person who made the initial post has responded to your question, read the response to determine if they have answered your question fully. If not, post another question to narrow the discussion and/or explain your initial reasoning. Continue this process of question-and-answer until your original question is fully answered.
When you feel that your initial question has been fully answered, post a reply thanking the other person and indicating that you are satisfied with the answer.
Replies to Your Own Discussion
As other students ask you questions, reply to them in your own discussion topic. You shouldn’t be asked questions by more than two other students, and it’s also OK if nobody else happens to ask you a question. I might ask you followup questions as well, some of which might be accompanied with feedback through the gradebook if your discussion doesn’t appear complete.
Continue responding to the student(s) who ask(s) questions of you until you receive confirmation that you have given complete answer(s). You do NOT need to reply to a message indicating that the other student is satisfied with your answer.
Also reply to any questions I post. Some of these replies may be posted after we have started the next discussion.
Completion Standards
A complete discussion:
- Has a post introducing yourself to another student and asking them a question about their initial discussion post.
- Asks a relevant question that is directly related to the other student’s description of an information security policy component.
- Asks for clarification, or poses followup questions, as required.
- Thanks the other person whenever your question has been fully answered.
- Contains answers to any question(s) that you are asked by someone else.
- Is conducted in a civil and professional tone using proper English language skills (in other words, avoid text message speak and slang).
Assessment
Successful completion of this assignment satisfies the following course student learning outcome:
- SLO 3. Critically evaluate and manage information security policies, principles, processes, services, and technologies to manage risks and security threats for ensuring a secure information system technology infrastructure.