U2

1.Deeply examine the determinants of successful security policies, including but not limited to the legal and regulatory environments in which these policies are developed. Categorize the various security issues an organization might face and prioritize some of the potential security issues.

2.Contrast post implementation activities with those leading up to policy implementation. Explain how post-implementation activities are or are not as important as those leading to policy implementation?